How do you know if you’re ready for SOAR?

Industry-wide, security operations centers (SOCs) are struggling with overworked, understaffed teams; more alerts than they can handle; and increasingly sophisticated bad actors. Thought leaders agree a breach is not a matter of if but when. From intellectual property to proprietary information to personally identifiable information (PII), protecting the data of ... Read More

How to streamline cyber forensic investigations

|
Cyber forensic investigations are a critical component of any incident response process. While such investigations are important, gathering forensic details post-incident can be a cumbersome manual task. But with the right solutions in place–and fully integrated—you can significantly streamline investigations and ensure your enterprise remains protected, even against the most ... Read More

Five benefits to implementing security automation using SOAR

Security orchestration, automation and response (SOAR) goes beyond automating tasks that used to be handled manually by working together to effectively, and even proactively, improve your cybersecurity operations. SOAR—sometimes also referred to as security automation and orchestration—combines technical capabilities and software with built-in processes to improve the management of security ... Read More
BlackHat 2018: See Swimlane SOAR in action

BlackHat 2018: See Swimlane SOAR in action

Swimlane 3.2 is here! Visit us at Black Hat, booth #2304, to check out the latest release of our comprehensive security orchestration, automation and response (SOAR) platform. So, what's new? Swimlane 3.0 introduced prebuilt applications and modular applets, allowing you to customize and automate incident response processes to fit your ... Read More

Using security orchestration, automation and response for improved cyber threat intelligence

|
Gartner defines threat intelligence as “evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard.” Compiling and using cyber threat intelligence data is key ... Read More

Improving insider threat detection

Detecting and proactively preventing external cyberattacks is a focus for security operations (SecOps) teams, but insider attacks also pose a risk. In fact, nearly 75% of data breaches are caused byinsider threats. Whether insiders maliciously intend to attack organizations, neglect to protect systems or have their credentials stolen, identifying and ... Read More