3
Integration Features © 2020 Palo Alto Networks, Inc. | All Rights Reserved. Today’s security landscape has no lack of data but sifting through that data for focused and relevant threat information is a challenge. SOCs often miss out on potential threats that can impact their organization because they’re time-strapped by correlating context across sources, manual processes, and high, irrelevant alert volume. Security teams need a platform that can centralize threat intelligence across sources and harness that information to drive response across security environments. To meet these challenges, users can combine the comprehensive tailored threat intelligence of IntSights with the security orchestration and automation features of Cortex XSOAR to improve threat visibility and accelerate incident response. Products: Cortex XSOAR Enterprise, IntSights Enterprise Threat Intelligence and Mitigation Platform Harness rich, aggregated threat intelligence from IntSights in Cortex XSOAR for automated, playbook- driven response. Further enrich IntSights data with intelligence from other security tools via Cortex XSOAR’s orchestration. Improve analyst efficiency by centralizing collaboration, investigation, and documentation. Shorten decision-making cycle by automating key tasks with analyst review. Ingest aggregated tailored ‘digital footprint’ alerts from IntSights into Cortex XSOAR and trigger playbooks to enrich and respond to those alerts. Enrich IntSights alert context from within Cortex XSOAR by adding tags, comments, and severity changes as automated tasks. Access IntSights IOC lists and blocklists from Cortex XSOAR in real-time. Search for alert details, alert activities, and IOCs in IntSights from within Cortex XSOAR. Leverage hundreds of Cortex XSOAR product integrations to further enrich IntSights ‘digital footprint’ intelligence and coordinate response across security functions. Run thousands of commands (including for IntSights) interactively via a ChatOps interface while collaborating with other analysts and Cortex XSOAR’s chatbot. Benefits Compatibility Automated Threat Intelligence Response Cortex XSOAR & IntSights

Automated Threat Intelligence Response...time-strapped by correlating context across sources, manual processes, and high, irrelevant alert volume. Security teams need a platform that

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Automated Threat Intelligence Response...time-strapped by correlating context across sources, manual processes, and high, irrelevant alert volume. Security teams need a platform that

Integration Features

© 2020 Palo Alto Networks, Inc. | All Rights Reserved.

Today’s security landscape has no lack of data but sifting through that data for focused and relevant threat information is a challenge. SOCs often miss out on potential threats that can impact their organization because they’re time-strapped by correlating context across sources, manual processes, and high, irrelevant alert volume. Security teams need a platform that can centralize threat intelligence across sources and harness that information to drive response across security environments.

To meet these challenges, users can combine the comprehensive tailored threat intelligence of IntSights with the security orchestration and automation features of Cortex XSOAR to improve threat visibility and accelerate incident response.

Products: Cortex XSOAR Enterprise, IntSights Enterprise Threat Intelligence and Mitigation Platform

Harness rich, aggregated threat intelligence from IntSights in Cortex XSOAR for automated, playbook- driven response.

Further enrich IntSights data with intelligence from other security tools via Cortex XSOAR’s orchestration.

Improve analyst efficiency by centralizing collaboration, investigation, and documentation.

Shorten decision-making cycle by automating key tasks with analyst review.

Ingest aggregated tailored ‘digital footprint’ alerts from IntSights into Cortex XSOAR and trigger playbooks to enrich and respond to those alerts.

Enrich IntSights alert context from within Cortex XSOAR by adding tags, comments, and severity changes as automated tasks.

Access IntSights IOC lists and blocklists from Cortex XSOAR in real-time.

Search for alert details, alert activities, and IOCs in IntSights from within Cortex XSOAR.

Leverage hundreds of Cortex XSOAR product integrations to further enrich IntSights ‘digital footprint’ intelligence and coordinate response across security functions.

Run thousands of commands (including for IntSights) interactively via a ChatOps interface while collaborating with other analysts and Cortex XSOAR’s chatbot.

Benefits

Compatibility

Automated Threat Intelligence ResponseCortex XSOAR & IntSights

Page 2: Automated Threat Intelligence Response...time-strapped by correlating context across sources, manual processes, and high, irrelevant alert volume. Security teams need a platform that

© 2020 Palo Alto Networks, Inc. | All Rights Reserved.

Challenge: The disparate nature of threat intelligence and incident response tools can make it tough for SOC teams to track the lifecycle of an incident due to moving between screens, fragmented information, and the lack of single-window documentation. Incident response will also often involve a host of important but repetitive actions that analysts need to perform, not leaving them with enough time for actual problem-solving and decision-making.

Solution: SOCs using IntSights for threat intelligence and digital risk protection alongside Cortex XSOAR Enterprise for security orchestration and incident response respectively can automate alert ingestion and IOC enrichment through Cortex XSOAR playbooks. These playbooks will receive alerts and indicator intelligence from IntSights and use that information to execute actions across the entire stack of products that a SOC uses.

Ingest

Other Products…and more!

Alert and IOCdetails

Multi-Source ThreatIntelligence

EDR FirewallSIEM

Email UEBA Ticketing

Enrich and RespondFeedback

Cortex XSOAR

Use Case #1 Automated Threat Enrichment and Response

Cortex XSOAR

Page 3: Automated Threat Intelligence Response...time-strapped by correlating context across sources, manual processes, and high, irrelevant alert volume. Security teams need a platform that

© 2020 Palo Alto Networks, Inc. | All Rights Reserved.

For example, analysts can leverage IntSights to get IOC lists, modify alert severity, and update and IOC’s blocklist status as automatable playbook tasks within Cortex XSOAR. Benefit: Cortex XSOAR playbooks coupled with IntSights actions can standardize and speed up triage and resolution of security alerts. Analysts get a comprehensive view of the response workflow on a single screen. With repeatable tasks now automated, analyst time is freed up for deeper investigation and strategic action.

Challenge: Standardized processes are not enough for responding to every security alert. Apart from running automated actions, attack investigations usually require additional real-time tasks such as pivoting from one suspicious indicator to another to gather critical evidence, drawing relations between incidents, and finalizing resolution. Running these commands traps analysts in a screen-switching cycle during investigation and a documentation-chasing cycle after investigations end.

Solution: After running enrichment playbooks, analysts can gain greater visibility and new actionable information about the attack by running IntSights commands in the Cortex XSOAR War Room. For example, after a Cortex XSOAR playbook gets an alert from IntSights, analysts can get additional context in real time by running commands such as intsights-get-alert-image and intsights-get-alert-activities with relevant arguments to get the images and activities tied to a specific alert.

Analysts can also run commands from other security tools in real-time using the War Room, ensuring a single-console view for end-to-end investigation that coordinates across the product stack. The War Room will document all analyst actions and suggest the most effective analysts and command-sets with time.

Benefit: The War Room allows analysts to quickly pivot and run unique commands relevant to incidents in their environment from a common window. All participating analysts will have full task-level visibility of the process and be able to run and document commands from a unified console. They will also prevent the need for collating information from multiple sources for documentation.

Use Case #2 Interactive, Real-Time Investigation For Complex Threats

About IntSightsIntSights is redefining cybersecurity with the industry’s first and only enterprise threat intelligence and mitigation platform that transforms tailored threat intelligence into automated security operations. Our groundbreaking data-mining algorithms and unique cyber reconnaissance capabilities continuously monitor an enterprise’s external digital profile across the surface, deep and dark web, categorize and analyze tens of thousands of threats, and automate the risk remediation lifecycle — streamlining workflows, maximizing resources and securing business operations. This has made IntSights’ one of the fastest growing cybersecurity companies in the world. IntSights has offices in Boston, Tel Aviv, Amsterdam, New York and Dallas and is backed by Glilot Capital Partners, Blumberg Capital, Blackstone and Wipro Ventures.

About Cortex XSOARCortex XSOAR is the only Security Orchestration, Automation, and Response (SOAR) platform that combines security orchestration,incident management, and interactive investigation to serve security teams across the incident lifecycle. Our orchestration engine coordinates and automates tasks across 100s of partner products, resulting in an increased return on existing security investments. Cortex XSOAR enables security teams to reduce Mean Time to Response (MTTR), create consistent incident management processes, and increase analyst productivity. For more information, visit www.demisto.com or email [email protected].

Cortex XSOAR