Enrichment Interact and layer threat intelligence / geo location information and user / application data on to events in real-time. This brings context and enables better decision making. Validation After threats are detected, they need to be validated with multiple sources and cross correlated with internal resources. This is the validation process, validating a malware hash with a third party data source uses an integration from the validation family. Response As threats get identified and validated, automation needs to extend towards response as well. Response integrations help you take mitigative action and sometimes also integrate with other tools in the chain.
Topic Replies Views Activity
0 220 October 25, 2020
1 306 October 1, 2021
5 403 May 10, 2021
2 253 April 20, 2021
1 260 April 6, 2021