Enrichment Interact and layer threat intelligence / geo location information and user / application data on to events in real-time. This brings context and enables better decision making. Validation After threats are detected, they need to be validated with multiple sources and cross correlated with internal resources. This is the validation process, validating a malware hash with a third party data source uses an integration from the validation family. Response As threats get identified and validated, automation needs to extend towards response as well. Response integrations help you take mitigative action and sometimes also integrate with other tools in the chain.
Topic Replies Views Activity
0 160 October 25, 2020
1 244 October 1, 2021
5 335 May 10, 2021
2 197 April 20, 2021
1 196 April 6, 2021