Integrations
Enrichment Interact and layer threat intelligence / geo location information and user / application data on to events in real-time. This brings context and enables better decision making. Validation After threats are detected, they need to be validated with multiple sources and cross correlated with internal resources. This is the validation process, validating a malware hash with a third party data source uses an integration from the validation family. Response As threats get identified and validated, automation needs to extend towards response as well. Response integrations help you take mitigative action and sometimes also integrate with other tools in the chain.
Topic | Replies | Views | Activity | |
---|---|---|---|---|
About the Integrations category |
![]() |
0 | 220 | October 25, 2020 |
Signal Notification over Email |
![]() |
1 | 306 | October 1, 2021 |
Ingesting data in LEEF |
![]() ![]() |
5 | 403 | May 10, 2021 |
Active Directory integration issue |
![]() ![]() |
2 | 253 | April 20, 2021 |
Custom SOAR integrations |
![]() ![]() |
1 | 260 | April 6, 2021 |