ThreatConnect, provider of the leading intelligence-driven security platform announces its new orchestration capability. Smarter than existing orchestration products currently in the market, this capability provides automation, configurable playbooks, and human intervention with the added component of tailored threat intelligence built into one platform. With the combination of intelligence and orchestration, organizations will have a focused, more efficient, and more effective response to threats, without necessarily having to expand their team or acquire more tools.
ThreatConnect CEO Adam Vincent said, “When all of an organization’s threat data is going into one platform that also connects to all their tools, security ops teams can optimize their staff, extend the functionality of their tools, and ensure complete control over how the data is operationalized.”
Using a simple drag and drop interface, security teams of any size can create (or use built-in) automated playbooks that can be evaluated and modified in real-time, and shared to ensure best practices are followed and pertinent information is shared across the entire enterprise. SIEMs, enrichment tools, endpoint protection and other products can all be connected around a standard workflow. By aligning all security tools and processes in a coordinated platform, users may integrate and simplify security operations and intelligence processes. Then, use automation to deliver greater efficiencies and increased agility in a time of increasing enterprise complexity and day-to-day breaches.
Vincent added, “Instead of a throw-more-money-and-tools at the problem mentality, ThreatConnect’s orchestration allows analysts and security teams to fully utilize their current tools and existing teams’ talents by automating simple tasks, prioritizing critical events, and putting time back on the clock to proactively hunt threats.”
Available for early adoption by current customers in Q4, 2016 and generally available in Q1, 2017, ThreatConnect’s intelligence-driven orchestration force multiplies security teams and rapidly surfaces all the most critical threats for preventive action, thus reducing the time from compromise to detection and response.