Effective Incident Response
Security Orchestration and Automation (SOAR)
Miguel Carrero Tammy Tolbert
Effective Incident Response Security Orchestration and Automation - - PowerPoint PPT Presentation
Effective Incident Response Security Orchestration and Automation (SOAR) Miguel Carrero Tammy Tolbert MicroFocus ArcSight and Siemplify Addressing the needs of SOCs, including: Relieving resource constraints by automating
Security Orchestration and Automation (SOAR)
Miguel Carrero Tammy Tolbert
tasks
INVESTIGATION
Helping analysts make faster, better decisions through visualization, context and more
REPORTING AND INSIGHTS
Measuring and tracking SOC KPIs to improve operations
SOC WORKBENCH
Managing a broad spectrum of SOC activities beyond playbooks and alert handling
SOAR Building Blocks
ORCHESTRATION & AUTOMATION
Integrations, playbooks, playbook builder, machine Learning
company confidential
The Only Powerfully erfully Si Simple mple SOAR Platform
Simple and Intuitive SOC Workbench loved by analysts Powerful automation and
highly customized
Life Today – Without Security Orchestration
Detect Security Tools ArcSight ESM/ ArcSight UBA Correlate & Alert Data Gathering / Triage ArcSight Investigate Analysis & Decision Response Report Revise & Improve
Life with Siemplify SOAR
Detect Security Tools ArcSight ESM/ ArcSight UBA Correlate & Alert Data Gathering / Triage ArcSight Investigate Analysis & Decision Response Report Revise & Improve!
E F F I C I E N C Y S AV I N G S
Delivering the Intelligent SOC With Siemplify and ArchSight
and workflows
and human response
management, KPI’s a business intelligence
and accelerate investigations
Use Case – Siemplify and ArcSight ESM
analyst to analyze the threat and respond by blocking the URLs, hashes as well as disable the account and close the ticket
Information Passed by ArchSight to Siemplify
Failed Login Alerts correlated by ArcSight and passed to Siemplify
What the Analyst Sees in Siemplify
Phishing Email with Suspicious attachment Malware Detected Added Context Automated response using pre-defined playbooks Multiple failed logins Additional Entity based Context
How Siemplify Correlates These Events Through Visual Investigation
Malicious Playload Failed Login Attempts Suspicious Email
Automated Response with Siemplify
Malicious Playload Block URL and Hash Disable Account
Playbook to handle Phishing threats Automated Actions to Speed up Response
120+ Integrations
Pre-packaged with our expertise Easily extensible with yours
80+ Playbooks
The Siemplify SOAR Platform
Alert clustering = up to 80% case reduction Intuitive, visual and FAST investigation Same analyst works a threat-oriented case Playbooks run on a single threat-oriented case Manage day-to-day security operations from a single workbench
Only Siemplify Delivers
Work fewer cases and focus on what matters the most with streamlined case handling Make faster, more accurate decisions with rapid case investigations to reduce dwell time and MTTR Go beyond automation to unify your SOC on a platform built on deep security operations expertise
3x OPERATIONAL EFFICIENCY AND 3x FASTER INVESTIGATION COMAPRED TO OTHER SOAR SOLUTIONS! Faster Answers A Complete SOC Workbench
allows even entry-level analysts to deliver high-value work
Maximum Operational Efficiency