Threat Management
Portfolio Offerings
- Foundation
- Standard
- Premium
| Monitoring | Incident management | Threat Intelligence |
|---|---|---|
| KNOWN-KNOWN: SIEM Use Cases | Security incident management oriented ITSM | OSINT |
| MITRE attack Use Cases | SOC KPI Dashboard Portal | Threat advisories |
| Ready to use SOAR Playbooks | Malware analysis |
| Monitoring | Incident management | Threat Intelligence |
|---|---|---|
| KNOWN-KNOWN: SIEM Use Cases | Security incident management oriented ITSM | OSINT |
| MITRE attack Use Cases | SOC KPI Dashboard Portal | Threat advisories |
| Ready to use SOAR Playbooks | Malware analysis | |
| UEBA | Threat hunting | Brand monitoring & takedown |
| EDR | IR & Forensics |
| Monitoring | Incident management | Threat Intelligence |
|---|---|---|
| KNOWN-KNOWN: SIEM Use Cases | Security incident management oriented ITSM | OSINT |
| MITRE attack framework | SOC KPI Dashboard Portal | Threat advisories |
| Ready to use SOAR Playbooks | Malware analysis | |
| UEBA | Threat hunting | Brand monitoring & takedown |
| EDR | IR & Forensics | |
| Deception | Threat modelling | Deep & Dark web monitoring |