Most organisations struggle to keep up with malicious threats. As malware and the rest of the security threat landscape continues to evolve, security operations centers (SOCs) need to evolve as well. But evolving can be difficult when analysts are stuck performing tedious, manual tasks when some higher-value tasks need their attention—such as ensuring definitions are up to date, creating custom rules, building robust and reliable threat intelligence, etc.
BlackBerry Cylance and Swimlane have teamed up to offer a new use case that combines the power of security orchestration, automation and response (SOAR) with CylancePROTECT’s integrated threat prevention solution.
The Proactive Endpoint Threat Response use case utilises Swimlane’s integration to take a proactive response to detections identified by Cylance PROTECT.
By ingesting detection’s from Cylance PROTECT, Swimlane can automate and orchestrate the enrichment of detection’s using multiple open source intelligence (OSINT) platforms to identify malicious files proactively that are similar or related to a specific variant identified by Cylance.
Swimlane then automatically pulls the related samples and feeds them back into Cylance to enhance your protection from future threats.
By utilising widgets within your Swimlane applications you can easily display the relevant information about the detection without having to continually review multiple different text fields. This enables a security analyst to quickly view the problem and any actions that need to be taken.
Once a detection has entered the enrichment phase within the Proactive Endpoint Threat Response application Swimlane automatically perform enrichment utilising OSINT, but in addition to this enrichment, this application automatically queries your SIEM. By automatically querying your SIEM, Swimlane can assist with finding additional historical context for this threat.
Once an overall determination has been made about this detection, Swimlane can automatically update a device threat which can either quarantine or safelist a specific threat detection. This can be done either automatically or by interacting with our Threat Quarantine widget.