Today’s security landscape has no lack of data but sifting through that data for focused and relevant threat information is a challenge. SOCs often miss out on potential threats that can impact their organization because they’re time-strapped by correlating context across sources, manual processes, and high, irrelevant alert volume. Security teams need a platform that can centralize threat intelligence across sources and harness that information to drive response across security environments.
To meet these challenges, users can combine the comprehensive tailored threat intelligence of IntSights with the security orchestration and automation features of Demisto to improve threat visibility and accelerate incident response.
- Ingest aggregated and tailored 'digital footprint' alerts from IntSights into Demisto and trigger playbooks to enrich and respond to those alerts.
- Enrich IntSights alert context from within Demisto by adding tags, comments, and severity changes as automated tasks.
- Access IntSights IOC lists and blocklists from Demisto in real-time.
- Search for alert details, alert activities, and IOCs in IntSights from within Demisto.
- Leverage hundreds of Demisto product integrations to further enrich IntSights ‘digital footprint’ intelligence and coordinate response across security functions.
- Run thousands of commands (including for IntSights) interactively via a ChatOps interface while collaborating with other analysts and Demisto’s chatbot.
USE CASE #1
Automated threat enrichment and response
The disparate nature of threat intelligence and incident response tools can make it tough for SOC teams to track the lifecycle of an incident due to moving between screens, fragmented information, and the lack of single-window documentation. Incident response will also often involve a host of important but repetitive actions that analysts need to perform, not leaving them with enough time for actual problem-solving and decision-making.
SOCs using IntSights for threat intelligence and digital risk protection alongside Demisto Enterprise for security orchestration and incident response respectively can automate alert ingestion and IOC enrichment through Demisto playbooks. These playbooks will receive alerts and indicator intelligence from IntSights and use that information to execute actions across the entire stack of products that a SOC uses.
Fig: A Demisto playbook utilizing the IntSights integration
For example, analysts can leverage IntSights to get IOC lists, modify alert severity, and update and IOC’s blocklist status as automatable playbook tasks within Demisto.
Demisto playbooks coupled with IntSights actions can standardize and speed up triage and resolution of security alerts. Analysts get a comprehensive view of the response workflow on a single screen. With repeatable tasks now automated, analyst time is freed up for deeper investigation and strategic action.
For more information on Demisto's integration with IntSights, view our joint solution brief
USE CASE #2
Interactive, real-time investigation for complex threats
Standardized processes are not enough for responding to every security alert. Apart from running automated actions, attack investigations usually require additional real-time tasks such as pivoting from one suspicious indicator to another to gather critical evidence, drawing relations between incidents, and finalizing resolution. Running these commands traps analysts in a screen-switching cycle during investigation and a documentation-chasing cycle after investigations end.
After running enrichment playbooks, analysts can gain greater visibility and new actionable information about the attack by running IntSights commands in the Demisto War Room. For example, after a Demisto playbook gets an alert from IntSights, analysts can get additional context in real time by running commands such as intsights-get-alert-image and intsights-get-alert-activities with relevant arguments to get the images and activities tied to a specific alert.
Analysts can also run commands from other security tools in real-time using the War Room, ensuring a single-console view for end-to-end investigation that coordinates across the product stack. The War Room will document all analyst actions and suggest the most effective analysts and command-sets with time.
Fig: IntSights dashboard showcasing both clear web and dark web data
The War Room allows analysts to quickly pivot and run unique commands relevant to incidents in their environment from a common window. All participating analysts will have full task-level visibility of the process and be able to run and document commands from a unified console. They will also prevent the need for collating information from multiple sources for documentation.
We hope you found this integration overview useful. To explore other security orchestration use cases with Demisto, you can download our whitepaper by visiting the link below.