Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

Using Security Automation and Incident Response to Analyze Cybersecurity Alerts

  • Broadcast in Technology
Cyber Security News

Cyber Security News


Follow This Show

If you liked this show, you should follow Cyber Security News.

Today’s security teams and professionals deal with threats and cyber attackers on a constant basis. There are daily fires to put out, as well as necessary forensics investigations to conduct to see what happened and how to mitigate future attacks. While advice for staying ahead of cyber threats abounds, most organizations struggle to keep pace in a consistently evolving threat landscape.


This is where Security Orchestration, Automation and Response (SOAR) solutions come into play as they go beyond simple automation, letting security operations teams rise above the daily firefighting. SOAR is an ideal counterpart to the burgeoning problem of having too many security tools, but not enough in-house talent to use them effectively.


With SOAR, security operations teams can easily integrate disparate cybersecurity technologies and processes into a more consolidated and cohesive security ecosystem. As all analyst activity (automated and manual) is captured on a single platform, it lets them investigate, analyze and remediate alerts via a single interface. Managers have access to metrics and analytics that can drive continuous improvement across people, process and technology, allowing security teams to work more efficiently against the growing onslaught of cyber threats.

 Cybersecurity company Siemplify, based in New York City, offers a sophisticated, cutting edge SOAR technology for businesses and corporations alike. During this podcast, we have the honor and privilege of interviewing Nimmy Reichenberg, chief marketing officer of Siemplify.

Dial in today to see how you can make the most use of their SOAR offering and stay well ahead of cyber attackers!