![]() ![]() ![]() Access to all this gives you some intelligence into what you're trying to investigate and what you will be trying to understand. With this information at their fingertips, IBM customers can quickly automatically analyze or manually submit suspicious files in order to identify and respond to evasive malware in their network. ![]() It's quite intergrable so you can actually integrate and get all the threat intel such geography, blaclisted domains, hashes to watch out for, IP, malware and URL information. Lastline technology integration will provide unmatched advanced threat visibility and context into the IBM X-Force Exchange platform. X-Force has the ability to integrate with other solutions such as Cisco Threat Grid cloud. So if a customer comes to me and says, "what does it exactly mean for us?" I can quickly leverage a tool that helps me to get quick visibility, quick understanding, quick investigation, quick drill down, and be able to close their offenses and issues as quick as I can. So besides using it in my data center, I have multi-tenants SOC environment, with tenants belonging to other Customers that I monitor. Providing this service to customers require a quick turn around time. Threat analysis activity can take a lot of time. IBM X-Force has shortened our lifecycle for cyber security investigations. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |