SlideShare a Scribd company logo
Three Things We See &
Fix in Every Struggling
Security Automation
Project
D3 Security
Goog le Chronicle
PAN XSOAR
Sp lunk SOAR
The SOAR Space
IBM Qrad ar SOAR
Tines
Swim lane
In the past 12
months, 73% of our
customers purchased
D3 to replace their
existing SOAR
product.
1. Too many SOAR projects miss the mark.
2. We know why they failed, plus what’s gotten them back on track
What does that mean?
Why do certain SOAR projects fail?
Problem #1: HIDDEN BURDENS  Integ ration m aintenance
Problem #2: MESSY ALERT DATA  Need to be untangled &
structured
Problem #3: LOW FIDELTY ALERTS  Take up valuable time
SHINING A LIGHT ON HIDDEN BURDENS
 Burdensome Integrations vs. Vendor -Maintained Integrations
 “DIY” integrations suck up resources, constantly break
 SOAR vendors will charge for integrations, no development
 Customers Need Vendor -Maintained Integrations
 D3 delivers and maintains all our integrations (zero client burden)
 Always free. Period.
IOB
TIP
IOC
ID
TTP
The WHOLE integration
▪ Partner APIs
▪ Always adding functions
How do YOU BENEFIT?
• Zero integration burden on you
• You finally get world-class
integration capabilities & experts
UNLIMITED integrations
▪ Any product, any scale
▪ D3-delivered & maintained
Event Pipeline
Integrate + Ingest
IOB
TIP
IOC
ID
TTP
Normalize, Enrich + Triage
RBAT - Risk-based autonomous triage
▪ Operationalize telemetry memory, IOC and
Identity research
▪ Distinguish true/false events
.
SIMPLIFIED security operations
▪ Centralize, normalize, de-dupe
▪ Connect insights from siloed
tools
▪ Automate Tier 1 work
How do YOU BENEFIT?
▪ Turn many low-fidelity alerts into few
high-fidelity incidents
▪ Assemble and classify incidents with
confidence
IOB
TIP
IOC
ID
TTP
How do YOU BENEFIT?
▪ Reduce incidents assigned by 90%
▪ Improve IR capabilities despite limited
availability and rising cost of SecOps
practitioners
▪ Move up the cyber kill chain -- Identify,
block, contain malicious activity earlier in
the attack cycle
CROSS-PLATFORM RESPONSE
▪ Respond across multi-platform
architecture
▪ Clear, flexible, scalable codeless
playbooks
ENTIRE CASE IN ONE PLACE
▪ Complete information presented to
analyst
▪ Timeline, relationships, evidence
tracked
Classify + Remediate
• Dismiss false positives
• Respond to genuine incidents
49 HRS. / WEEK
SAVINGS:
BEFORE
PHISHING EVENTS PER MONTH 200
FALSE POSITIVES 164
MINUTES TO CLOSE EACH FP 15
TRUE POSITIVES 36
MINUTES TO CLOSE EACH TP 30
HOURS PER WEEK 59
AFTER
3
6
200
164
36
10
ROI: Phishing Playbook (Healthcare)
ROI: Phishing Playbook (Healthcare)
TIER 1
TIER 2
3 mins
3 mins
6 mins
EUR 24.552
SAVINGS:
BEFORE
MALWARE EVENTS PER MONTH 936
FALSE POSITIVES PER DAY (32) 5h
(10min. Each)
TOTAL TIME SPENT PER MONTH (FPs) 104h
TOTAL TIME SPENT PER ANNUM (FPs) 1248h
COST OF ANALYST PER HOUR €22
COST OF MALWARE FPs PER ANNUM €27.456
AFTER
11h
936
€2.904
ROI: Malware Playbook (Manufacturing)
€22
132h
32min
(60 sec. each)
Deliver Business outcomes you actually want!
• Never miss an incident
• Reduce mean -time -to -respond
• Manage the full scope
• Uncover stealthy threats
• Prioritize behaviors/identities
• Reduce analyst burnout
• Parallelized processing
• Avoid vendor lock -in
• Centralize incident response
• Enable connectivity issues
between disparate tools
• No data and workflow silos
• Leverage vendor
provided/maintained
integrations
• Focus on real threats and not
on managing the solution
• Retain and upskill staff
• Perform automated triage
• Automate response to
validated threats
• Dismiss false -positives
• Classify more of your yellow
alerts
• Leverage full tech stack in
enrichment & response
Reducing risk Maximizing ROI Doing More With Less
Learn more about D3 Security
J ake Gattis
on Linked In
D3Security.com

More Related Content

Similar to Three Things We See & Fix in Every Struggling Security Automation Project

Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?
Tom Eston
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
 
From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018
Christophe Rochefolle
 
Meetup Microservices Commandments
Meetup Microservices CommandmentsMeetup Microservices Commandments
Meetup Microservices Commandments
Bill Zajac
 
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMGet Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Rapid7
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
Lucy Denver
 
Seamlessly Detect and React to IT-Service Related Problems
Seamlessly Detect and React to IT-Service Related ProblemsSeamlessly Detect and React to IT-Service Related Problems
Seamlessly Detect and React to IT-Service Related Problems
Dynatrace
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
Sagi Brody
 
Extreme DevOps in Fintech
Extreme DevOps in FintechExtreme DevOps in Fintech
Extreme DevOps in Fintech
Angelo Agatino Nicolosi
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
Andrew Miller
 
Fluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data ConclaveFluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data Conclave
fluturads
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
Rod Soto
 
(R)evolutionize APM
(R)evolutionize APM(R)evolutionize APM
(R)evolutionize APM
Andreas Grabner
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
RedZone Technologies
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
ITCamp
 
Código Seguro
Código SeguroCódigo Seguro
Código Seguro
Thiago Bertuzzi
 
Rapid Threat Model Prototyping methodology
Rapid Threat Model Prototyping methodologyRapid Threat Model Prototyping methodology
Rapid Threat Model Prototyping methodology
Geoffrey Hill
 
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
Soroosh Khodami
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
Quest
 

Similar to Three Things We See & Fix in Every Struggling Security Automation Project (20)

Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018
 
Meetup Microservices Commandments
Meetup Microservices CommandmentsMeetup Microservices Commandments
Meetup Microservices Commandments
 
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMGet Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Seamlessly Detect and React to IT-Service Related Problems
Seamlessly Detect and React to IT-Service Related ProblemsSeamlessly Detect and React to IT-Service Related Problems
Seamlessly Detect and React to IT-Service Related Problems
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
 
Extreme DevOps in Fintech
Extreme DevOps in FintechExtreme DevOps in Fintech
Extreme DevOps in Fintech
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
 
Fluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data ConclaveFluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data Conclave
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
 
(R)evolutionize APM
(R)evolutionize APM(R)evolutionize APM
(R)evolutionize APM
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
Código Seguro
Código SeguroCódigo Seguro
Código Seguro
 
Rapid Threat Model Prototyping methodology
Rapid Threat Model Prototyping methodologyRapid Threat Model Prototyping methodology
Rapid Threat Model Prototyping methodology
 
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

Three Things We See & Fix in Every Struggling Security Automation Project

  • 1. Three Things We See & Fix in Every Struggling Security Automation Project
  • 2. D3 Security Goog le Chronicle PAN XSOAR Sp lunk SOAR The SOAR Space IBM Qrad ar SOAR Tines Swim lane
  • 3. In the past 12 months, 73% of our customers purchased D3 to replace their existing SOAR product.
  • 4. 1. Too many SOAR projects miss the mark. 2. We know why they failed, plus what’s gotten them back on track What does that mean?
  • 5. Why do certain SOAR projects fail? Problem #1: HIDDEN BURDENS  Integ ration m aintenance Problem #2: MESSY ALERT DATA  Need to be untangled & structured Problem #3: LOW FIDELTY ALERTS  Take up valuable time
  • 6. SHINING A LIGHT ON HIDDEN BURDENS  Burdensome Integrations vs. Vendor -Maintained Integrations  “DIY” integrations suck up resources, constantly break  SOAR vendors will charge for integrations, no development  Customers Need Vendor -Maintained Integrations  D3 delivers and maintains all our integrations (zero client burden)  Always free. Period.
  • 7. IOB TIP IOC ID TTP The WHOLE integration ▪ Partner APIs ▪ Always adding functions How do YOU BENEFIT? • Zero integration burden on you • You finally get world-class integration capabilities & experts UNLIMITED integrations ▪ Any product, any scale ▪ D3-delivered & maintained Event Pipeline Integrate + Ingest
  • 8. IOB TIP IOC ID TTP Normalize, Enrich + Triage RBAT - Risk-based autonomous triage ▪ Operationalize telemetry memory, IOC and Identity research ▪ Distinguish true/false events . SIMPLIFIED security operations ▪ Centralize, normalize, de-dupe ▪ Connect insights from siloed tools ▪ Automate Tier 1 work How do YOU BENEFIT? ▪ Turn many low-fidelity alerts into few high-fidelity incidents ▪ Assemble and classify incidents with confidence
  • 9. IOB TIP IOC ID TTP How do YOU BENEFIT? ▪ Reduce incidents assigned by 90% ▪ Improve IR capabilities despite limited availability and rising cost of SecOps practitioners ▪ Move up the cyber kill chain -- Identify, block, contain malicious activity earlier in the attack cycle CROSS-PLATFORM RESPONSE ▪ Respond across multi-platform architecture ▪ Clear, flexible, scalable codeless playbooks ENTIRE CASE IN ONE PLACE ▪ Complete information presented to analyst ▪ Timeline, relationships, evidence tracked Classify + Remediate • Dismiss false positives • Respond to genuine incidents
  • 10. 49 HRS. / WEEK SAVINGS: BEFORE PHISHING EVENTS PER MONTH 200 FALSE POSITIVES 164 MINUTES TO CLOSE EACH FP 15 TRUE POSITIVES 36 MINUTES TO CLOSE EACH TP 30 HOURS PER WEEK 59 AFTER 3 6 200 164 36 10 ROI: Phishing Playbook (Healthcare)
  • 11. ROI: Phishing Playbook (Healthcare) TIER 1 TIER 2 3 mins 3 mins 6 mins
  • 12. EUR 24.552 SAVINGS: BEFORE MALWARE EVENTS PER MONTH 936 FALSE POSITIVES PER DAY (32) 5h (10min. Each) TOTAL TIME SPENT PER MONTH (FPs) 104h TOTAL TIME SPENT PER ANNUM (FPs) 1248h COST OF ANALYST PER HOUR €22 COST OF MALWARE FPs PER ANNUM €27.456 AFTER 11h 936 €2.904 ROI: Malware Playbook (Manufacturing) €22 132h 32min (60 sec. each)
  • 13. Deliver Business outcomes you actually want! • Never miss an incident • Reduce mean -time -to -respond • Manage the full scope • Uncover stealthy threats • Prioritize behaviors/identities • Reduce analyst burnout • Parallelized processing • Avoid vendor lock -in • Centralize incident response • Enable connectivity issues between disparate tools • No data and workflow silos • Leverage vendor provided/maintained integrations • Focus on real threats and not on managing the solution • Retain and upskill staff • Perform automated triage • Automate response to validated threats • Dismiss false -positives • Classify more of your yellow alerts • Leverage full tech stack in enrichment & response Reducing risk Maximizing ROI Doing More With Less
  • 14. Learn more about D3 Security J ake Gattis on Linked In D3Security.com