CUPERTINO, Calif., and SAN JOSE, Calif., June 28, 2017 — Demisto, Inc., an innovator in Security Automation and Orchestration technology, and Vectra Networks, the leader in automating the hunt for in-progress cyber attacks, today announced the availability of the Vectra Active Enforcement application for Demisto. The integrated solution enables security teams to quickly expose a variety of hidden cyber-attack behaviors, pinpoint host devices at the center of an attack, and block threats before data is compromised or stolen.
The success of security teams often boils down to the speed of incident response. Sophisticated attackers thrive by staying under the radar and detection often requires hours to days of manual threat hunting by highly trained security analysts.
“Demisto shares Vectra’s approach of augmenting cybersecurity teams with the most advanced artificial intelligence to create a natural partnership,” said Mike Banic, vice president of marketing at Vectra.
Vectra Active Enforcement for Demisto turns automated threat detections into action through a seamless combination of security orchestration, incident management and interactive investigation. Integration with other leading security solutions helps stop attacker traffic and can quarantine compromised host devices. Collaboration and forensic capabilities provide efficiency and advanced investigation features by automating data enrichment and analysis with Demisto scripts.
“The combined solutions transform vast amounts of threat data into actionable answers, empowering security analysts to find and resolve issues quickly while conserving time, money and talent,” said Rishi Bhargava, co-founder and vice president of marketing at Demisto.
Other key features of the integrated solution include:
?EU? Collaborative cybersecurity, ensuring faster, more effective threat investigations
?EU? Improved investigative efficiency by automating data enrichment and analysis
?EU? Selective trigger response actions based on threat type, risk and certainty
?EU? Combined automated behavior-based threat analysis with real-time enforcement
?EU? High-level of automation,…
Source: Mobile Tech Today