AlienVault USM Anywhere is a cloud-based security management solution that promises to accelerate and centralize threat detection, incident response, and compliance management for cloud, hybrid cloud, and on-premises environments. The vendor says that USM Anywhere includes purpose-built cloud sen...
Incident Response Platforms
Incident Response Platform Overview
What are Incident Response Platforms?
Incident response (IR) platforms guide countermeasures against a security breach and deploy preplanned, automated threat responses. Automated tasks can include threat hunting, anomaly detection, and real-time threat response via a playbook. After a breach, IR platforms can generate incident reports for analysis. Through IR software incident response may be planned, orchestrated and logged in accordance with policy, and best practice.
IR platforms may provide a response playbook designed to help contain and remediate breaches. Playbooks, or runbooks, are planned workflows that guide or automatically orchestrate responses to threats in real-time. These playbooks can be triggered by detecting known threats or incident types, and run in accordance with policy or SLA. For instance, the playbook may escalate a threat level if a high priority device is infected.
Through automated orchestration, incident response platforms help response teams minimize the time and resources required to manage incidents. IR platforms enable remediation teams to work on a broader scale and can identify and remediate network events that may have been missed due to a lack of resources.
Features of Incident Response Platforms
Incident response platforms may offer the following features:
Knowledgebase of regulations and best practice response plans
SIEM data ingestion, anomaly detection
Correlate data from SIEM, endpoints, and other sources
Pre-built customizable standards-based incident response playbooks
Automated response to security alerts
Process tree & timeline analysis to identify threats
Attack behavior analytics, for real-time detection & forensics
Access & credential lockdown, network access analysis
Isolation of infected systems, malicious files
Automate escalation to assign tasks to the right people
Service-level agreement (SLA) tracking and management
Forensic data retention for post-incident reporting, analysis
Remediation planning & process automation
Privacy breach reporting policy (e.g. GDPR) preparation
Compliance report issuance
Pricing Information & Availability
Incident response is very often offered as a service by cybersecurity outsourcing specialists. However strictly technology-based IR Platforms like those below are available to SOCs and in-house enterprise IT security teams. These offerings are often part of a suite from vendors specializing in cybersecurity software. In this case, they may be bundled with endpoint protection and antivirus applications from the same vendor. Vendors of IR software will boast integrations with popular SIEM applications, or other IT automation applications. Incident response platforms
share featural overlap with SOAR platforms (for Security Orchestration, Automation and Response), such as automated playbooks.
Incident Response Products
Listings (1-25 of 32)
CrowdStrike's Falcon line of software includes Falcon Endpoint Protection, a complete antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating.
IBM offers the Resilient Incident Response Platform, a security orchestration platform emphasizing automation of response to security alerts, incident visualization via software and training simulation.
Cybereason delivers a proprietary endpoint protection platform that automatically uncovers malicious operations and provides visual tools to observe potential threats and prevent their progress in a what they boast is a single-click remediation process.
Carbon Black offers Cb Response, an IR and threat hunting solution. Cb Response gives users visibility through continuous recording of all activity on their endpoints. Capturing all threat activity, users can visualize the attack kill chain to hunt threats in real time allowing them to respond an...
Italian company DFLabs offers IncMan, their flagship security automation and orchestration platform emphasizing rapid incident detection, a higher proportion of incidents receiving response, and faster incident response time.
EnCase Endpoint Security is an endpoint threat detection and incident response cyber security application developed by Guardian Software and now owned and supported by OpenText since the acquisition in summer 2017.
German company Derdack offers Enterprise Alert, an incident response system alerting operations teams working in IT, transportations, facilities, and other areas.
Basis Technology in Cambridge, MA offers Cyber Triage, an incident response software emphasizing the rapid and accurate collection of endpoint data, touted as better and more comprehensive than antivirus and ideal for non-forensics experts.
Everbridge's IT Alerting system is an incident response system allowing deployment of a predefined business process to alert personnel and create the necessary bridging and orchestration to address the threat.
Vancouver company D3 Security offers their incident response suite, featuring an incident knowledgebase and response templates, built-in and configurable workflow with task assignment and assignable threat alerting threshold, among other features.
The flagship product from Resolve Systems in Irvine is their incident response platform, which features automated security and threat diagnosis, an incident tracking dashboard, and automated remediation workflow.
Demisto in Cupertino offers a comprehensive incident response and cyber defense orchestration platform, featuring a virtual "playbook," a workflow designer, and a reporting dashboard for incident review.
Microsoft now offers an incident response platform via its 2017 acquisition of Israeli cyber security company Hexadite, the developer of Hexadite Automated Incident Response Solution (Hexadite AIRS), which uses AI designed to model optimal cyberthreat response behavior and provide an automated re...
Cylance, a Blackberry company since the early 2019 acquisition, offers a range of cyber security solutions, including CylanceOPTICS, an incident response solution emphasizing fast endpoint detection and automated smart threat response, root cause and context analysis, and other features.
In addition to their incident response service, Rapid7 offers InsightIDR, a relatively broad offering covering SEIM and incident response automation.
FireEye Security Orchestrator is an incident response platform, emphasizing its centrality creating console that pulls data from disparate systems and provides real-time threat-response guidance.
Ayehu offers eyeShare, their IT automation platform powered by machine learning to support rapid incident response and process automation.
CyberSponse in Arlington offers their flagship cybersecurity orchestration and incident response platform that supplies automation and intelligence to threat containment and elimination.
Siemplify provides a holistic security operations platform that empowers security analysts to work smarter and respond faster. Siemplify uniquely combines security orchestration and automation with patented contextual investigation and case management to deliver intuitive, consistent and measurab...
New York based Cynet offers their intrusion detection and threat response platform Cynet 360, which monitors endpoints and networks, correlates and analyzes suspicious behavior, and provides automated remedial protection and manual remediation guidance to contain and eliminate cyber attackers.
Exabeam headquartered in San Mateo, offers their security intelligence and SIEM platform, the Exabeam Security Intelligence Platform, featuring unlimited security data collection (Exabeam Data Lake), threat detection via Exabeam Advanced Analytics, security response and orchestration via Exabeam ...
Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators the ability to automatically retract threats delivered to employee inboxes and emails that turn malicious after delivery to quarantine. It is also a powerful solution to retract messages sent in error as wel...
Proofpoint Threat Response collects and analyzes threat forensic data to support orchestration of incident response.
With CenturyLink® Analytics and Threat Management services, you get the visibility needed to proactively identify potential security issues and respond to them before they cause harm. And with our event and incident management and response services, you can ease the burden of having to develop a...