Automating and optimizing an existing threat detection process in an IT OT converged network
Fully automates the online brand abuse inboxes to detects brand impersonators & malicious URLs using deep inspection & packages required for take down proof (IOCs, forensics, & screenshots)
Next Generation Security Management for the Next Generation of Everywhere Health Devices
Reduce non-compliance with Prisma, EC2 and XDR combination
XSOAR is the perfect No Code platform for IT Operations...
Scheduled account creation and deletion on Active Directory using CSV files
Get up and running faster with this AWS Starter pack. Contains Classifiers and Mappers to get you going. Also contains example playbooks to run through your security incidents from GuardDuty
The purpose of this playbook is to define an automated response to Guard Duty alerts indicating malicious traffic either inbound or outbound to an AWS EC2 instance.
Can you detect malicious activities that took place a year ago? How fast?
This Incident Response Playbook can be used by the SOC teams, who need to extract and enrich domain information, perform reputation checks and take response actions based on the results
Attacker buys stolen domain names to fool 'domain age' based intelligence, can you still catch them?
This XSOAR playbook is configured to run as a time triggered job that periodically adds bad indicators from Sixgill Darkfeed to SIEM blocklist.
Can we detect cyber squatting and phishing domains to protect our employees and customers with help of XSOAR and freeware tools?
Whois and passive DNS can be really powerful
This pack enables you to grab critical forensic evidence from your windows hosts and all of this without having to install any agent and respond in realtime.
Tidy integration handle endpoints environment installation.
Enable Service Providers and Enterprise customers to provision, manage and secure their SASE customers.
This submission monitors newly issued certificates from CT logs for potential phishing campaigns hosted on external (but visually similar) domains using word matching and logo recognition.
https://www.youtube.com/watch?v=G0bQiATtEyM
A DevSecOps playbook that automates the synching of Kubernetes Network Policy with CN-Series Security Policy.
Identify data exfiltration activity from insider threats while speeding investigation and response by providing fast access to file events and metadata across physical and cloud environments.
Dramatically reduce the time and effort involved in researching suspicious URLs across digital sources with accurate, fully automated, and definitive URL analysis on demand.
Blocking Identity-Based Threats with Silverfort and Palo Alto Networks Cortex XSOAR
Efficiently and effectively analyze, prioritize, and remediate potential threats in operational technology (OT) environments, lowering the risk to business-critical facilities and processes.
1 – 24 of 53