SANTA CLARA, Calif. —AttackIQ announced the integration between the Microsoft Azure Sentinel cloud-native security information and event manager (SIEM) platform and the AttackIQ Security Optimization Platform.
“We’re delighted to announce AttackIQ’s integration with Microsoft Azure Sentinel, and the opportunity to enable Azure Sentinel users to test and validate their detection pipeline and ultimately fine-tune security processes across their organization,” said Dariush Afshar, vice president of platform and business development, AttackIQ. “With our integration with Azure Sentinel, Microsoft customers now have another powerful tool for optimizing their security investments, whether that be their Microsoft 365 Defender investments like Microsoft Defender for Endpoint, or third-party security products, such as nextgen firewall, that feed Azure Sentinel.”
“Microsoft Azure Sentinel offers customers a robust platform for log aggregation, detection, and alerting, while the AttackIQ platform enables customers to measure the performance of those capabilities and improve that performance over time,” said Eric Burkholder, senior program manager, Azure Sentinel.
The security optimization capabilities of the AttackIQ platform provide Azure Sentinel users with essential tools to increase effectiveness of detection and investigation pipelines. The platform utilizes the MITRE ATT&CK database of known attacker tactics, techniques, and procedures (TTPs) to help customers assess the ability of their security stack to prevent, detect, and contain real-world threats. Security teams are able to confirm events are detected and/or prevented by deployed security technologies, confirm that detection and prevention messages are properly forwarded to Azure Sentinel, test built-in and custom queries and alert rules, and exercise the actions defined in Azure Sentinel Playbooks.
The Azure Sentinel SIEM integrates with the AttackIQ Security Optimization Platform operates by using machine learning models trained on trillions of daily signals and allowing customers to optimize for their own needs with tailored detections and threat intelligence.
Report Abusive Comment