New York City, NY, USA
Mar 12, 2021   |  By Natalie Page
The vast majority of modern businesses rely heavily on optimized computer networks utilizing shared drives and remote connections. The threat that ransomware poses to this network configuration is second to none. 2020 was tough. The world found itself in unfamiliar territory. We faced the challenges of remote working and while doing so ransomware found a gateway to thrive.
Mar 4, 2021   |  By Dan Kaplan
This installment of “Sitdown” shifts from the end-user world to the vendor world, where we schmooze with Ingalls Information Security’s Cyrus Robinson, whose upbringing exposed him to computers and later a stint in the U.S. Air Force got him hooked on cybersecurity.
Feb 25, 2021   |  By Nimmy Reichenberg
Welcome to Part 4 of our series examining how to select the best security, orchestration, automation and response (SOAR) solution for your business. In Part 1, we defined what SOAR platforms set out to do at their core. In Part 2, we listed the key core competencies that you can expect to find in a SOAR solution. In Part 3, we dove into one of those core competencies: case management. Part 4 will focus on the bread and butter of the SOAR category: playbooks.
Feb 24, 2021   |  By Dan Kaplan
The modern SOC is a hybrid SOC, featuring a blend of in-house and outsourced professionals. For the latter group, security operations is their business, and MSSPs have discovered that SOAR technology provides a slew of benefits, including process consistency, speed and efficiency for analysts, and client collaboration and transparency.
Feb 19, 2021   |  By Dan Kaplan
The depressingly depleted talent pool in the information security profession is what typically draws most of the attention when personnel and skills challenges are raised, but less talked about is the length of time it takes to backfill a position. Industry group ISACA has found that the average cybersecurity position lies vacant for up to six months, with positions like security analyst one of the most difficult to find suitable candidates for (partially because of issues like burnout).
Feb 10, 2021   |  By Dan Kaplan
Ransomware is unlike most threats security teams face because it is virtually impossible to prevent and uses native processes, built into your trusted operating systems, to rapidly spread. So considering the speed and extent by which ransomware can topple an organization, what is the best approach for addressing this seemingly existential threat? We asked Forrester Research’s Joseph Blankenship and Chase Cunningham to share insights as part of a four-part series with Siemplify.
Feb 2, 2021   |  By Dan Kaplan
Security operations professionals are constantly being forced to adapt, whether it is to the latest threat evolution, adversary techniques or changing attack surface. Until this year, they had at least one reliable routine: the ability to collaborate in person. Then COVID-19 disrupted the status quo and forced security analysts, engineers and others to remote settings. Teleworking naturally delivered havoc to security operations programs and teams, but to what extent?
Feb 1, 2021   |  By Dan Kaplan
Security operations teams that continue to rely on manual processes are squarely sitting behind the proverbial eight ball. The times are a-changing – only hurried along by the COVID-19 pandemic – and Forrester’s Joseph Blankenship and Chase Cunningham are here to share their perspective on the future of the SOC as part of a four-part series with Siemplify.
Jan 27, 2021   |  By Nimmy Reichenberg
Batman and Robin. Peanut butter and jelly. Bernie and his mittens. Some things just go better together. Security orchestration, automation and response (SOAR) and threat intelligence platforms (TIPs) are two backbone technologies of every modern security operations team. In fact, Gartner views TIP as one of the components that make up a complete SOAR platform.
Jan 26, 2021   |  By Dan Kaplan
Our next edition of “Sitdown with a SOC Star” catches up with Adva Harosh, SOC manager at First Quality, a Long Island, N.Y.-based manufacturer of consumer hygiene products. Adva discusses her love for spreadsheets, why no podcast or book can match the value of a strong peer group, hijinx at the expense of her mom, and the story of a routine-looking threat that she just had to pursue further. Enjoy the Q&A!
Mar 30, 2021   |  By Siemplify
Joseph Blankenship and Chase Cunningham of Forrester Research joined Siemplify for a four-part video series. In the fourth and final part, the pair discusses the role of SOAR for service providers, how they can evaluate their own success, and what selection criteria should look like for end-users shopping for an MSSP – especially in the era of more demanding customers and the death of the “black-box” MSSP model.
Mar 9, 2021   |  By Siemplify
Considering the speed and extent by which ransomware can topple an organization, what is the best approach for addressing this seemingly existential threat? Forrester Research’s Joseph Blankenship and Chase Cunningham shared insights with Siemplify CMO Nimmy Reichenberg as part of a four-part series with us.
Feb 23, 2021   |  By Siemplify
Enjoy this sizzle reel recapping the inaugural SOCstock. Dubbed “the grooviest event for security operations,” SOCstock is a world-class virtual event featuring renowned and respected infosec speakers providing attendees with the very latest security operations trends, research and best practices. But it isn't just about what was happening on stage. SOCstock also features funky swag, far-out contests, talented entertainers and more (no mud involved).
Feb 23, 2021   |  By Siemplify
What happens when two revered security frameworks get a dose of SOAR? Forrester's Joseph Blankenship and Dr. Chase Cunningham join Siemplify CMO Nimmy Reichenberg to assess the role that automation & orchestration play in the Zero Trust and MITRE ATT&CK models.
Feb 10, 2021   |  By Siemplify
In the first of a four-part video series hosted by Siemplify, two experts from Forrester Research examine the inherent value of automation for security operations teams, collaboration challenges intensified by remote working and why infosec talent shortage may have more to do with an excess of security tools than a dearth of skilled personnel.
Jan 26, 2021   |  By Siemplify
ThreatFuse is an add-on module to the Siemplify SOAR platform, powered by Anomali, which ingrains threat intelligence across the entire detection and response lifecycle. From enrichment with real-time threat indicators, through threat hunting and intelligence sharing, security analysts can validate, investigate and respond to threats with unprecedented speed and precision.
Jan 20, 2021   |  By Siemplify
Take a brief tour of the newly revamped Siemplify Marketplace, a content hub designed from the ground up for rapid time to value, making SOAR implementation faster and simpler than ever before.
Nov 24, 2020   |  By Siemplify
Hear from U.K.-based MSSP Longwall Security describe how it turns to SOAR from Siemplify to expeditiously close hundreds of thousands of events, literally wowing customers and allowing its security experts to leave the menial work to automation technology as its human experts hunt for threats and respond to active incidents.
Nov 17, 2020   |  By Siemplify
Amanda Fennell, CSO of Relativity, provider of e-discovery software, discusses how her security team led the company’s drive to remote friendliness, the importance of empowering the user during the WFH shift, the process of cutting down on the “white noise” of alerts and efforts made to keep SOC morale high and drama free.
Oct 30, 2020   |  By Siemplify
Connectors are the component that ingest external data into the Siemplify Security Operations Platform. This video shares an example using a Gmail account.
Jan 20, 2021   |  By Siemplify
Business guru Peter Drucker is famous for saying that you can't manage what you don't measure, and those words ring especially true in the security operations center (SOC). The SOC is home to great responsibility to the business, as it sits as ground zero for threat detection and response. But it also can be unwieldy due to a number of challenges, including an overreliance on manual processes, disparate sources of information and intelligence, and a lack of skills and people power to handle all the alerts and cases coming through.
Oct 12, 2020   |  By Siemplify
While opportunity has never looked brighter for MSSPs, they are still under obligation to solve the very security challenges so many enterprises and SMBs count on them for, all while recognizing that each client environment requires unique attention. This is no easy feat, especially as competition grows and customer expectations become more exacting.
Sep 1, 2020   |  By Siemplify
One of the big reasons security operations centers excel at what they do is because they are a centralized unit charged with monitoring, assessing and addressing activity across a company's IT infrastructure. But with many SOCs shifting to remote arrangements, this cohesion has come undone. Yet, you and your team must charge on, and the good news is you can overcome any bumpy adjustment period by ensuring you have all of your bases covered.
Aug 19, 2020   |  By Siemplify
Tabletop exercises are a proven, hands-on way to learn how your team will handle unforeseen cyber emergencies while also helping to clarify roles and responsibilities. Although many existing online resources provide the basic elements of simulating a cyber incident, not as available is an understanding of what is required to experience true success. This white paper shares five master tactics for winning at tabletop exercises, courtesy of Siemplify security operations experts who have personally performed these crisis preparation activities, uncovering secrets you may not have considered.
Mar 17, 2020   |  By Siemplify
The managed security services market is growing - and for good reason. Within businesses, skills are short, budgets are tight and there is more surface to cover than ever thanks to the rise of mobility, cloud and connected devices. As a result, they are looking for a partner that can help them offset some or all of their security responsibilities. Cue the rise of the MSSP.
Jun 26, 2019   |  By Siemplify
No business is immune from digital attacks, making the ability to detect and respond to cyber incidents more important than ever. And that's where security operations come in to play. Because they are built around monitoring, analysis and triage, SecOps have become the centerpiece of an organization's security program.
Feb 24, 2019   |  By Siemplify
MSSP security operations teams face unique challenges in addition to those that plague the average SOC. Siemplify's security orchestration and automation buyer's guide outlines the features and outcomes MSSPs should prioritize when considering a security orchestration solution.
Feb 24, 2019   |  By Siemplify
Acquire security orchestration and automation best practices, tried and tested by our global customer base. Developed by our in-house experts who provide guidance to security teams worldwide, these playbooks facilitate and integrate alerts handling and incident response plans. These are the earliest in a series that continues to grow over time.
Feb 1, 2019   |  By Siemplify
Security Orchestration, Automation and Response platforms are rapidly becoming a must-have solution for SOC teams. Understanding the business case is a key step to implementing SOAR in your organization.

Security Orchestration, Automation and Incident Response. Respond faster and work smarter with the leading security operations platform for enterprises and MSSPs.

The Siemplify platform is a holistic purpose-built security orchestration and security automation workbench that empowers security operations teams to work smarter and respond faster. From triage and investigation to collaboration and remediation, Siemplify streamlines and enriches your security operations.

What Can Siemplify Do for You?

  • Manage your SOC from a single workbench: Orchestrate, automate and collaborate across all your existing tools and technologies, with more than 180 integrations out of the box.
  • Automate data gathering and alert triage: Automatically bring together related alerts from across your toolset into a single case for investigation, triage, and remediation.
  • Create standard, consistent processes: Create standard, automated processes using a drag-and-drop playbook builder to retain internal knowledge and shorten response time.
  • Visualize a full threat storyline: Context and data enrichment helps security teams quickly visualize the who, what and when of a security event to expedite investigation and make better decisions.
  • Enhance teamwork and information sharing: Harness the full power of your team with integrated chat for day-to-day security analyst collaboration and an interactive War Room for cross-functional collaboration to expedite the remediation of security incidents.
  • Measure, report and continuously improve: Customize dashboards to define and monitor security operations KPIs and create automated reports to drive continuous improvement.

The security operations workbench. The way you would build it.