Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

RiskIQ PassiveTotal Integrates Directly with Microsoft Security Solutions

RiskIQ, a global leader in attack surface management, announced that RiskIQ PassiveTotal now integrates directly with Microsoft Defender for Endpoint and Azure Sentinel. The integration brings Defender for Endpoint and Azure Sentinel alert data directly to the PassiveTotal threat hunting platform, enriching threat infrastructure to show pertinent SIEM alerts and endpoint details alongside RiskIQ’s rich Internet Intelligence.

RiskIQ PassiveTotal aggregates data from the entire internet, absorbing intelligence to identify threats, attacker tools and systems, and indicators of compromise (IOCs). Joint customers of RiskIQ and Microsoft can now see SIEM alerts and endpoint communications overlaid directly atop this data in a single interface. As users pivot between data sets in PassiveTotal, corresponding SIEM and endpoint data are automatically searched and presented to instantly show if a threat has been in their local environment.

Recommended AI News: New Era of Supercomputing and AIOps: Lenovo and SAP Join Hands to Sweep Past “IT Survival Mode”

With both internal and external intelligence instantly correlated in one place, incident responders will accelerate their investigations, respond to incidents with more confidence, and be more proactive in addressing threats.

“In incident response, speed is everything. When external internet data and internal endpoint data are automatically combined and correlated, incident responders can immediately assess suspicious activity,” said RiskIQ Vice President of Strategy Brandon Dixon. “This integration gives incident response a powerful boost, saving analysts precious time and effort.”

Related Posts
1 of 31,692

RiskIQ and Microsoft joint customers can enable integrations for both Microsoft Defender for Endpoint and Azure Sentinel separately in their organization’s account settings in RiskIQ PassiveTotal. Once enabled, users will see a new “Microsoft” tab within their PassiveTotal search results. This tab splits into multiple sub-tabs that will be populated based on the product enabled.

Recommended AI News: NVIDIA Smashes Performance Records on AI Inference

“RiskIQ’s massive data collection capabilities enable incident responders to act quickly and with conviction,” said Alon Rosental, principal group program manager, Microsoft Defender for Endpoint at Microsoft Corp. With this integration which ties together internal endpoint data with external infrastructure and layers on pertinent OSINT, the paradigm for time to response and remediation has certainly shifted.”

Microsoft’s cloud-native security solutions, when combined with RiskIQ, have the potential to reshape how security teams operate, seamlessly integrating RiskIQ’s comprehensive external visibility with advanced threat detection, AI, and orchestration. Those looking to get started with this integration can register for the Community edition and input their Microsoft API credentials to see the Microsoft tab show up within the interface.

Recommended AI News: TechSee Closes $30 Million Series C Investment Round

Leave A Reply

Your email address will not be published.