Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

SlashNext Launches URL Analysis & Enrichment to Automate Phishing Incident Response

SlashNext, a leading provider of real-time anti-phishing and incident response solutions, today announced an automated phishing incident response (IR) and threat hunting solution with accurate, run-time analysis of suspicious URLs on-demand and at scale. SlashNext URL Analysis & Enrichment is purpose-built for IT security teams, security vendors, MSSPs and MDRs to add automated phishing URL analysis to phishing IR playbooks, network log threat hunting, and more.

“With security teams stretched thin and drowning in alerts, they need more efficient ways to identify and respond to genuine threats,” said Atif Mushtaq, CEO and founder of SlashNext. “Our URL analysis and enrichment service detects phishing threats, including those previously unknown, with unmatched precision. This enables teams to increase their automated detection and incident response capabilities with fewer resources.”

Recommended AI NewsXeeva Unveils Significant Enhancements Across Its Indirect Spend Management Solutions

Increased cyber awareness trainings and single-click reporting of suspicious emails by users have created a new problem for Security Ops Center (SOC) and Incident Response (IR) teams – effectively managing a growing abuse inbox with limited resources. Automating URL analysis with SOAR playbooks can save huge amounts of time and resources, but many available threat feeds and URL lookup services still have shortcomings. The biggest problems include the return of false negatives on newer threats and for phishing pages on compromised websites. Other barriers involve URL obfuscation techniques, redirects and multi-stage attacks, along with fake log-in pages and inconclusive threat risk scores rather than accurate, definitive results.

Recommended AI NewsLeanData Unveils New Go-to-Market Analytics Solution to Help Unleash Greater Revenue-Generating Potential in B2B

Related Posts
1 of 33,664

SlashNext now provides SOC and IR teams with a scalable, cloud-based solution that is purpose-built for accurate, definitive results and enrichment to speed the execution of phishing IR playbooks, analysis and reporting. In combination with pre-built integration apps for leading SOAR platforms, SlashNext can dramatically reduce the time, effort and cost of phishing IR.

Benefits of the SlashNext URL Analysis for Phishing Incident Response solution include:

  • Reducing the time and cost needed to research suspicious URLs.
  • Increasing productivity by freeing up IR teams from performing costly manual research.
  • Decreasing the workload and risk associated with finding false negatives and false positives.
  • Improving security with prompt identifications and incident responses for genuine phishing emails.

URL Analysis & Enrichment is also easily accessed via integration apps with leading vendors for Security Orchestration, Automation and Response (SOAR), Security Information and Event Management (SIEM), and Threat Intelligence Platforms (TIP), including ThreatConnect, Cortex XSOAR (previously Demisto), Splunk Phantom, Anomali and more. This network includes global hardware sensors that inspect billions of daily Internet transactions in real-time. The system also incorporates spam traps and real-time certificate transparency logs to root out suspicious ad networks and passive Domain Name System (DNS) sensors.

SlashNext solves IR and threat hunting problems by providing accurate phishing URL analysis on-demand and at scale, delivering access to millions of accurate phishing indicators of compromise (IoCs), including webpage screenshots, text and HTML code. Using SEER™ patented behavioral phishing detection technology, SlashNext deploys millions of virtual browsers to detect previously unknown threats with unmatched accuracy, dynamically analyzing server behavior and page contents, including images, texts, logos and more. Mature machine learning algorithms enable definitive, binary verdicts with greater than 99.95% precision.

Recommended AI NewsWeyland Tech’s AtozGo Expands Popular Food Delivery Service to Residential Consumers in Jakarta

Comments are closed, but trackbacks and pingbacks are open.