Tines
Book a demoLog inSign up
Book a demo

Solutions

By product

Connect Tines to any of your favorite products. If it offers an API, Tines connects with it.

Professional services

Accelerate your time to value, and increase your lifetime value with Tines.

By team

SecurityIT operationsInfrastructureEngineeringProduct

Tines for

Partners

Work smarter with Tines’ trusted partners.

FederalEnterpriseMSSPs

Blog

Introducing the AI Agent action
Read article →

Tines Blog →

Discover & Learn

Case studies

Discover how companies apply Tines to transform he way their teams operate.

Library

Get inspiration from hundreds of pre-built workflows.

Events
Podcast
Webinars
Bootcamps
Docs
•
API Docs

University

Learn how to build in Tines; from the basics to advanced building.

Tines Explained ↗

Answers and advice from the team that built Tines.

Customer center

Links and resources to help customers get the most from Tines.

Join the team

Careers

Join a world-class team and make an impact.

Company

About

We power the world’s most important workflows.

Tines Store ↗

Useful, beautiful products from Tines and friends.

ContactSlack Community ↗Newsroom
Blog
HomeNewsTutorialsEngineeringProduct updatesInside TinesTines@TinesSeriesAll articles

All articles

Google Workspace (G Suite) security automation

Announcing our $26M Series B

Orchestrate powerful workflows with Azure Sentinel and Tines

Continuous security: Dynamically authenticate to APIs using credentials with Tines

Introducing Teams

Leveraging AWS Lambda in Tines

Getting started with TheHive automation

Automating detection and response with Panther and Tines

Security chatops with Auth0

Detect and respond accurately to security alerts at scale with Tines and Auth0

Announcing the free Tines Community Edition

AWS security response with Tines

ELK Stack automation and the Elasticsearch API

How to subscribe to Google Workspace (G Suite) notifications

Getting connected to the CrowdStrike API

Splunk automation guide

Qualys vulnerability management automation guide

Breaking the attacker cycle with Thinkst Canary and Tines

Continuous security with Snyk

Account compromise (Part 3): Respond and protect with a multi-pronged automated approach

Account compromise (Part 2): Enrich alerts, avoid toil, and regain control during incidents

Account compromise (Part 1): Breaches are inevitable and early detection is crucial

Phish.ly: Democratizing suspicious email analysis with Tines and urlscan

What to consider when investing in case management for your security team

←  Prev
1234…789…1314151617
Next  →

Built by you,
powered by Tines

Book a demoSign up free

Already have an account? Log in.

Platform

  • Meet the platform
  • Storyboard
  • Cases
  • Workbench
  • AI in Tines
  • Build apps
  • Formulas
  • What’s new
  • Pricing

Solutions

  • By product
  • Security
  • IT operations
  • Infrastructure
  • Engineering
  • Product
  • Partners
  • Professional services
  • Federal
  • Enterprise
  • MSSPs

Resources

  • Blog
  • Case studies
  • Library
  • University
  • Tines Explained↗
  • Customer center
  • Events
  • Podcast
  • Webinars
  • Bootcamps
  • Docs
  • API
  • Get certified
  • YDWWT

Company

  • About us
  • Careers
  • Tines Store↗
  • Contact
  • Newsroom
  • Brand assets↗
  • Legal and privacy
  • Security
  • Trust center↗

Connect

  • Slack Community↗
  • LinkedIn↗
  • Twitter↗
  • YouTube↗

RSS

  • Blog↗
  • Product updates↗
  • Library↗
  • Self-hosting releases↗

© Tines