Tines
Book a demoLog inSign up
Book a demo

Get to know Tines

Meet the product

Explore our core capabilities to transform your workflows.

Features & capabilities

Cases

Automation for the threats you know, cases for the ones you don’t.

Workbench

Take action and access your data in real time using AI chat.

AI in Tines

Leverage the power of AI in your most important workflows.

Build apps

Keep humans in the loop with apps built with Tines pages, directly in your workflows.

What’s new?

Discover our latest updates and releases.

Solutions

By product

Connect Tines to any of your favorite products. If it offers an API, Tines connects with it.

Professional services

Accelerate your time to value, and increase your lifetime value with Tines.

By team

SecurityIT operationsInfrastructureEngineeringProduct

Tines for

Partners

Work smarter with Tines’ trusted partners.

FederalEnterpriseMSSPs

Blog

Tines joins Defence Cyber Marvel 4 in South Korea
Read article →

Tines Blog →

Discover & Learn

Case studies

Discover how companies apply Tines to transform he way their teams operate.

Library

Get inspiration from hundreds of pre-built workflows.

Events
Podcast
Webinars
Bootcamps
Docs
•
API Docs

University

Learn how to build in Tines; from the basics to advanced building.

Tines Explained ↗

Answers and advice from the team that built Tines.

Customer center

Links and resources to help customers get the most from Tines.

Company

About

We power the world’s most important workflows.

Careers

Join a world-class team and make an impact.

Stay in touch

Contact

Details for support and general enquiries.

Slack Community ↗

Join our community of builders and customers on Slack.

Newsroom

Updates and resources for the press.

Blog
HomeNewsTutorialsEngineeringProduct updatesInside TinesTines@TinesSeriesAll articles

All articles

How to subscribe to Google Workspace (G Suite) notifications

Getting connected to the CrowdStrike API

Splunk automation guide

Qualys vulnerability management automation guide

Breaking the attacker cycle with Thinkst Canary and Tines

Continuous security with Snyk

Account compromise (Part 3): Respond and protect with a multi-pronged automated approach

Account compromise (Part 2): Enrich alerts, avoid toil, and regain control during incidents

Account compromise (Part 1): Breaches are inevitable and early detection is crucial

Phish.ly: Democratizing suspicious email analysis with Tines and urlscan

What to consider when investing in case management for your security team

Crowdsourcing detections for the suspicious and impossible

How to figure out what's next, with help from PagerDuty and Tines

Upload to AWS S3 for hybrid analysis with AI

Secure your productivity with SentinelOne and Jira Service Desk

Insider threat hunting with Datadog, CrowdStrike, and Tines

Partner perspectives: Faster response with Carbon Black and Tines

Subscribing to notifications in MS Graph

Automate the analysis of EML files

TinesBot: Sharing community threat intelligence

Introducing: Story Runs

Announcing the Tines Storyboard

Introducing Send-to-Story

Introducing the Tines Admin API

←  Prev
1234…789…13141516
Next  →

Built by you,
powered by Tines

Book a demoSign up free

Already have an account? Log in.

Product

  • Meet the product
  • Pricing model
  • Cases
  • Workbench
  • AI in Tines
  • Build apps
  • Formulas
  • What’s new

Solutions

  • By product
  • Security
  • IT operations
  • Infrastructure
  • Engineering
  • Product
  • Partners
  • Professional services
  • Federal
  • Enterprise
  • MSSPs

Resources

  • Blog
  • Case studies
  • Library
  • University
  • Tines Explained
  • Customer center
  • Events
  • Podcast
  • Webinars
  • Bootcamps
  • Docs
  • API
  • Get certified
  • YDWWT

Company

  • About us
  • Careers
  • Contact
  • Newsroom
  • Brand assets
  • Legal and privacy
  • Security
  • Trust center

Connect

  • Slack Community
  • LinkedIn
  • Twitter
  • YouTube

RSS

  • Blog
  • Product updates
  • Library
  • Self-hosting releases

© Tines