Security teams need access to relevant data and systems to investigate and respond to security threats. In this post, we explore how to automate common G Suite security tasks.
We’re excited to announce that we’ve completed our Series-B funding to support our explosive growth, to ensure that every one of our customers continues to be successful, and to double down on our ambitious product vision.
Work with alerts generated by detections, query the log analytics backend of Azure Sentinel with data from other sources, and add threat intelligence indicators leveraging Azure Sentinel's watchlist and Tines.
Good credential management is critical when working with APIs. Learn how to Tines can dynamically authenticate to APIs using credentials stored in your existing secret management tools to ensure your continuous security.
We built Teams to allow you to invite as many other users as you want to the Tines platform, and to allow you to keep your sensitive and critical Stories separate to and private from other users.
Using AWS Lambda within your automation platform.
How to use the TheHive API together with Tines to automate the creation of alerts from phishing emails and more.
Learn how to scale your security program by creating high-fidelity alerts using Panther and automating manual remediation tasks in Tines.
Adam Maksimuk, Senior Incident Response Engineer at Auth0 explains how the Slack bot they built using Tines simplifies the management of security incidents.
Detection & Response Senior Security Engineer, Brandon Maxwell, describes how Auth0 use Tines to respond accurately at scale to security alerts.
The Tines Community Edition is a fully-featured cloud instance of Tines. It’s free to use, requires no up-front commitment, and includes a generous automation capacity.
Learn how to automate response to AWS Security Alerts using AWS Cloudwatch and SNS together with the Tines Security Automation platform.
Automate the Elasticsearch Search API to rapidly create canned and shareable threat hunting tools for you and your team.
How to subscribe to a Google Workspace endpoint and receive webhooks for important user account events. This will let us build custom workflows and tailored security responses for a range of scenarios.
A brief look at how to get connected (and authenticated) to the CrowdStrike API and enable Tines to utilize many aspects of the CrowdStrike Falcon platform.
Explore and then automate search operations for a simple Threat Hunting example. We will then turn our learnings into a fully-fledged self-service internal tool for use by colleagues (or perhaps other teams in your organization).
How to leverage some basic Qualys automation to maximize your impact and efficacy.
In the digital realm, we, as defenders, are too often on the back foot. We hunt for and react to an attacker’s movements, but what if we could tripwire certain paths and automate what happens next?
Continuous Improvement should imply 'Continuous Security', but is this really achievable? From a security operations perspective, the question then becomes, how do we automatically track, record, and address risk in near-real-time.
This is part 3 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response,
This is part 2 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response.
This is part 1 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response.
We’re excited to announce Phish.ly, a free service, built in partnership with urlscan, that allows security teams to automate the analysis of suspicious emails.
The ability of a security case management system to integrate with other systems, while itself providing a first-class API for automation, is also key in accelerating response times, enabling rapid enrichment, and fostering collaboration.