Loading...
You are here:  Home  >  Data Education  >  Big Data News, Articles, & Education  >  Big Data News  >  Current Article

Preempt Introduces Fully Adaptive Cyber Security Integration with Demisto

By   /  June 25, 2018  /  No Comments

A new press release states Preempt, a company revolutionizing the prevention of cyber security breaches and internal threats, in partnership with Demisto, an innovator in Security Orchestration, Automation and Response (SOAR) technology, have announced a fully adaptive approach to cyber security and security operations that spans advanced threat prevention, incident response, and security orchestration.

Through this integration, Demisto and Preempt are delivering the first end-to-end integration of real-time, identity-based threat prevention with security automation and orchestration. More than a simple one-way integration, Demisto and Preempt fully leverage the adaptive ability of both platforms to seamlessly blend and coordinate threat prevention, policy enforcement, incident response, and orchestration into a unified process.

“Any organization concerned about cyber attacks or insider threats usually has a limited incident response and security staff,” said Dan Sarel, co-founder and VP, Product at Demisto. “Traditional one-way integrations have been a good start, but adaptive two-way cooperation between threat prevention and security automation opens up new opportunities for organization so that they can make smart, business-driven decisions automatically in real-time without facing an onslaught of notifications, minimizing the need for human intervention and human error.”

To meet these cyber security challenges, an organization can combine the adaptive threat prevention capabilities of the Preempt Platform with the security orchestration features of Demisto to automate and accelerate incident response and reduce business risk. It also helps with effectively and proactively reducing noise which can free up time to allow security analysts to focus on important and advanced attack patterns.

Read more at PR Newswire.

Photo credit: Preempt

You might also like...

Case Study: Unilog Leverages Data Preparation to Monetize Upstream Data

Read More →
We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept