BREAKOUT SESSION Palo Alto Networks
Cortex Secures The Future – Demisto – The Operating System for Enterprise Security – A SOC’s Challenges
In this landscape of ever evolving and complex threats, SOC employees face challenges across the board. Tier-1 analysts are drowning in alerts and performing time-consuming tasks like weeding out false positives, actioning repetitive responses, and keeping up with alerts from disparate security tools.
Tier-3 analysts are faced with the challenge of finding contextual needles in haystacks of noise. They find it difficult to coordinate the multiple security products at their disposal in the most effective way. Amidst this workload, they can’t find time to train junior analysts and bring them up to speed.
SOC Managers have trouble in quantifying the ROI that security tools bring to their SOC. They also constantly face SLA pressures in the face of incomplete metric tracking and documentation. Finally, the threat of the analyst skills gap always hangs over their head; any senior analyst leaving the organization can result in a fatal loss of expertise and a step back for the SOC.
This is where Demisto Enterprise comes in – a comprehensive Security Orchestration, Automation, and Response (SOAR) platform that combines incident management, intelligent automation and orchestration, and interactive investigation to serve security teams across the incident lifecycle.
Demisto, a Palo Alto Networks company, is a comprehensive Security Orchestration, Automation, and Response (SOAR) platform that combines playbook orchestration, incident management, and interactive investigation to serve security teams across the incident lifecycle. With Demisto, security teams can standardize processes, automate repeatable tasks and manage incidents across their security product stack to improve response time and analyst productivity.
Presented by: Noa Shilo, Demisto Product Manager, Palo Alto Networks
Noa served as an officer in the IDF, computer science graduate from the Israeli Thechnion – Israel Institute of Technology. She led a team of cyber security analysts and held a position as product manager in both offensive and defensive cyber security companies for the past 10 years.