USE CASE:

Alert Triage

What is alert triage?

Alert triage is the process of efficiently and accurately going through alerts and investigating them to determine the severity of the threat and whether or not the alert should be escalated to incident response.

The challenge:

Analysts are inundated by the number of alerts that require human attention, generated by noisy SIEM rules and default defense infrastructure.

In an attempt to reduce the volume and velocity of security alerts they must tackle on a daily basis, analysts apply external threat data and threat intelligence feeds directly to the SIEM, but challenges continue for two main reasons. First, the amount of external threat data is staggering. Sending all of this data directly to the SIEM for correlation results in tons of non-contextual alerts, each of which requires significant work by an analyst to research. Second, there is a lack of decision support capabilities in current tools to provide additional context and understanding to determine relevance, before applying threat intelligence feeds directly to the SIEM. Prioritization is imperative to focus and determine the appropriate next actions to take during the alert triage process.

Learn how to use ThreatQ for alert triage

Take a quick look at how alert triage with ThreatQ can
help you reduce noise and focus on the threat.
If you like what you see, schedule a demo for a deeper dive.

How ThreatQ meets the alert triage challenge

1 SIEM alert
2 Visualize alert relationships
3 Add context
4 Investigate further?
5 Publish investigation and add teams for collaboration
6 Escalate to incident response
Alert Triage | ThreatQ Alert Triage | SIEM alert Alert Triage | Visualize alert relationships Alert Triage | Add context Alert Triage | Investigate further? Alert Triage | Publish investigation and add teams for collaboration Alert Triage | Escalate to incident response
Customer-defined Scoring Prioritize threat data automatically, understand why it is relevant and take action faster and with greater confidence.
Learn more >
Open Exchange Integrate ThreatQ with existing security tools, teams and workflows through standard interfaces to extend their value, knowledge and efficacy.
Learn more >
Threat Library™ Search Quickly research and understand context behind possible threats by keyword, attribute and object name. Group and pivot on associated data and quickly take bulk actions across a full group of data.
Learn more >
Watchlist Add specific IoCs, adversaries or other threat related data to your dashboard to highlight changes.

The ThreatQuotient approach to alert triage

Stop the useless alerts before they happen by ONLY feeding threat intelligence that is relevant to the organization into the SIEM for correlation. Machine-to-machine communication allows the SOC analyst to work within their chosen tool, and still have impact on the continuous tuning of the company’s intelligence.

For alerts in the ‘gray zone’ of importance (med-high, but not high/very high priority), simplify triage with a tool that enables visualization and collaboration.

For high priority alerts, include the ability to import alerts into an investigation for visual associations and understanding, and to perform analysis and engage with various collaborators as needed.

In an adjacent workflow within the SIEM where the analyst lives, gain the ability to import highly relevant investigation alert data. Most SIEMs allow three to five additional pieces of context to accompany an indicator of compromise (IOC). Including threat score, IOC source(s), existing ticket numbers + outcome, adversary attribution, etc. will allow an analyst to make very quick and accurate triage decisions.

Learn from and reduce false positives automatically and improve the quality of alerts.If a false positive does slip through, simple feedback can allow for automated tuning of the threat repository. Likewise, the ability to build more accurate SIEM rules based on threat intelligence directly improves the quality of future alerts.

More effectively manage alert triage spikes when a wave of new STIX intelligence hits the sensors. By automatically ingesting the STIX package and transferring that text into the ThreatQ Investigations visualization, an analyst can digest that shared intelligence and take immediate actions.

Outcomes:

  • Improved alert triage process.
  • Greater focus – get to the alerts that matter faster, by eliminating the ones that do not.
  • Faster investigation response time.
  • Better decision making.
  • Accelerated resolution – close security alerts  more quickly and accurately.
  • Instant understanding with visualization of alerts and context (weaponized delivery, malware dropper, CVE, C2, false flags, adversary overlap, shared infrastructure, etc.).

LET’S GET STARTED!

Join the ThreatQ Community, a private community with hundreds of experienced cyber security pros sharing intel to level-up threat detection and response. Partner with ThreatQuotient to learn how we can help you focus on the threat.