D3 Cyber Incident Response Platform

3861

D3 Security Partner

D3 Security | Partner>

The D3 Incident Response Platform provides SOAR (Security Orchestration, Automation and Response) to organizations so they can efficiently manage cyberattacks, incident response, and compliance/privacy investigations.
107 downloads

Description

The D3 Incident Response Platform is the only SOAR tool that combines security orchestration with robust case management, in an intuitive, battle-tested and highly scalable solution.

The platform combines security alerts from Micro Focus ArcSight ESM with threat intelligence and other products, in order to seamlessly automate the analysis and response process.

Users can respond with guided playbooks based on leading methodologies, which are fully or partially automated. D3's applet library features 200+ out-of-the-box integrations, while still allowing analysts to write and execute their own scripts. A visual playbook editor gives users a dynamic interface for building response processes, including for on-the-fly scenarios.

A robust case management and collaboration system serves to streamline and automate the compliance, audit and privacy management obligations related to cyberattacks and security incidents. Unlike any other product, D3 automates both the security and compliance/documentation requirements; enabling truly 'full-lifecycle' incident management.

Detection-to-Remediation Use-Case

The combination of Micro Focus ArcSight ESM and D3 provides advanced threat detection with efficient workflows and playbooks. Analysts can seamlessly move from detection, through analysis, and remediation within a single platform.

  • Triggered events can be analysed and escalated to incidents at the point of detection
  • Apply threat specific playbooks to incidents for consistent and efficient steps of investigation providing the analyst with instant access to industry best practices
  • Automated workflows increase the speed at which remediation can take place by automatically notifying team members of assignments which need to be completed
  • Structured and consistent logging of the incidents means the “lessons learned” process has the necessary information available and SOC can easily adjust their processes and procedures

Incident-to-Investigation Use-Casee

The ability to correlate events and IP addresses in Micro Focus ArcSight ESM with previously pushed incidents and cases in D3 provides investigators with powerful tools to look for persistent threats and threat actors.

  • Search Event IP addresses and correlate with existing incidents allowing the analyst to see attack patterns
  • Analyze these patterns within previous incidents giving the analyst further insight into what attack vectors could be exploited
  • Investigate the attack vectors and find what vulnerabilities exist within these vectors
  • Remediate the vulnerabilities and log post-incident findings for improved response on future attacks

Releases

Release
Size
Date
D3 Incident Response Platform - Micro Focus CEF Integration 10.0
628.0 KB
  |  
Aug 22, 2018
More info Less info
Product Compatibility
ArcSight
Version 6.0 · 6.50
Version 7.0
Release Notes

CEF Integration Guide 

Languages
English

Your browser is not supported!

Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox