Security threats are increasing, and security analysts have more data and devices to keep their eyes on than ever before. There are more devices, more types of devices, more cloud services, and subtler threats—take, for example, the rising popularity of fileless malware, which makes ransomware and other types of attacks harder to detect.

Faced with an ever-growing volume of alerts to triage, threats to investigate, and devices to screen, overworked security analysts are turning to automation for help. Security Orchestration, Automation and Response (SOAR) platforms are now delivering some of the automation that security analysts need. These platforms collect alerts and other data from SIEM platforms and other local tools, enrich the data with basic contextual information such as IP address reputations, and present the alerts for consideration to analysts. If analysts decide to take action in response to an alert, the SOAR platform can help there, too, by performing some basic automated tasks, such as blacklisting an IP address or closing a port.

SOAR platforms are decidedly an improvement over relying entirely or primarily on manual processes for alert triage and threat detection. But SOAR platforms leave many time-consuming tasks unautomated. Most importantly, SOAR platforms still require analysts to perform the analysis of the enriched data. Analysis takes time, and time is what Security Operations Center (SOC) teams are trying to save.

SOAR+ is a new category of security technology that builds on SOAR platforms but takes automation further by automating threat analysis itself. SOAR+ applies the expertise of security analysts in a fast, repeatable way to dramatically reduce SOC workloads.

Flows and Playbooks for Threat Detection

To automate threat analysis, a SOAR+ runs a flow, which is an ordered series of steps that processes data, makes decisions, renders a judgement, and potentially takes action to remediate a threat. Flows are collected in playbooks, which are digital versions of the printed directions found in physical playbooks in many SOCs. Instead of a security analysts following all the steps in a printed playbook, a SOAR+ playbook performs them automatically at split-second speed.

To build a SOAR+ flow, an analyst uses a drag-and-drop interface to place nodes into a connected series representing the steps in the flow. One node might be set up to collect a certain type of data from a source. Another might be to perform a common task, such as checking the reputation of any IP addresses in the data from the previous step.

By connecting these nodes, including nodes for decision-making steps and risk scoring, and fine tuning settings to suit an organization’s particular environment and security policies, an analyst can build a flow in a matter of minutes that automates analytical tasks that if performed manually might require an hour or more if performed even once. Now the flow can be automated to run in minutes or even seconds.

Once built, any flow can be scheduled to be repeated at fixed intervals. For example, a SOC might have a flow designed to evaluate suspicious message flagged as possible phishing attacks. The SOC might decide to run this flow every 15 minutes, so that messages quarantined as suspicious can be processed quickly and safe messages routed to their recipients’ inboxes.

Automated Recommendations for Building Flows

SOAR+ flows clearly represent a huge improvement over the status quo in many SOCs. Flows enable analysts to automate routine tasks, clearing away tens, hundreds, or even thousands of security alerts every day.

What would make flow-building even easier? A SOAR+ platform which can guide analysts through the construction of flows by offering recommendations for useful components at every step.

On the LogicHub SOAR+ security automation platform, when an analyst drags a node onto the design pane for building flows, the platform automatically offers recommendations for possible actions or next steps that could follow the selected node.

For example, if a flow collects email data for phishing triage, the platform might recommend that the flow load new unprocessed emails from the data it collects. And once the load unprocessed emails step has been added to the flow, the platform might recommend that the flow run an analysis of the reputation of the sender, attachments, and URLs by using threat intelligence services.


Sample recommendation and newly added recommended node

The platform doesn’t suggest every possible next step or component, only the ones that would be appropriate for the component the analyst has just added or selected.

Benefits of Recommendations for SOAR+ Platforms

Automated recommendations provide two chief benefits for security analysts:

  • BreadthRecommendations offer helpful ideas for flows, ensuring that critical steps for data enrichments and threat analysis aren’t omitted or overlooked.
  • SpeedRecommendations accelerate the construction of flows by making it easy for analysts to find the right component for any step in a flow.

Flows accelerate work. Recommendations accelerate the creation of flows. They’re part of what distinguishes a SOAR platform, which still leaves time-consuming analysis to analysts themselves, from a SOAR+ platform that automates alert triage and threat analysis, improving the speed and accuracy of the overall work of a SOC.

The LogicHub SOAR+ Platform and Recommendations

Developed by security industry veterans, the LogicHub SOAR+ platform is the only security platform that automates alert triage, threat detection, and threat mitigation effectively. By allowing security analysts to apply their expertise in carefully designed flows and playbooks, LogicHub automates alert triage and threat analysis and enables SOC teams to find and remediate threats more quickly.

To learn more about the LogicHub SOAR+ security automation platform and the benefits of automated recommendations for building flows, contact a LogicHub sales representative today.


Related Posts

September 13, 2022 Kumar Saurabh

Why No Code Solutions Are a Double-Edged Sword

Most out-of-the-box security automation is based on a simple logic — essentially, if “this”...

Learn More

August 16, 2022 Willy Leichter

Understanding MDR, XDR, EDR and TDR

A program with proper threat detection and response (TDR) has two key pillars: understanding the...

Learn More

August 9, 2022 Willy Leichter

Intuition vs. Automation: What Man and Machine Bring to Data Security

Cybersecurity experts Colin Henderson and Ray Espinoza share their take on the automation-driven...

Learn More

August 2, 2022 Anthony Morris

Using AI/ML to Create Better Security Detections

The blue-team challenge Ask any person who has interacted with a security operations center (SOC)...

Learn More

July 26, 2022 Willy Leichter

How to Select the Right MDR Service

It can be difficult to understand the differences between the various managed detection and...

Learn More

July 21, 2022 Willy Leichter

The Evolving Role of the SOC Analyst

As the cyber threat landscape evolves, so does the role of the security operations center (SOC)...

Learn More

July 19, 2022 Kumar Saurabh

Life, Liberty, and the Pursuit of Security

As cyber threats evolve, organizations of all sizes need to ramp up their security efforts....

Learn More

July 15, 2022 Tessa Mishoe

LogicHub Security RoundUp: July 2022

Hello, and welcome to the latest edition of the LogicHub Monthly Update! Each month we’ll be...

Learn More

July 12, 2022 Willy Leichter

Security Tools Need to Get with the API Program

No cloud API is an island The evolution of cloud services has coincided with the development of...

Learn More

July 6, 2022 Willy Leichter

Why the Rush to MDR?

LogicHub recently published a survey conducted by Osterman Research, looking at changing trends and...

Learn More