Incident response policies and preferences vary between organizations and are frequently dependent on a variety of factors, like type of action, threat severity, and even the time of day. A managed detection and response provider (MDR) has to accommodate each organization’s unique response requirements leading to extensive preparation to document response plans and slow MTTRs as individual analysts look up correct procedures for responding to individual threats. Or the provider abdicates responsibility and limits liability by only providing recommended actions that each organization is required to take completely on their own. This is particularly problematic for an organization that is using an MDR to deliver after hours protection, but has no means to respond to critical threats until regular business hours.
LogicHub uses its SOAR+ platform to deliver automated incident response capabilities that are customized to meet the individual requirements of every MDR+ customer, with the option to require one-click authorization for any action. And each response can be built to adapt to different scenarios, like threat severity, specific device types or user groups, or time of day. For example, with critical threats an organization can require one-click authorization before taking invasive actions like quarantining a device or disabling a user account during normal hours of operation, while fully automating the same actions after hours. LogicHub’s SOC analysts are still investigating and validating threats on a 24x7 basis, but individual organizations can take control of the response process for each individual scenario without requiring a 24x7 operation of their own. This allows any organization to determine how to respond to any type of threat in the way that they need. And because the process is built into a playbook, we eliminate the risk of human error that could lead to an improper response.