Security News > 2020 > August > ThreatConnect integrates its TIP and SOAR platform with Microsoft Graph Security API
ThreatConnect announced that it has joined the Microsoft Intelligent Security Association and will integrate Microsoft solutions with the ThreatConnect Threat Intelligence and Security Orchestration Automation and Response Platform using the Microsoft Graph Security API. This integration allows ThreatConnect clients to connect with nearly any piece of Microsoft technology, including Azure Sentinel, O365, and Microsoft Defender ATP, using the Microsoft Graph Security API. The integration allows clients to retrieve alerts, perform data enrichment, gain relevant threat intelligence, and carry out incident response actions.
The Microsoft Graph Security API is a single interface that connects to Microsoft security products.
Additional remediation steps can be automated via the Graph Mail API. Triage graph security alerts.
"ThreatConnect enables organizations to harness threat intelligence and distill it down into actionable insights; benefit from the collective knowledge and talents across their security teams; develop and refine security processes; and enhance the efficacy of technologies across their security ecosystem," said Andy Pendergast, Vice President of Product at ThreatConnect.
"Integrating ThreatConnect with Microsoft Graph is incredibly important as it allows security teams to increase their accuracy and efficiency, and accelerate incident response processes. Leveraging our App Services and Playbooks technology, users can now dynamically respond to events in the Graph API and orchestrate operations between Microsoft products and other integrated technologies."
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/xVzzybgxmr4/
Related news
- Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API (source)
- Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks (source)
- API security blind spots put businesses at risk (source)
- 3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update (source)
- ‘Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security (source)