Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automation

Blocking IOCs at the speed of automation (With OneLogin)

Matthew Petroske, OneLogin's Senior Incident Response Engineer, saw the value of Tines early on and was impressed by the functionality and scalability of the automation platform. “The analogy I like to use is functional programming; the way that Tines has built the platform means we can just reuse Stories in a very flexible and straightforward fashion, and that makes my life easier, which is what I love. I'm a huge ‘Send to Story’ fan.”

Tines 101 December 2021

Join for an introduction to who we are at Tines and how we can help your business. Whether you've never used our product before or are just getting started, Kevin will go from the basics of what a "Story" and "Action" are, and how complex repetitive workflows can be automated from these simple building blocks. There will be a presentation followed by a live Q&A session.
Sponsored Post

To Reinvent SOAR, Automation Is only a Feature

Security, by its very nature, is one of the most innovative fields on the planet. Every technological advancement carries with it a handful or more of new attack vectors, which in turn lead to a dizzying amount of security innovation as our industry works to mitigate risk and defend against threats. But for all this innovation, there are a few ways in which security lags far behind.

$50M to reinvent security automation

Today, we’re announcing our $50 million Series B funding led by Insight Partners with participation from SentinelOne, GGV Capital, and Bessemer Venture Partners. Together with them, we believe that security teams deserve better. Better ways to collaborate, better ways to work, better ways to keep our lives and livelihoods protected.

How your business can benefit from Cybersecurity automation

Enterprises and small businesses alike are facing challenges that impact their ability to maintain adequate cybersecurity. Budget constraints and limited staff are just a couple of reasons why businesses have become more susceptible to cyberattacks. Hackers are becoming smarter, and the tools that teams deploy are growing in number, leading to fragmentation and increased vulnerabilities.

Sponsored Post

How to Automate the Handling of Suspicious User Behavior

We live in a technological society, and cyber attacks are on the rise. Much of this fraudulent activity is linked to malicious actors or gangs of cyber criminals who are trying to exploit anything they can get their hands on. By using tools like Cobalt Strike or customized alternatives, they attempt to penetrate an organization's defenses in order to gain leverage, exfiltrate PIIs, plant ransomware or CnC beacons, or perform other kinds of malicious acts.

The Benefits of Network Monitoring for Industrial Automation

The drive to increase productivity and reduce costs in manufacturing environments has led to an exponential increase in the adoption of automation on plant floors, also known as Industry 4.0. If your organization has integrated its computation, networking and physical processes, this whitepaper will explain how deploying network monitoring technology will bring tremendous value to both your IT and OT teams.