SOAR helps security teams act quickly in the face of growing threats. Credit: Getty Images Security teams operate in the face of growing threats. Research suggests that 79% of organisations suffered a cyber attack last year, with cybercrime and nation state attacks on the rise.To counter this, CISOs depend on a wealth of security tools and techniques. A typical large enterprise might use 15, or more, separate and unconnected security tools. But the range and diversity of tools in use creates a challenge in its own right.Each tool needs managing and maintenance. Although the latest security systems provide vital operational intelligence, security teams, and security operations centres (SOCs) risk being overwhelmed by too much data, and too many tasks. And all this is happening as the number of security threats continues to rise.We are reaching the point where SOC workloads risk exceeding the capacity of human analysts. As a result, the organization’s security response is slower, and less effective. And the disconnected, siloed nature of security applications, creates its own problems. At worst, threats can be missed. The SOAR optionOne solution – and one that is increasingly favoured by enterprises – is to invest in an integrated security platform such as SOAR.SOAR, or Security Orchestration, Automation and Response, brings together intelligence monitoring and incident response, alongside real-time collaboration tools, and playbooks that capture best practices. SOAR adds a single interface to control multiple vendors’ tools, and combines real-time alerts and incident data with external threat intelligence feeds.The current generation of SOAR technologies support built-in real time collaboration, and integrate with customer services management platforms. And SOAR can standardize and document actions during an incident.A further, and increasingly important feature, is support for automation. The latest-generation SOAR tools use machine learning to improve incident response. Each time an organization faces a threat, the SOC becomes more effective as machine learning builds up knowledge of the most effective commands to run, and even the best analysts to handle cases.Quicker responses, reduced threatsTaken together, the key features of SOAR – collaboration, integrated threat intelligence, automation, case management and incident response playbooks – can lead to 90% faster incident response times. They also reduce the number of alerts that need human intervention by as much as 95%.This greatly improves the SOC’s MTTR (Mean Time To Respond), a key measure of SOC effectiveness.Reducing MTTR reduces the dwell time of an attack, or how long an adversary or hacker remains in the system, before they are detected and their activities are shut down. Consolidating security tools into a SOAR platform brings other benefits too. It improves visibility across the organization by tying threat intelligence into real-time incident reports. Linking internal data feeds and external threat intelligence gives more context around security events, and helps SOCs prioritize the most critical threats.And automation allows SOC specialists to be more proactive. Teams can see, at a glance, if systems need patching, or if end-point protection is up to date. It frees up human analysts to handle the more complex incidents, and makes time for other tasks, such as working with stakeholders in the organization and improving security awareness.XSOAR advantagesPalo Alto’s Cortex XSOAR is one example of how SOAR tools are developing into platforms that help SOCs respond more quickly and effectively, and help IT security teams work across on-premises, hybrid and cloud environments.XSOAR takes an open approach, with integrating and aggregating threat intelligence, including the customer’s existing feeds, data from Palo Alto Networks’ own monitoring and strategic intelligence form Unit42. It then automatically maps threat information to incidents. This open approach continues by the way vendors can connect to the platform. Currently, XSOAR supports over 700 products, includes tried and tested incident response playbooks, and supports third party content packs that users can deploy directly from the dashboard.This is supported by a machine learning engine that uses past incidents to improve its guidance to the SOC, as well as automated reporting and post investigation audit trails.Taken together, Cortex XSOAR is one of the most effective ways to improve SOC performance, allowing security teams to scale up their operations in an environment where analysts face dealing with too many, perhaps thousands, of 10,000 or more incidents every week. And XSOAR works with existing SIEM installations, so CISOs can build on their existing investments.SOC teams can try the Cortex XSOAR Community Edition, indefinitely, at no cost*: see https://start.paloaltonetworks.com/sign-up-for-community-edition.html * After 30 days, you can continue using Cortex XSOAR Community Edition at no cost with limitations on the number of platform requests Related content feature How cybersecurity teams should prepare for geopolitical crisis spillover CISOs can anticipate and prepare for cyberattacks conducted by participants in geopolitical conflict such as the Israel/Hamas war by understanding the threat actors' motivations and goals. By Christopher Whyte Dec 05, 2023 12 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats news analysis P2Pinfect Redis worm targets IoT with version for MIPS devices New versions of the worm include some novel approaches to infecting routers and internet-of-things devices, according to a report by Cado Security. By Lucian Constantin Dec 04, 2023 5 mins Botnets Hacker Groups Security Practices news Hackers book profit by scamming Booking.com customers Malicious elements are using Vidar infostealer to gain access to Booking.com’s management portal and defraud customers. By Gagandeep Kaur Dec 04, 2023 4 mins Cyberattacks opinion Proactive, not reactive: the path to ensuring operational resilience in cybersecurity The experience of the financial sector in dealing with threats is instructive to anyone in the cybersecurity space — there’s no substitute for getting out ahead of potential risks and problems. By Cameron Dicker Dec 04, 2023 6 mins Financial Services Industry Data and Information Security Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe