Automating Malware Analysis and Response with Swimlane and Intezer (38:40)

According to the Center for Internet Security, overall malware activity increased 61 percent from December 2018 to January 2019. But security teams don’t have sufficient time or resources to remediate all potential malware activity. Security orchestration, automation and response (SOAR) can help change that.

Swimlane’s SOAR Evangelist Jay Spann and Intezer’s Chen Shafir present two automated malware analysis and response use cases in this on-demand webinar. The first use case demonstrates how to automate the analysis of a suspicious file or file hash. Whether you have received an alert of suspicious activity or are actively hunting for threats, this use case will demonstrate the power of automated analysis with Intezer Analyze and Swimlane.

The second use case showcases how your SOC can automatically respond to alerts from various applications using Swimlane. Swimlane can automatically deploy the Intezer Endpoint Scanner to an endpoint and retrieve results from Intezer Analyze—a fully automated endpoint investigation tool.

In this webinar, you will learn:

  • Details about the lightning fast speed of Genetic Malware Analysis.
  • What SOAR does for resource-strapped SecOps teams.
  • How the Intezer Analyze and Swimlane integration automates the analysis and investigation of suspicious files and file hashes.
  • How Swimlane orchestrates the deployment of the Intezer Endpoint Scanner when suspicious activity or alert has been detected on an endpoint.