SecOps
Quarantine Object Retrieval: Quarantined objects are automatically retrieved from ESET, eliminating the need for manual checks. This automation reduces the time spent identifying and collecting files, allowing teams to focus on more critical tasks.
Threat Analysis: Quarantined files are analyzed using multiple Threat Intelligence tools. This automated analysis provides comprehensive insights faster than manual methods, enhancing decision-making and reducing the risk of oversight.
Slack Notification and Action: Results are posted on Slack, enabling quick team collaboration and decision-making. This automation streamlines communication, ensuring that all stakeholders are informed promptly, accelerating response times compared to manual notifications.
ESET Incident Management: In this use case, ESET Incident Management retrieves quarantined objects. It acts as the primary source for identifying files that require further analysis, streamlining the initial step of the threat management process.
Threat Intelligence Tools: Tools like VirusTotal, Hybrid Analysis, MalwareBazaar, and HashLookUp CIRCL are used to analyze quarantined files. They provide detailed insights into the potential threats posed by these files, enabling informed decision-making and enhancing the overall security posture.
Slack: Slack is the platform for posting the threat analysis results. It facilitates team collaboration by allowing members to quickly review findings and decide on actions, ensuring a timely and coordinated response.