Cloud SOAR Achieves IRAP Assessment Along With Enterprise Security 8.0, DMX Edge Processor & Federated Search S3

We are delighted to announce that our Cloud SOAR solution has successfully completed the Infosec Registered Assessors Program (IRAP) assessment, marking a significant milestone for our customers seeking to enhance their security capabilities. The IRAP assessment, overseen by the Australian Cyber Security Centre (ACSC), provides organisations with access to top-tier evaluation services for cloud-based offerings. With Cloud SOAR achieving the IRAP Protected level, Australian Government agencies can now leverage enhanced security infrastructure orchestration, playbook automation and case management capabilities. This milestone reinforces our commitment to supporting federal, state, and local governments, as well as non-government entities, in achieving digital resilience and leveraging data-driven strategies for SOC modernisation and risk management.

Along with this achievement, we are thrilled to introduce Enterprise Security 8.0, a groundbreaking solution designed to combat the dynamic cybersecurity threats of today. Core to the SOC of the future, Enterprise Security 8.0 enables organisations to respond more effectively to potential threats, ensuring their digital environments remain secure and dependable. Additionally, we are proud to unveil the DMX Edge Processor, which boosts data processing capabilities, and Federated Search S3, offering comprehensive search functionalities across diverse data sources, thereby enhancing our security and observability platform.

Together with Cisco, we are committed to delivering innovative solutions that drive digital resilience for our customers.

Related Articles

Detecting Malware Script Loaders using Remcos: Threat Research Release December 2021
Security
9 Minute Read

Detecting Malware Script Loaders using Remcos: Threat Research Release December 2021

Start detection against behaviors and TTPs from a Remcos loader that utilizes DynamicWrapperX (dynwrapx.dll) to execute shellcode and inject Remcos RAT into the target process.
Detecting & Hunting Named Pipes: A Splunk Tutorial
Security
12 Minute Read

Detecting & Hunting Named Pipes: A Splunk Tutorial

Named pipes can be threats, too. In this comprehensive article, we are going to talk about detecting, hunting and investigating named pipes.
Detecting Lateral Movement Using Splunk User Behavior Analytics
Security
8 Minute Read

Detecting Lateral Movement Using Splunk User Behavior Analytics

The blog is to introduce lateral movement detection using Splunk User Behavior Analytics (UBA)