Explore how Tines can be used to take logs from G Suite and forward them to ELK (Elasticsearch, Logstash, Kibana) for analysis and alerting.
Explore how Tines can be used in conjunction with out-of-the-box features provided by GSuite and Microsoft Exchange to amplify CEO Fraud detection and response.
We want demos of the Tines security automation platform to be different. In this post, we explore how we use our platform to automate customer demo preparation, ensuring we provide as valuable an experience as possible.
In this post we share a methodology security operations center analysts and engineers can use to help them develop a compelling SOAR or security automation proposal. We also share a deck based on the methodology, which you can use to develop your pitch.
Explore some of the DevSecOps design decisions we’ve made internally and why Tines is a great platform if you need to automate your own complex processes.
In part two of our deep-dive series into end-to-end automation of abuse inbox management and phishing response, we added additional URL threat intelligence services and submitted suspicious attachments to multiple malware sandboxes.
Managing abuse inboxes and phishing response across an enterprise is often a complex and manual operation. In this multi-part video series, we provide detailed instructions on how to use Tines to automate the process end-to-end.
Security teams need access to relevant data and systems to investigate and respond to security threats. In this post, we explore how to automate common G Suite security tasks.
We’re excited to announce that we’ve completed our Series-B funding to support our explosive growth, to ensure that every one of our customers continues to be successful, and to double down on our ambitious product vision.
Work with alerts generated by detections, query the log analytics backend of Azure Sentinel with data from other sources, and add threat intelligence indicators leveraging Azure Sentinel's watchlist and Tines.
Good credential management is critical when working with APIs. Learn how to Tines can dynamically authenticate to APIs using credentials stored in your existing secret management tools to ensure your continuous security.
We built Teams to allow you to invite as many other users as you want to the Tines platform, and to allow you to keep your sensitive and critical Stories separate to and private from other users.
Using AWS Lambda within your automation platform.
How to use the TheHive API together with Tines to automate the creation of alerts from phishing emails and more.
Learn how to scale your security program by creating high-fidelity alerts using Panther and automating manual remediation tasks in Tines.
Adam Maksimuk, Senior Incident Response Engineer at Auth0 explains how the Slack bot they built using Tines simplifies the management of security incidents.
Detection & Response Senior Security Engineer, Brandon Maxwell, describes how Auth0 use Tines to respond accurately at scale to security alerts.
The Tines Community Edition is a fully-featured cloud instance of Tines. It’s free to use, requires no up-front commitment, and includes a generous automation capacity.
Learn how to automate response to AWS Security Alerts using AWS Cloudwatch and SNS together with the Tines Security Automation platform.
Automate the Elasticsearch Search API to rapidly create canned and shareable threat hunting tools for you and your team.
How to subscribe to a Google Workspace endpoint and receive webhooks for important user account events. This will let us build custom workflows and tailored security responses for a range of scenarios.
A brief look at how to get connected (and authenticated) to the CrowdStrike API and enable Tines to utilize many aspects of the CrowdStrike Falcon platform.
Explore and then automate search operations for a simple Threat Hunting example. We will then turn our learnings into a fully-fledged self-service internal tool for use by colleagues (or perhaps other teams in your organization).
How to leverage some basic Qualys automation to maximize your impact and efficacy.