Developing a compelling security automation proposal for fun and profit

In this post we share a methodology security operations center analysts and engineers can use to help them develop a compelling SOAR or security automation proposal. We also share a deck based on the methodology, which you can use to develop your pitch.

Updated: Automating Tines trial creation

Explore some of the DevSecOps design decisions we’ve made internally and why Tines is a great platform if you need to automate your own complex processes.

Automating abuse inbox management and phishing response (Part 3)

In part two of our deep-dive series into end-to-end automation of abuse inbox management and phishing response, we added additional URL threat intelligence services and submitted suspicious attachments to multiple malware sandboxes.

Automating abuse inbox management and phishing response (Part 1)

Managing abuse inboxes and phishing response across an enterprise is often a complex and manual operation. In this multi-part video series, we provide detailed instructions on how to use Tines to automate the process end-to-end.

Google Workspace (G Suite) security automation

Security teams need access to relevant data and systems to investigate and respond to security threats. In this post, we explore how to automate common G Suite security tasks.

Announcing our $26M Series B

We’re excited to announce that we’ve completed our Series-B funding to support our explosive growth, to ensure that every one of our customers continues to be successful, and to double down on our ambitious product vision.

Orchestrate powerful workflows with Azure Sentinel and Tines

Work with alerts generated by detections, query the log analytics backend of Azure Sentinel with data from other sources, and add threat intelligence indicators leveraging Azure Sentinel's watchlist and Tines.

Continuous security: Dynamically authenticate to APIs using credentials with Tines

Good credential management is critical when working with APIs. Learn how to Tines can dynamically authenticate to APIs using credentials stored in your existing secret management tools to ensure your continuous security.

Introducing Teams

We built Teams to allow you to invite as many other users as you want to the Tines platform, and to allow you to keep your sensitive and critical Stories separate to and private from other users.

Leveraging AWS Lambda in Tines

Using AWS Lambda within your automation platform.

Getting started with TheHive automation

How to use the TheHive API together with Tines to automate the creation of alerts from phishing emails and more.

Automating detection and response with Panther and Tines

Learn how to scale your security program by creating high-fidelity alerts using Panther and automating manual remediation tasks in Tines.

Security chatops with Auth0

‍Adam Maksimuk, Senior Incident Response Engineer at Auth0 explains how the Slack bot they built using Tines simplifies the management of security incidents.

Detect and respond accurately to security alerts at scale with Tines and Auth0

Detection & Response Senior Security Engineer, Brandon Maxwell, describes how Auth0 use Tines to respond accurately at scale to security alerts.

Announcing the free Tines Community Edition

The Tines Community Edition is a fully-featured cloud instance of Tines. It’s free to use, requires no up-front commitment, and includes a generous automation capacity.

AWS security response with Tines

Learn how to automate response to AWS Security Alerts using AWS Cloudwatch and SNS together with the Tines Security Automation platform.

ELK Stack automation and the Elasticsearch API

Automate the Elasticsearch Search API to rapidly create canned and shareable threat hunting tools for you and your team.

How to subscribe to Google Workspace (G Suite) notifications

How to subscribe to a Google Workspace endpoint and receive webhooks for important user account events. This will let us build custom workflows and tailored security responses for a range of scenarios.

Getting connected to the CrowdStrike API

A brief look at how to get connected (and authenticated) to the CrowdStrike API and enable Tines to utilize many aspects of the CrowdStrike Falcon platform.

Splunk automation guide

Explore and then automate search operations for a simple Threat Hunting example. We will then turn our learnings into a fully-fledged self-service internal tool for use by colleagues (or perhaps other teams in your organization).

Qualys vulnerability management automation guide

How to leverage some basic Qualys automation to maximize your impact and efficacy.