Cloud SOAR Achieves IRAP Assessment Along With Enterprise Security 8.0, DMX Edge Processor & Federated Search S3

Security Brett Matthews

We are delighted to announce that our Cloud SOAR solution has successfully completed the Infosec Registered Assessors Program (IRAP) assessment, marking a significant milestone for our customers seeking to enhance their security capabilities. The IRAP assessment, overseen by the Australian Cyber Security Centre (ACSC), provides organisations with access to top-tier evaluation services for cloud-based offerings. With Cloud SOAR achieving the IRAP Protected level, Australian Government agencies can now leverage enhanced security infrastructure orchestration, playbook automation and case management capabilities. This milestone reinforces our commitment to supporting federal, state, and local governments, as well as non-government entities, in achieving digital resilience and leveraging data-driven strategies for SOC modernisation and risk management.

Along with this achievement, we are thrilled to introduce Enterprise Security 8.0, a groundbreaking solution designed to combat the dynamic cybersecurity threats of today. Core to the SOC of the future, Enterprise Security 8.0 enables organisations to respond more effectively to potential threats, ensuring their digital environments remain secure and dependable. Additionally, we are proud to unveil the DMX Edge Processor, which boosts data processing capabilities, and Federated Search S3, offering comprehensive search functionalities across diverse data sources, thereby enhancing our security and observability platform.

Together with Cisco, we are committed to delivering innovative solutions that drive digital resilience for our customers.

Related Articles

Introducing: The Splunk App for Okta
Security
2 Minute Read

Introducing: The Splunk App for Okta

Random Words on Entropy and DNS
Security
4 Minute Read

Random Words on Entropy and DNS

Breaking Trust in MMC: XMLDriven Malicious Loader via .MSC Files
Security
5 Minute Read

Breaking Trust in MMC: XMLDriven Malicious Loader via .MSC Files

Learn how attackers abuse Microsoft Management Console (.msc) files and XML loaders to execute malware. Discover detection strategies using Splunk and MITRE ATT&CK.