Cloud SOAR Achieves IRAP Assessment Along With Enterprise Security 8.0, DMX Edge Processor & Federated Search S3

We are delighted to announce that our Cloud SOAR solution has successfully completed the Infosec Registered Assessors Program (IRAP) assessment, marking a significant milestone for our customers seeking to enhance their security capabilities. The IRAP assessment, overseen by the Australian Cyber Security Centre (ACSC), provides organisations with access to top-tier evaluation services for cloud-based offerings. With Cloud SOAR achieving the IRAP Protected level, Australian Government agencies can now leverage enhanced security infrastructure orchestration, playbook automation and case management capabilities. This milestone reinforces our commitment to supporting federal, state, and local governments, as well as non-government entities, in achieving digital resilience and leveraging data-driven strategies for SOC modernisation and risk management.

Along with this achievement, we are thrilled to introduce Enterprise Security 8.0, a groundbreaking solution designed to combat the dynamic cybersecurity threats of today. Core to the SOC of the future, Enterprise Security 8.0 enables organisations to respond more effectively to potential threats, ensuring their digital environments remain secure and dependable. Additionally, we are proud to unveil the DMX Edge Processor, which boosts data processing capabilities, and Federated Search S3, offering comprehensive search functionalities across diverse data sources, thereby enhancing our security and observability platform.

Together with Cisco, we are committed to delivering innovative solutions that drive digital resilience for our customers.

Related Articles

Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox
Security
6 Minute Read

Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox

Got some parsed fields that you're ready to analyze... possibly for threat hunting? We'll use Levenshtein, Shannon & URL Toolbox to show you how!
TruSTAR Intel Workflows Series: Shifting from App-Centric to Data-Centric Security Operations
Security
4 Minute Read

TruSTAR Intel Workflows Series: Shifting from App-Centric to Data-Centric Security Operations

TruSTAR recently introduced API 2.O featuring TruSTAR Intel Workflows. This blog series will explain our motivations for building this feature, how it works, and how users can better inform security operations.
Splunk’s Response to the SolarWinds Cyberattacks
Security
2 Minute Read

Splunk’s Response to the SolarWinds Cyberattacks

Although Splunk was not directly affected by the SolarWinds cyberattacks, as a leader in security we want to help the industry by providing tools, guidance and support to those impacted. Splunk's CISO Yassir Abousselham shares relevant information for customers and examples of how Splunk has taken action to better protect its business.