Investigate is built with the Skills gap in mind; you do the threat hunting with No-Code KQL, while Harvey works in the background.
Investigate writes the KQL code for you so that you can focus on threat hunting. After all, that is the main reason for using automation.
Investigate is located in all areas where you do your threat hunting, incidents, devices, firewalls and Tickets.
The general rule is that if you are threat hunting in the SecQube portal, if you see orange text or numbers, click it, and Harvey will write the KQL to drill in.
SecQube Investigate empowers analysts with a swift and intuitive platform, enabling them to tackle complex threat hunting with confidence and ease.
A key requirement in the design of our portal was not to move data from its source. All data remains in your Microsoft Sentinel tenant; our API only reads the information. If you use the ticketing and/or change management solution, this does change. However, it will remain in the same Azure data centre
Configuring the SecQube Solution is straightforward, even for beginners. We use Azure Lighthouse to connect to Microsoft Sentinel, which involves running a pre-defined script in Azure by a user with the right permissions, like a Global or Security Administrator. This takes about 2-5 minutes. After that, add your Azure Subscription to our portal, wait 20 minutes, and you're set!
Harvey up-skills analysts, assisting with your every step whilst engaged in threat hunting. Harvey will educate you and give you calculated answers, speeding the triage period up.
Our solution stands out with its user-friendly interface and comprehensive features that cater to businesses of all sizes. Whether you're a small business or a large corporation, our platform adapts to your needs.
Yes. The SecQube portal can automatically alert you to an incident, and each incident is accompanied by triage steps as well as a severity level