Cloud SOAR Achieves IRAP Assessment Along With Enterprise Security 8.0, DMX Edge Processor & Federated Search S3

We are delighted to announce that our Cloud SOAR solution has successfully completed the Infosec Registered Assessors Program (IRAP) assessment, marking a significant milestone for our customers seeking to enhance their security capabilities. The IRAP assessment, overseen by the Australian Cyber Security Centre (ACSC), provides organisations with access to top-tier evaluation services for cloud-based offerings. With Cloud SOAR achieving the IRAP Protected level, Australian Government agencies can now leverage enhanced security infrastructure orchestration, playbook automation and case management capabilities. This milestone reinforces our commitment to supporting federal, state, and local governments, as well as non-government entities, in achieving digital resilience and leveraging data-driven strategies for SOC modernisation and risk management.

Along with this achievement, we are thrilled to introduce Enterprise Security 8.0, a groundbreaking solution designed to combat the dynamic cybersecurity threats of today. Core to the SOC of the future, Enterprise Security 8.0 enables organisations to respond more effectively to potential threats, ensuring their digital environments remain secure and dependable. Additionally, we are proud to unveil the DMX Edge Processor, which boosts data processing capabilities, and Federated Search S3, offering comprehensive search functionalities across diverse data sources, thereby enhancing our security and observability platform.

Together with Cisco, we are committed to delivering innovative solutions that drive digital resilience for our customers.

Related Articles

regreSSHion: Uncovering CVE-2024-6387 in OpenSSH - A Critical Vulnerability
Security
9 Minute Read

regreSSHion: Uncovering CVE-2024-6387 in OpenSSH - A Critical Vulnerability

CVE-2024-6387, aka "regreSSHion", exposes Linux environments to remote unauthenticated code execution. Learn how to handle this CVE here.
Using Workflow Actions & OSINT for Threat Hunting in Splunk
Security
6 Minute Read

Using Workflow Actions & OSINT for Threat Hunting in Splunk

Two things will make you a more efficient & effective security analyst: OSINT and workflow actions in Splunk. We've got you covered in this article.
Splunk Security Content for Threat Detection & Response: September Recap
Security
2 Minute Read

Splunk Security Content for Threat Detection & Response: September Recap

Splunk's September ESCU update: New security content & analytics for robust threat detection. Covers Cisco ASA, ArcaneDoor, diverse malware, and Office365 Copilot activity.