This article was published in the IBM Resilient Knowledge Center on April 16, 2018. You can read the original post here.

Today, we are proud to announce the launch of Intelligent Orchestration with the next-generation of the IBM Resilient Security Orchestration, Automation, and Response (SOAR) Platform. This new platform resets the standard for incident response (IR) by dramatically accelerating and sharpening the entire response process. By blending human and machine-based intelligence with orchestration, automation, and IR case management, Intelligent Orchestration empowers organizations to outsmart, outpace, and outmaneuver complex cyber security threats. This is an exciting leap into the future of incident response – a market that we pioneered and continue to innovate.

Intelligent Orchestration is needed today because of the security challenges organizations face: complex security environments, a skills shortage, and the increasing volume and severity of attacks. Because of these challenges, security teams often struggle to respond to and mitigate cyberattacks quickly and efficiently. With the average cost of a data breach reaching $3.62 million and new regulations with tougher penalties on the horizon, organizations need to maximize the speed, efficiency, and intelligence of their existing tools and people.

To address this, organizations are investing in IR orchestration and automation. Recent research from Gartner reveals their Security Operations and Response (SOAR) model as having three essential components: Security Orchestration and Automation, Security Incident Response Platforms, and Threat Intelligence Platforms. Particularly with this new release, Resilient stands alone as the only platform that can thoroughly deliver all three in a single integrated platform.

Moreover, our IRP with Intelligent Orchestration is the first to deliver real-time visibility across Security Operation Center (SOC) tools, offer quick time to value, and enable a guided response capability. As a result, security teams can now more fully harness the power and agility of their people, process, and technology to better battle cyber threats.

How Intelligent Orchestration Works

With the new Resilient IRP, security analysts can orchestrate and automate time-consuming, repetitive, and complicated actions that previously required significant human intervention. Enterprise-grade, bi-directional integrations available via a drag-and-drop business process management notation (BPMN) workflow engine enable security teams to build Dynamic Playbooks that enable a “guided response.” As analysts work through an incident, Resilient guides them step-by-step through the process, ensuring the right person, gets the right information, at the right time.

Not only are integrations available to the workflow editor, they are now componentized and reusable. As a result, once an integration is added to Resilient, its capabilities can easily be added to multiple workflows, combined together in whatever fashion is required. This abstraction layer between the workflow and the underlying integration components frees the security analyst building a new process from having to re-develop an integration to support a new use case.

All of this would be interesting, but not nearly as exciting, if we didn’t have a bunch of new integrations. Fortunately, we are also excited to deliver a robust ecosystem of partner integrations that are now available via the IBM Security App Exchange. The IBM Resilient Orchestration Ecosystem, featuring key partners such as Cisco, McAfee, Splunk, Carbon Black, Symantec, and others, gives customers an open and easy way to share data and actions between multiple technology solutions and security tools. The Resilient IRP automatically initiates activities across these partner technologies spanning monitoring and escalation, identification and enrichment, communication and coordination, and containment, response, and recovery.

Two years ago at the RSA Conference, IBM Security announced that they had acquired our company. Since then, we’ve been fortunate to partner with lots of organizations and witness the transformative power of a vibrant incident response program. We’ve invested heavily and worked hard to make Resilient even better. With this release and its Intelligent Orchestration components, we’re excited to take these capabilities to a new level, make them easier to adopt, and bring them to a broader array of organizations.

For more on Intelligent Orchestration, download our latest white paper today.

More from Incident Response

How to Start a Career in Cyber Incident Response

Cyber incident response is one of cybersecurity's most interesting and rewarding careers. It’s an in-demand role, and it pays well. But how do you get started? First, let’s start with the basics. What is Cyber Incident Response? Cyber incident response is the preparation for and practice of identifying, containing and ending cyber attacks. A computer security incident response team (CSIRT) within an organization — ideally including the chief information security officer, security operations center staff, executives and representatives from the…

How the Mac OS X Trojan Flashback Changed Cybersecurity

Not so long ago, the Mac was thought to be impervious to viruses. In fact, Apple once stated on its website that "it doesn't get PC viruses". But that was before the Mac OS X Trojan Flashback malware appeared in 2012. Since then, Mac and iPhone security issues have changed dramatically — and so has the security of the entire world. In this post, we'll revisit how the Flashback incident unfolded and how it changed the security landscape forever. What…

What Hurricane Preparedness Can Teach Us About Ransomware

Each year between June and November, many parts of the U.S. become potential targets for hurricanes. In October 2022, we had Hurricane Ian devastate Florida. To prepare for natural disasters like hurricanes, organizations are encouraged to build out and test business continuity, disaster recovery, and crisis management plans to use in the response efforts. Millions of dollars each year are spent on natural disaster preparation, but natural disasters are not the only disruption businesses face. While we can’t equate the…

Charles Henderson’s Cybersecurity Awareness Month Content Roundup

In some parts of the world during October, we have Halloween, which conjures the specter of imagined monsters lurking in the dark. Simultaneously, October is Cybersecurity Awareness Month, which evokes the specter of threats lurking behind our screens. Bombarded with horror stories about data breaches, ransomware, and malware, everyone’s suddenly in the latest cybersecurity trends and data, and the intricacies of their organization’s incident response plan. What does all this fear and uncertainty stem from? It’s the unknowns. Who might…