SlashNext Phishing IR Integration Guide Swimlane SOAR
SlashNext Phishing IR Integration Guide Swimlane SOAR
Microsoft Endpoint Configuration Manager
Microsoft Endpoint Configuration Manager (MECM) Guide
SlashNext Complete Defense Getting Started User Guide
A user guide for SlashNext Browser and Mobile Protection service. Download Now
Cortex XSOAR and SlashNext Phishing IR Integration Guide
Cortex’s XSOAR platform can access SlashNext URL Analysis and Enrichment to get accurate verdicts and rich IoC data, including screen shots, to expedite phishing IR and threat hunting playbooks.
ThreatQ TIP and SlashNext Threat Intelligence Integration Guide
ThreatQ works with SlashNext Agentless Phishing Defense threat intelligence to speed threat identification and for operationalizing blocking in network controls.
Splunk Phantom SOAR and SlashNext Phishing IR Integration Guide
Splunk Phantom users can access SlashNext URL Analysis & Enrichment to get accurate verdicts and rich IoC data, including screen shots, to expedite phishing IR and threat hunting playbooks.
Tines SOAR and SlashNext Phishing IR Integration Guide
Tines users can access SlashNext URL Analysis & Enrichment to get accurate verdicts and rich IoC data, including screen shots, to automate phishing IR and threat hunting stories.