End-to-End Security Management Powered by Our SOC

The DirectDefense Security Operations Center Analyst Team uses ThreatAdvisor internally, which improves the speed, efficiency, and accuracy of our SOC. We leverage our own experience and knowledge base with ThreatAdvisor, inclusive of built-in workflows and playbooks, to ensure a repeatable, high standard of service while allowing for customization and flexibility for your specific needs.

We consider ThreatAdvisor to be one of the best SOAR platforms, as it delivers continuous, robust security monitoring and management, and its intuitive customer dashboard provides a clear view of remediation management tactics and how selected strategies are affecting your organization’s overall security.

Built from the Ground Up for Scalability

ThreatAdvisor integrates seamlessly with other solutions, so you always have a single interface for threat management, complete with in-depth data and clear context, allowing you to scale as your security and compliance needs evolve.

Vulnerability and asset data is collected and processed from several sources, giving you a complete view of your cyber security posture at all times, right from the ThreatAdvisor interface. And the benefits don’t stop there. ThreatAdvisor supports a host of security activities to ensure your organization is always a step ahead.

  • Penetration Testing
  • Operational Technology (OT) and Industrial Control Systems (ICS) Services
  • Vulnerability Management
  • Managed Detection & Response (MDR)
  • Compliance Assessments
  • Enterprise Risk Assessments
  • And more

Security Areas Within the ThreatAdvisor Platform

As your partner, we manage the ThreatAdvisor platform to manage and monitor your organization’s security, all while providing you with customized outputs to help you stay on top of your cyber security posture and feel confident in our remediation tactics and security strategies.

Use Case

Penetration Testing

What We Manage:

  • Import results from testing tools
  • Curate security findings with evidence
  • Create project report
  • Generate status and comprehensive reports
  • Perform and record retesting results

What You Get:

  • Clearly view findings and evidence
  • Easily access status and comprehensive reports
  • Indicate when findings have been remediated
  • Track and report on security trends
Managed Detection & Response

What We Manage:

  • Monitor incoming security events
  • Triage events to determine if investigation is required
  • Manage detection cases for investigators
  • Escalate investigations that become incidents
  • Manage incident response
  • Generate activity reports

What You Get:

  • View detection cases of investigations and incidents
  • Interact directly with our SOC on detection cases
  • Assign detection case ownership
  • Easily access reports of MDR activity
Vulnerability Management

What We Manage:

  • Import security vulnerabilities from scanning tools
  • Classify vulnerabilities by category and root cause
  • Prioritize vulnerabilities
  • Escalate detected vulnerabilities based on severity
  • Generate reports showing vulnerability trends

What You Get:

  • View detected vulnerabilities
  • Respond to escalated vulnerabilities with remediation
  • Access comprehensive and trending reports
  • Identify vulnerability exceptions
Compliance

What We Manage:

  • Perform and record results of compliance assessments for regulatory requirements
  • Generate reports of compliance assessment
  • Plan projects to reach specified levels of compliance through remediation selection

What You Get:

  • View results of compliance assessments
  • Generate reports of compliance assessments
  • Plan projects to reach specified levels of compliance through remediation selection
Risk Register

What We Manage:

  • Track security exceptions

What You Get:

  • Enter policy and security exception requests
  • Review, approve, or reject policy and security exception requests
  • Assess and record the inherent, residual, and overall risk of an exception request
  • Track, manage, and report all exception requests
Asset Management

What We Manage:

  • Correlate and manage assets across all services
  • Adjust priorities based on asset business value
  • Determine asset owner and business unit

What You Get:

  • Provide the business value of assets
  • Organize assets by business unit
  • Assign ownership to assets
  • View overall security posture of an asset

How to Use ThreatAdvisor’s Key Features

ThreatAdvisor is designed intuitively so you can view, track, and export information when you need it. We have implemented several key features that deliver a comprehensive look at your security posture at any time – and provide actionable insights to help your organization stay protected.

Consultant Workbench

Your DirectDefense consultant imports assessment results and creates findings directly from those results. This activity allows you to easily view findings, access status reports, track remediation progress and monitor security assessment trends. Through Consultant Workbench, your consultant can customize individual reporting sections for your organization using content from the knowledgebase.

ThreatAdvisor Consultant Workbench software screen
ThreatAdvisor Case Management software screen
Case Management

View a work queue listing all incoming events and emails, as well as a knowledgebase for all types of security events. The knowledgebase includes event playbooks that detail automated and manual steps to investigate an event, and all events are investigated in detection cases with review timers to ensure they’re regularly monitored. All communication with your team is tracked in real-time within a detection case so nothing is overlooked.

Risk Register

Turn here to manage policy and security risk exceptions using easy-to-navigate dashboards. New exception requests are either entered manually or come in through integrations with client ServiceNow instances and are either approved or rejected. All exception requests are categorized and evaluated for risk exposure and mitigating factors. You can easily track approvals through a multi-tiered system and assign higher-level approval requirements for exception requests as the overall risk exposure increases.

ThreatAdvisor RiskRegister software screens
ThreatAdvisor Compliance software screen
Compliance

View a framework of your compliance assessments and assessment details, and utilize Compliance Project Planning to select your desired level of compliance and remediations for non-compliant items to determine the time and cost of a compliance project. You can access the compliance knowledgebase of data collection procedures, notes, and potential evidence to gather for each control in all supported regulation frameworks.

Vulnerability Management

View easy-to-read dashboards to see all detected vulnerabilities, respond to escalated vulnerabilities with a remediation plan, access comprehensive and trending reports, and identify vulnerability exceptions.

ThreatAdvisor Vulnerability Management software screens

Data Sources

ThreatAdvisor collects and processes vulnerability and asset data from several sources, and compiles them into a holistic view of your organization’s security posture.

Get Started with DirectDefense