<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2659386&amp;fmt=gif">
Talk to an Expert

Introducing Cysiv Custom Rules for a Next-Level SOC Process

To provide complete flexibility, and to further improve the threat detection process, Cysiv has added custom rules as an important new feature to Command. Custom rules provide a powerful way to match and correlate enriched logs into indicators, for better visibility and reporting, or into custom detections for our SOC team. 

In this video, listen in as Mark Chatoor, Cysiv’s Director of Product Management, and Justin Foster, CTO of Cysiv, discuss this exciting new feature, how it was shaped by customers, and the problems that it solves.

Cysiv Custom Rules


back to all resources
share this:
SOC-as-a-Service Threat Detection Managed Security Security Operations SOC-as-a-Service video

related to this

MITRE ATT&CK + Cysiv: A Match Made for Gap Detection