What is SOAR (Security, Orchestration, Automation & Response)
ฝัง
- เผยแพร่เมื่อ 2 ต.ค. 2024
- Learn more about current threats: ibm.biz/BdP3QE
Discover more about IBM Security QRadar SOAR: ibm.biz/BdP3QH
Looking for a playbook on how to respond to a security breach?
Once it's already happened is too late; you need to know "how to put out the fire" in advance.
With that in hand, you'll be able to address known threats, but what about ones you've never encountered? In this video, Jeff "The Security Guy" explains the need to have a strategy AND the right tools for handling security incidents, including so-called "black swan" events.
That's the purpose of a SOAR system (Security, Orchestration, Automation & Response) - it's an incident tracking and orchestration system that automates tasks that can be automated and helps manage the human effort for those tasks that can't be automated.
Get started for free on IBM Cloud → ibm.biz/ibm-cl...
Subscribe to see more videos like this in the future → ibm.biz/subscri...
I like the comment when you said, "you can only automate what you have seen before" 👍
Right. I find that sometimes people wish that the system could just magically figure all this out on the fly, but that’s asking a bit much
Thank you for this content. Don't ever let the view count impact the production of these videos, please! Love listening and learning from passionate professionals!
Encouraging feedback like yours is what drives me to do more. Thank you!!!
You really do a great job in explaining complex concepts for easy understanding. I really appreciate your videos.
Thanks so much for the kind words!!!
Nice job jeff, you really changed the way of understanding these complicated topics and presenting them in very simplified manner, i appreciate it alot!
I’m so glad to hear that!
Thank you for great explanation, sir!
There are so many people out there trying to “teach” and transfer their knowledge to others, but what makes Jeff Crume an outstanding instructor is his approach to always demonstrate the big picture and putting the puzzle pieces together.
Sir, you are setting the bars high for other teachers and the learner community is forever grateful for you.
good
thank you for sharing your knowledge it's very useful
👍👍👍👍👍👍👍👍👍👍👍
This is awesome video how did you do the screen right stuff
Thanks! Search the channel for “how we make them”
when is he going to build his own practical course in cybersecurity?
I deal more with theory/architecture than hands on practice but, that said, there’s a cybersecurity architecture series you might be interested in. Do a search on that term on the channel for the 10-part series.
@@jeffcrume Thanks! I will.
Whatever IBM does these days.... I know they got a good TH-cam Channel 🤞🏾
Thanks for the ez explanation and amazing content
so how does this apply to xdr?
how to draw and write in video in backward?
Search the channel for “how we make them”
@@jeffcrume thanks!
Very good 👍 😊
Great job Jeff . Love this video and knowledge sharing
As always, amazing content. As 3rd year cybersecurity and Forensic engineering student, I really find your videos very helpful. Thank you for being good guys, and learn from you.
Thanks for the great feedback! I’m really glad to hear you find the material useful
Great explanation! Made it lot easier with the analogy
Glad you liked that!
Whoaa. What a awesome content!
Thank you!!!
You know it gonna be an amazing lesson when you see this guy show!
Fantastic explanation! Thank you for the valuable insights in this enjoyable video. 👌
Thank you for saying so!
Link to previous video at minute 1:52?
Super clear !
So all this BS. And in simple terms. Following a set of steps in order.