Auguria, Inc. announced the latest version of its Security Knowledge Layer
Platform. The newly enhanced platform can now integrate with some of today's
biggest data sources, including SentinelOne, CrowdStrike, Palo Alto Networks,
and Microsoft Windows Event Logs. Auguria also unveiled its Explainability
Graph Feature, a trailblazing tool that provides visual, context-rich threat
data for security teams.
Expanded Integrations: Unlocking the Power of Leading Data Sources
Security teams process an average of 78 trillion signals
per day across various platforms, making it difficult to sift through data and
identify potential threats. Auguria now integrates seamlessly with the below
key data sources, enabling organizations to harness richer insights and
operational efficiencies:
- SentinelOne: With SentinelOne Singularity platform's
industry-leading endpoint detection and response (EDR) and threat
telemetry, Auguria users gain advanced enrichment, data compaction, and
alert correlation, resulting in alert fatigue reduction and enhanced SecOps
efficiency.
- CrowdStrike: Auguria now supports CrowdStrike Falcon platform's
EDR data, providing AI-driven prioritization and actionable intelligence
for faster, more accurate incident response.
- Palo Alto
Networks: The integration brings
world-class firewall and network telemetry into Auguria's Security
Knowledge Layer, enriching Palo Alto Networks data with contextual
intelligence, noise reduction, and prioritization for faster incident
investigations.
- Microsoft
Windows Event Logs: Often
overwhelming in volume, Windows Event Logs are transformed into actionable
insights, with Auguria filtering out noise, enriching data, and surfacing
critical events for review.
These integrations enable SecOps teams to consolidate, prioritize,
and analyze data from multiple sources within Auguria's platform, reducing
complexity and enabling faster, smarter security decisions.
Introducing the Explainability Graph
Auguria's Explainability Graph is a pioneering feature designed to
visualize threat data, providing security teams with an intuitive and
contextual map of anomalous activity. It provides a detailed yet easy-to-digest
representation of suspicious or anomalous activity, helping teams to:
- Uncover
Root Causes: Understand the "why" behind
unusual behavior or threats.
- Connect the
Dots: Identify the underlying
relationships between seemingly isolated events.
- Act
with Confidence: Gain actionable insights to
mitigate emerging threats faster.
With the release of Explainability Graph, Auguria is demonstrating
its data science prowess at being able to coalesce and relate millions of
streaming log events. The result: security teams can stay ahead of increasingly
sophisticated threats with minimal friction.
Why These Updates Matter
"Our latest integrations and Explainability Graph reinforce
Auguria's mission to simplify security operations while amplifying outcomes,"
said Chris Coulter, CTO and co-founder at Auguria. "By supporting industry
leaders like CrowdStrike, Palo Alto Networks, Microsoft and SentinelOne and
innovating with tools like our Explainability Graph, we're giving organizations
the clarity and precision they need to succeed in today's complex threat
landscape without being overwhelmed by noise."
Key Benefits for SecOps Teams
- Cost
Efficiency: Reduce SIEM and data storage
expenses by intelligently managing less-critical telemetry.
- Noise-free
Insights: Automatically filter up to
99% of non-actionable data.
- Faster
Investigations: Enriched, prioritized data
accelerates response times.
- Proactive
Threat Hunting: AI-driven detection of
anomalies and high-risk behavior.