Security Orchestration Automation and Response system covers three major functions: response, orchestration and automation of IT security.| Sekoia.io
STIX is an open standard describing objects of interest in the field of defensive computer warfare, and the links they can maintain between them.| Sekoia.io
Cyber Threat Intelligence (CTI) defines cyber threat research, analysis and modeling. It'is used to prevent and detect computer attacks.| Sekoia.io
Security Operations Center is an organizational structure dedicated to the implementation of an organization's security against cyberattacks| Sekoia.io
Our XDR platform allows you to secure your environments from a single platform. It is suitable for both managers and security teams.| Sekoia.io
Indicator of compromise is qualified technical data that makes it possible to detect malicious activities on an information system.| Sekoia.io