Accelerate your Investigations – Associating Assets and Identities to Log Events over Time

We have all been there at some point during a security investigation; staring at a bunch of suspect log events for a specific period of time and trying to figure out who was associated with the IP address found in the event and what asset the IP was assigned to. This task can take security teams hours and hours, depending on the investigation and usually involves trying to manually correlate various different logs or data sets together. However, what if this task could be performed in seconds? Well it can with Aura Asset Intelligence! and in this post, we will show you how this is done and how you can massively accelerate your investigations as a result.

Read more

Aura Integration Spotlight: Cribl

Aura Asset Intelligence has been built with the goal of enabling Security and IT teams to have actionable, accurate and up-to-date asset and identity information through our process of continuous asset discovery for Splunk. This means organizations leveraging Splunk can now have a complete understanding of all of the assets on their network and speed up Security investigations by having actionable and accurate asset and identity information instantly available. This post shines a spotlight on the new integration functionality between Aura AI and Cribl.

Read more

What’s New in Aura Asset Intelligence 2.2

We are excited to announce the release of Aura Asset Intelligence 2.2. This release includes several new feature-rich reports, integrations and performance improvements. The following enhancements will be discussed in more detail in this post:

Read more

Reducing Risk Through Legacy Operating System Detection

In this post we will talk about the new Legacy Operating System Detection Report in Aura Asset Intelligence and how it can be used to reduce risk within your corporate environment.

Read more

Continuous CIS Controls Reporting

In the latest release of Aura Asset Intelligence, we introduced the new CIS Controls Report, which provides continuous measurement of several key CIS Controls that are critical to protecting your organization from cyber attack. This post dives into this feature in more detail.

Read more