No more typing reviews! Try our Samantha, our new voice AI agent.

Peter | SOC | SOAR | AI

  • CEO at DTonomy
  • Has 10+ Years Of Experience
Badges
90 Points3 YearsTop 20
User Activity
Over 3 years ago
UEBA for firewall analytics or are you talking about anomaly detection for firewall traffic behaviors?  
Over 3 years ago
"SIEM" and "Next-Gen SIEM" are often used in marketing and may not have a clear definition. Each vendor may have their own interpretation of these terms. The main difference between SIEM and Next-Gen SIEM (often called XDR) is the responsibility for creating security…
Over 3 years ago
I noticed that you mentioned a few SOAR vendors in the list, however, I would like to bring to your attention that Critical Start, Exabeam Fusion, and McAfee ePolicy are not SOAR providers.
Over 3 years ago
There are various approaches that organizations can take to help ensure that alert severity is properly assessed and to mitigate the impact of alert fatigue - One approach is to use a standardized system for evaluating and assigning severity levels to alerts. For example,…
Over 3 years ago
Advanced SOAR.  It has no-code automation but also has intelligence embedded to auto correlate alerts like XDR does.  Something between SOAR and XDR. 
Over 3 years ago
@Maged Magdy agree. These playbooks are a good starting point and need to be customized. 
Over 3 years ago
An incident response playbook is a set of pre-defined steps and procedures that outline how to respond to a specific type of security incident. The playbook typically includes detailed instructions on how to identify, contain, and remediate the incident, as well as any…
Over 3 years ago
We've worked in SOC for many years. Here are a few pain points in SIEM solution purchases Difficulty evaluating and comparing different SIEM products: With a large number of SIEM products on the market, it can be challenging for organizations to determine which product is…
Over 3 years ago
SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) are both tools used in cybersecurity to monitor and respond to security threats. However, they have different primary functions and use cases SIEM is primarily used…
Projects
Over 3 years ago
1) Ph.D. in computer science. 2) leader in
1) Ph.D. in computer science. 2) leader in the field of security operations analysis and data science at Microsoft. 3) five-time patent holder. 4) founder of Dtonomy, a security orchestration, and automation company.
Experience
Other Skills
connectwise, elastic , dtonomy, sumologic
Answers
Over 3 years ago
User Entity Behavior Analytics (UEBA)
Over 3 years ago
Security Information and Event Management (SIEM)
Over 3 years ago
IT Alerting and Incident Management
Over 3 years ago
Security Information and Event Management (SIEM)
Over 3 years ago
Security Information and Event Management (SIEM)
Comments
Over 3 years ago
Security Orchestration Automation and Response (SOAR)
About me
Interesting Projects and Accomplishments