D3 users can ingest endpoint alerts from Carbon Black automatically or through manual escalation. D3 then enriches and contextualizes the event. If the event is deemed a true positive, D3 triggers an automated response playbook or assignment to an analyst for further investigation or approval. The playbook will orchestrate remediation actions through Carbon Black, such as quarantining affected endpoints.
Using D3 and Carbon Black as an integrated threat hunting solution speeds the investigation of new threats by streamlining the entire process from learning of the threat, to finding instances of it on endpoints, to quickly remediating it. All this can be orchestrated from D3. Being able to build and trigger threat hunting playbooks in D3 also helps ensure consistency and reduce human error.
Our Connected SOAR Security Alliance brings hundreds of vendors together, allowing customers to benefit from our deep industry relationships and fully vendor-agnostic, independent SOAR platform.