๐Ÿ’œ Improvements Alert ๐Ÿ’œ

What's Improved?

You asked, we delivered! We've enhanced the Account Intel page with a new Last 30 Days Events tab, making it easier to investigate specific accounts without context switching.

Last 30 Days Events tab in Account Intel

Events tab in Account Intel

Why Does This Matter?

  • Responding to customer feedback, we made it faster and more seamless to investigate account activity.
  • You can now get a fuller picture of account activity in one place - without switching over to Event Explorer.
  • Helps streamline investigations and enhance efficiency when analyzing user behavior.

Check it out and let us know what you think! ๐Ÿš€

๐Ÿ’œ Improvements Alert ๐Ÿ’œ

What's Improved?

  1. Clearer Threat Card Status โ€“ We've updated the UI to make it easier to distinguish between Active and Resolved Threat Cards. Resolved Threat Cards now feature a green line and green text for their resolved status.

    Easy to distinguish between Active and Resolved threat cards

    Easy to distinguish between Active and Resolved threat cards

  2. Better Table Alignment in Event Explorer โ€“ Weโ€™ve fine-tuned the alignment of data in table columns, ensuring that information is clearly readable in the right place.

    :sparkles: Look at those cleanly aligned columns in the Session table :sparkles:

    โœจ Look at those cleanly aligned columns in the Session table โœจ

Why Does This Matter?

  • Faster threat assessment โ€“ The visual update helps you instantly recognize resolved threats, reducing cognitive load.
  • Smoother investigations โ€“ Proper column alignment means less guesswork and faster decision-making when analyzing events.

๐ŸŒŸ New Feature Alert ๐ŸŒŸ

We've made major improvements to how you detect and respond to threats:

  1. New Threat: Breached Since Password Reset โ€“ Detects accounts where the password was reset, but the associated email has since appeared in a breach.

  2. Threats Organized by Severity โ€“ Quickly see which threats need your attention first.

    New threat: Breached since Password Reset

    New threat: Breached since Password Reset

Why Does This Matter?

  • Proactive Security: Catch at-risk accounts even after a password reset.
  • Clearer Focus: The Threats page now directly highlights Critical, High, and Medium severity risks.
  • Faster Response: Prioritize and remediate threats with severity grouping.

Stay ahead of identity threats with these new updates! ๐Ÿš€ As always, we'd love to hear any and all your feedback. ๐Ÿ˜Š

๐ŸŒŸ New Feature Alert! ๐ŸŒŸ

Whatโ€™s New?

  1. OVERVIEW tab โ€“ A dedicated tab that provides key security metrics over a selected date range, helping you track trends and measure progress. Data is available starting from October 1, 2024, the earliest point in our threat records. Of course, we'll be adding more tiles to this overview tab in the future - stay tuned!

    1. Critical Threats: This tile displays the number of critical severity threats that were generated during the date range selected. Critical severity threats indicate compromised accounts, such as Account Takeover and Session Sharing.
    2. High Threats: This tile displays the number of high severity threats that were generated during the date range selected. High severity threats indicate attacks in and on your workspace, such as Brute Force Attack, Credential Stuffing Attack, MFA Fatigue Attack, and MFA Location Mismatch.
    3. Resolved Threats: This tile displays the number of threats that were resolved during the date range selected, broken down by sub-status: Remediated, No Action Taken, or False Positive.
    4. Mean Time To Remediate (MTTR): This tile displays the average time it takes for all threats to transition from Active to Resolved: Remediated, providing insight into your team's threat resolution speed and efficiency.
    5. Rate of Compromise %: This tile displays the number of unique compromised accounts over the number of unique accounts that were attacked over the selected date range, providing insight into the effectiveness of your defenses in preventing account takeovers.
    The new Overview tab helps you demonstrate the impact of your ITDR strategy.

    The new Overview tab helps you demonstrate the impact of your ITDR strategy.

  2. RISKS tab โ€“ The System Overview is now located in the Dashboard as the Risks tab, keeping all critical insights in one place.

Why Does This Matter?

  1. Help C-Suite Gain Measurable Insights โ€“ The Dashboard now delivers a clear view of security outcomes, including reductions in threat-related costs and improvements in operational efficiency.
  2. Demonstrates Business Impact โ€“ Directly see how your investment in Verosint improves security, reduces risk, and enhances ITDR effectiveness.
  3. Better Performance Tracking โ€“ Measure how your security team is managing threats over time, with clearer insights into risk trends and response effectiveness.

Explore the new Overview and Risks tabs in your Dashboard today! ๐Ÿš€

๐ŸŒŸ New Feature Alert ๐ŸŒŸ

Weโ€™ve rolled out major enhancements to Verosint, making it easier to integrate with Microsoft Entra, streamline threat response actions with a new Analyst role, and investigate Account Takeover (ATO) threats with greater context.

Whatโ€™s New?

โœ… Microsoft Entra Integration โ€“ With this integration, you can:

  • Stream Microsoft Entra events into Verosint for proactive threat detection and response
  • Enrich user profiles with key metadata for better visibility and analysis
  • Take action directly from Verosint by revoking sessions or suspending accounts in real time
Set up Threat Response for Microsoft Entra on the Verosint Settings page

Set up Threat Response for Microsoft Entra on the Verosint Settings page

โœ… New Analyst Role โ€“ A middle ground between Read-Only and Admins, Analysts have the complete toolkit for responding to and preventing threats...

... without access to admin-level settings like billing, integrations, or user management.

โœ… Enhanced ATO Investigation โ€“ From the ATO card, you can now use the See More button to pull up the Event Details panel for the exact event where the ATO occurred, giving you deeper context before diving into Account Intel.

See more event details for an Account Takeover threat so you have all the context you need

See more event details for an Account Takeover threat so you have all the context you need

Why Does This Matter?

๐Ÿ”น Stronger security automation with Microsoft Entraโ€™s integration.
๐Ÿ”น More granular role management with Analyst permissions tailored for security teams.
๐Ÿ”น Faster, more informed investigations with direct access to ATO event details.

๐Ÿš€ Start using these features today!

๐ŸŒŸ New Feature Alert ๐ŸŒŸ

You can now integrate Verosint's SIEM Threat Logs with Datadog, making it easier to monitor threats in real-time within your preferred security and observability tools.

Whatโ€™s New?

โœ… Datadog Integration โ€“ Send threat logs directly to Datadog as threats are detected.
โœ… Seamless SIEM Support โ€“ Expand your security visibility by integrating with your SIEM of choice.
โœ… Single Pane of Glass โ€“ View all threats from multiple sources in one place, improving efficiency and response times.
โœ… Built for Enterprise Security โ€“ Enterprise organizations expect ITDR solutions to integrate with their SIEMโ€”Verosint delivers!

Why Does This Matter?

Security teams rely on real-time threat intelligence to act quickly. By integrating SIEM Threat Logs with Datadog, you can correlate threats with broader security events, streamline investigations, and improve response timesโ€”all within your existing security workflows.

๐Ÿš€ Start leveraging the Datadog integration today!

๐ŸŒŸ New Feature Alert ๐ŸŒŸ

Happy Valentine's Day! ๐Ÿฉท ๐Ÿฉท ๐Ÿฉท The Verosint team is bringing you some love with a new threat resolution feature!

Whatโ€™s New?

Once Verosint detects a threat, you can be notified to investigate the details. After you've taken the necessary stepsโ€”whether it's mitigating the risk, deciding no action is needed, or identifying a false positiveโ€”you can mark the threat as resolved with one of these statuses:

โœ… Remediated โ€“ Youโ€™ve taken action to mitigate the threat.
โš ๏ธ No Action Taken โ€“ The threat remains, but no action was necessary.
๐Ÿ”บ False Positive โ€“ The threat was incorrectly flagged.

Resolve threats generated in AI Insights

Resolve threats generated in AI Insights

Click the Resolved view to see all resolved threats

Click the Resolved view to see all resolved threats

Why Does This Matter?

Security teams need clear, actionable workflows to manage threats efficiently. With this update, you can close the loop on investigations, ensuring your security posture remains strong while maintaining a clear log of resolved threats.

๐ŸŒŸ New Feature Alert! ๐ŸŒŸ

You can now configure Verosint to send threat notifications directly to your desired SIEM, starting with Splunkโ€”or use custom webhooks to integrate with other security tools. More integrations are on the way!

Whatโ€™s New?

โœ… Seamless SIEM Integration โ€“ Verosint threat notifications can now be sent to Splunk, keeping security teams informed in real time.
โœ… Custom Webhooks โ€“ Send threat notifications to any system that supports webhooks for flexible integration.
โœ… Single Pane of Glass โ€“ View all threats from multiple sources in one place, improving efficiency and response times.
โœ… Built for Enterprise Security โ€“ Enterprise organizations expect ITDR solutions to integrate with their SIEMโ€”Verosint delivers!

Configure Threat Notifications to Splunk or a custom webhook in Account Settings

Configure Threat Notifications to Splunk or a custom webhook in the workspace Settings

Why Does This Matter?

We heard you! Security teams rely on SIEM platforms and other security tools to centralize alerts from multiple sources. With this update, Verosint seamlessly fits into your existing security operations, helping you detect and respond to threats faster without switching between platforms. Splunk and custom webhooks are just the beginningโ€”more integrations are coming soon! ๐Ÿš€

๐Ÿ‘‰ Learn how to configure threat notifications for Splunk or set up a custom webhook in our documentation.

๐ŸŒŸNew Feature Alert! ๐ŸŒŸ

Verosint Threat Response is Live!

You can now respond to threats in real timeโ€”directly from the Verosint app! Take action instantly to protect your organization.

Whatโ€™s New?

โœ… Real-Time Threat Response โ€“ Investigate and mitigate threats directly from the Verosint application.
โœ… Integration Support for Workforce and Customer Identities โ€“ Available now for Okta Workforce Identity Cloud (Okta WIC) and Auth0 by Okta customers, with more integrations coming soon!
โœ… Powerful Response Actions โ€“ Take immediate action with:

  • Revoke Session(Auth0 by Okta only) โ€“ Logs the user out of a single device using that session.

  • Revoke All Sessions (Supported for both Okta WIC & Auth0 by Okta) โ€“ Logs the user out of all devices.

  • Suspend Account (Supported for both Okta WIC & Auth0 by Okta) โ€“ Logs the user out of all devices and locks the account to prevent future logins.

    Set up the Verosint Threat Response in your workspace Settings

    Set up the Verosint Threat Response in your workspace Settings

Example of a single revoked session triggered in Verosint for an Auth0 user

Example of a single revoked session triggered in Verosint for an Auth0 user

Navigate to the Account Intelligence page to **Revoke All Sessions** or **Suspend Account**

Navigate to the Account Intelligence page to Revoke All Sessions or Suspend Account

Why Does This Matter?

  • You can now detect, investigate, and respond to threats all within the Verosint app, covering the full ITDR lifecycle.
  • These response actions provide the flexibility to contain threats quicklyโ€”whether you need to log a user out of a single device or completely lock down an account.
  • This seamless workflow improves efficiency, reduces response time, and strengthens your organizationโ€™s security posture. Stay tuned for more integrations! ๐Ÿš€

๐Ÿ’œ Improvements Alert!

We've expanded the quick filtering options in Event Explorer to make it even easier to pinpoint relevant events.

Whatโ€™s Improved?

โœ… New Quick Filter: Session Sharing โ€“ Quickly identify events where multiple users share the same session.
โœ… New Quick Filter: Obsolete User Agent โ€“ Spot events associated with outdated or unsupported browsers.

Use the Session Sharing and Obsolete User Agent quick filters to quickly find suspicious activity

Use Quick Filters in Event Explorer to discover suspicious activity quickly

Why Does This Matter?

These new filters help analysts detect suspicious activity faster, improving response times for potential security threats.