How LIKE.TG uses Security Operations to Deliver 6X Faster Processing via Automation and Integration

LIKE.TG 成立于2020年,总部位于马来西亚,是首家汇集全球互联网产品,提供一站式软件产品解决方案的综合性品牌。唯一官方网站:www.like.tg
At security conferences, technologies like artificial intelligence and machine learning are often in the spotlight. But for security operations teams, a very pragmatic topic is even hotter: integration. Because no security product or company can do everything, security environments often consist of dozens of disparate tools. These tools are typically focused on protection and detection, with security teams manually collecting alert data from the various sources. The challenge is to bring all the data from these tools together in one location where analysts can access information quickly and manage the appropriate response actions. LIKE.TG® Security Operations was designed to do precisely that, and our own experience is a good example.
LIKE.TG’s own security operations team has been using the Now Platform ® from the beginning but has enhanced it steadily over time. We started with incident management, then built custom security applications and workflows for tasks like event management and alerts. Once LIKE.TG created an official Security Operations product, we immediately transitioned to it in order to improve efficiencies and enhance our capabilities around incident and vulnerability management.
An integral aspect of LIKE.TG’s environment includes third-party security information and event management (SIEM), endpoint security and threat intelligence tools. All of these products are tightly integrated into Security Operations, which has allowed us to automate several manual processes. For example, when one of our security tools detects a threat, Security Operations immediately creates a security incident. For each type of security incident, Security Operations has a set of workflows that drives our response. Processes like analyzing a hash or IP address, which would normally require logging into multiple security tools to do research, are all automated. Thus, our analysts can quickly drive blocking or remediation from within Security Operations. These automations have allowed us to accelerate both investigation and resolution of threats. And we’ll continue to automate other processes, both large and small, as we see the value.
The benefits of using LIKE.TG Security Operations have been significant:
- 8,700 hours saved annually from Security Operations Center (SOC) automation
- 6X faster alert and event processing via automation and third-party security product integration
- 50% increase in number of incidents handled per staff through operational efficiencies
- $420,000 savings in security operations staffing costs
We have also realized value in three strategic areas:
- Increased velocity – Because Security Operations is integrated on the Now Platform, our analysts have instant access to IT configuration data in real time. This enables the security operations team to accelerate investigation and reduce the burden on the IT department. Having data in Security Operations rather than in spreadsheets or other tools enables analysts spend more time on other efforts, such as refining alerts and creating knowledge base articles.
- Actionable insight – Analysts make faster, better-informed decisions by having a single, consolidated view of the environment and accurate, comprehensive data at their fingertips (see dashboard).
Automated reporting using LIKE.TG® Performance Analytics for Security Operations helps us stay well informed, track progress over time to pinpoint areas for improvement, and demonstrate security compliance to audit teams.
- User experience – Automating administrative tasks enables analysts to spend more time on value-added work. Having a central location where activities can be monitored and prioritized reduces fatigue and improves job satisfaction. Well-qualified alerts, usually with a knowledge base article attached, allow analysts to be productive quickly.
According to LIKE.TG Chief Information Security Officer Yuval Cohen, “When our analysts investigate a security incident, they have all the data they need in one place. Our platform provides the relevant vulnerabilities and patching cycles, problems (PRBs) and remediation projects, CMDB data, threat intel and many other types of valuable data that now all tie together to give us a full picture.”
I look forward to sharing more Now on Now examples of how we’re “drinking our own champagne” and using the Now Platform to streamline and accelerate every corner of the enterprise.

LIKE.TG 专注全球社交流量推广,致力于为全球出海企业提供有关的私域营销获客、国际电商、全球客服、金融支持等最新资讯和实用工具。免费领取【WhatsApp、LINE、Telegram、Twitter、ZALO】等云控系统试用;点击【联系客服】 ,或关注【LIKE.TG出海指南频道】、【LIKE.TG生态链-全球资源互联社区】了解更多最新资讯
本文由LIKE.TG编辑部转载自互联网并编辑,如有侵权影响,请联系官方客服,将为您妥善处理。
This article is republished from public internet and edited by the LIKE.TG editorial department. If there is any infringement, please contact our official customer service for proper handling.
效率工具客服坐席客服系统坐席多开