Cyware Intel Exchange Integration for Google SecOps SOAR
The Cyware Intel Exchange integration with Google SecOps SOAR enables you to access and manage threat intelligence from Cyware directly within your SOAR workflows. Using this integration, you can retrieve indicator details, update IOC attributes, and automate threat intelligence operations from Google SecOps cases and playbooks.
By connecting Cyware Intel Exchange with Google SecOps SOAR, you can operationalize threat intelligence during investigations and automate response actions across your security environment. For example, you can retrieve IOC context for entities in a case, create new indicators in Cyware Intel Exchange, add or remove indicators from the allowed list, or update indicator metadata.
Use the following information to quickly navigate to the relevant sections and understand how to set up, run, and manage the integration effectively:
Configuration: Set up the integration and provide the necessary credentials to securely connect Google SecOps with Cyware Intel Exchange. For more information, see Configure the Intel Exchange App.
Actions: Perform tasks on Cyware Intel Exchange directly from cases or playbooks, such as retrieving, updating, or managing indicators. For more information, see Invoke Integration Actions.
Playbooks: Automate sequences of actions to streamline repetitive tasks and ensure consistent threat response workflows. For more information, see Playbooks.
Blocks: Reusable sets of actions and conditions that simplify playbook design by grouping commonly used logic. For more information, see Blocks.