General DocumentsUse CasesCyware ProductsCyware ProductsSee the popular categories and use cases.Cyware Situational Awareness Platform (CSAP)Use CasesBest Practices for Building an Information Sharing CommunityPublish XML Advisories from your Mailbox as CSAP AlertsUse the ATT&CK Navigator with Cyware ProductsDecode STIX package Intel to Snort Detection Rules using Generative AICyware Threat Intelligence Exchange (CTIX)Use CasesAutomated Indicator Sharing with CTIXAutomatic Scoring of Ingested Threat IndicatorsHub and Spoke: A Bidirectional threat intelligence exchange modelAutomate Intel Enrichment, Correlation, Analysis, and Actioning using CTIX RulesUse the ATT&CK Navigator with Cyware ProductsDecode STIX package Intel to Snort Detection Rules using Generative AIAutomatically Detect Critical Threats using Real-time Threat HuntingAutomatically Detect Account Takeover Attacks and Respond EffectivelyCyware Fusion and Threat Response (CFTR)Use CasesManage Incident Workflows and Mappings with CFTR's Form ManagementAccelerate Threat Response using CFTR’s Machine LearningAutomate Threat Response in CFTR using PlaybooksUse the ATT&CK Navigator with Cyware ProductsAutomatically Detect Critical Threats using Real-time Threat HuntingAutomatically Detect Account Takeover Attacks and Respond EffectivelyOrchestrateCompliance Monitoring and Asset SynchronizationAutomated Phishing Email Analysis and ResponseBlock High Confidence Score IndicatorsBlock Malicious Hashes on CrowdstrikeBlock Malicious IP on AWS from EmailBlock Malicious Threat Indicators on Blue CoatBrute Force Attack Prevention | Cyware Use CasesConduct Comprehensive Investigations on QRadar Offenses with CFTRCredential Compromise Attempt Detection and ResponseDetect, Analyze, and Action on Malicious Process Detected by EDREnrich IOCs from Ivanti ITSM IncidentEvent Logging Interruption Alert Analysis and ActionUsing AWS WAF for Exploit Attempt Alert and ActionUnauthorized AWS Security Group Creation NotificationDevo SIEM Integration with Cyware PlatformOnboard AWS Guardduty Alerts to CFTROnboard Incidents from Microsoft Azure SentinelOnboard Incidents from Microsoft Cloud Access Security Broker (CASB)Onboard Incidents from CrowdStrike Endpoint DetectionServiceNow Incident Onboarding | Cyware Use CasesRansomware Detection and Response | Cyware Use CasesEmployee Phishing Training through SimulationSplunk Retrospective Search Threat HuntingCyber Threat Hunting | Cyware Use CasesThreat Intelligence Enrichment Process AutomationVulnerability Management Process - IBM X-ForceVulnerability Management Process - QualysVulnerability Management Process - TenableSCPerform Malware Analysis on Phishing Emails using Joe Security SandboxOnboard Fraud Detection Alerts from Flashpoint to CFTRSearch Affected Users and Block Malicious Emails on Mimecast Email GatewayAutomated Online Brand Protection and Domain Take-Down ActionDetect Unusual Behavior of Users, Entities, and RespondAssess Third-party Supplier Risk and Respond to Critical VulnerabilitiesEnrich and Onboard Proofpoint Email Attack Alerts to CFTRDetect Domain Infringement Attempts and RespondAutomatically Triage Compromised Credentials and Protect your AccountPublish XML Advisories from your Mailbox as CSAP AlertsProactively detect, prioritize, and respond to cloud security threatsDefend against cryptojacking attacks and protect your InfrastructureDecode STIX package Intel to Snort Detection Rules using Generative AIAutomatically Detect Critical Threats using Real-time Threat HuntingAutomatically Detect Account Takeover Attacks and Respond Effectively