About Us

Logpoint announced ChatGPT integration for SOAR 

Logpoint has announced ChatGPT integration for Logpoint SOAR in a lab setting. It will enable users to test the capabilities of the AI-powered chatbot and learn how the technology can be applied in cybersecurity operations. 

Logpoint SOAR automates the investigation of security incidents and provides case management tools to assist analysts in automating incident responses. Logpoint SOAR includes a number of pre-configured playbooks as well as the ability to create custom playbooks for automating detection and response processes. 

Edy Almer, Product Manager for Threat Detection and Incident Response at Logpoint stated, “We’re excited to enable our customers to explore the possibilities of using technologies such as ChatGPT to reduce part of their workload. Staying up to date with technology innovations and trends is imperative to understand how we can continue to improve cybersecurity operations.” 

Customers can explore the potential of using SOAR playbooks with ChatGPT in cybersecurity due to the new Logpoint SOAR and ChatGPT integration. 

  • Saving time on breach reports: Using information from a SOAR playbook, ChatGPT can generate breach report drafts from attacks using information about the main timeline events of an investigation and the severity level. An analyst can then review and approve the drafts before the reports are distributed. 
  • Readable, succinct executive summaries: Long compliance report texts can be fed into a SOAR playbook so that ChatGPT can generate an executive summary of the key findings and suggested corrections that is simple enough for executives to read. 
  • Credible awareness training: The ChatGPT SOAR integration can automate some of the awareness training. ChatGPT generates phishing emails automatically, and the SOAR playbook extracts data from LinkedIn, enriches it with email addresses and connections from previous logs, and sends the phishing email to selected recipients, tracking how many click through and how many alert the phishing response team. 

Christian Have, Logpoint CTO commented, “Our customers are always interested in exploring new technologies, and ChatGPT is no exception. With our new integration, they can test whether the technology could reduce the time spent on an attack summary report, which is legally required in Europe, the US, and Asia, and potentially free up valuable time for security analysts.” 

Efficient incident response with SOAR

Security Operations Center (SOC) in enterprises handles a massive number of alerts daily, manual responses to these alerts are time-consuming and make it difficult for analysts to focus on high-priority tasks. The SOC teams necessitate a solution that can ease the team’s workload and increase operational efficiency, reduce costly repetition, and increase productivity.

Security orchestration, automation, and response (SOAR) platforms collect inputs like alerts from the SIEM system and other security technologies, then perform incident analysis and triage through a combination of human and machine power.

With the help of SOAR tools, an organization can define incident analysis and response processes in digital workflows. Their network and security analysts can gather information about threats from various unrelated sources and use machine learning to automate responses to low-level threats.

Orchestration and automation in SOAR

SOAR enables organizations to collect data about security threats and respond to security events without human assistance. It collects required data through data pipelines and network security and management tool suites, such as SIEMS, firewalls, and threat intelligence APIs. SOAR platforms then perform coordination of security actions to support processes or workflow across multiple tool suites for incident management

SOAR platforms offer better alert management through workflow and collaboration, ticket and case management, orchestration and automation, and threat intelligence management.

The workflow-and-collaboration engine initially requires documentation of workflows or processes but once configured it helps security teams apply detailed workflows consistently. These workflows are then organized and standardized so that all the required professionals, including SOC analysts, IT analysts, and quality assurance staff, are given their part at the appropriate time with the appropriate context.

Ticket and case management helps the SOAR platform identify its ability to address incident case management and provides security teams with the SIRP functionality to track cases, document processes, manage knowledge, and report compliance issues. The case-management system helps other engines by making information or processes available and benefits different sections to enlarge case-relevant information.

Orchestration and automation bring greater efficiency and value to security teams and other users. SOAR platforms connect to other technologies, such as SIEMS or firewalls, to orchestrate. Once connected, it automates security tasks in the various tools within a secure network or adds a layer of abstraction where the security professional can interact with SOAR for better incident response.

Threat-intelligence management helps leverage machine-readable threat-intelligence feeds for aggregation, deduplication, and distribution. SOAR’s connectivity again is a force multiplier, given its connection with other security tools, threat intelligence can be rapidly pushed downstream to a SIEM or firewall.

Benefits of SOAR

SOAR platform offers a number of benefits and can enhance the incident response capabilities of organizations of all sizes. SOAR tools can automatically execute repetitive tasks and improve incident response with seamless tool integration and data reporting. The main benefits of SOAR include:

  • Reduced Manual Operations

It enables SOC teams to perform faster through automated solutions for repetitive tasks, which allows analysts to focus on higher-value work. SOAR tools enable teams of all sizes to handle security processes and incident response in a timely manner.

  • Speed up Incident Response

On average breach goes undetected for 228 days in organizations, which provides threat actors with enough time to harm critical data. Timely remediation of these threats is crucial for the safety of organizations.  SOAR provides security automation and incident response playbooks to build workflows with little human intervention. SOAR enables SOC teams to timely to suspend user accounts, quarantine infected endpoints, and block specific IP addresses.

  • Mitigate Alert Fatigue

SOAR tools also help reduce alert fatigue as SOC teams encounter more than a thousand security alerts per day. With custom dashboards and AI-enhanced detection and remediation, SecOps analysts can spend more time investigating threats based on their importance, rather than scrutinizing through a sea of alerts.

  • Integrate Siloed Tools

SOAR platform integrates a variety of security tools to meet an organization’s unique needs. It offers easy integrations for Cloud Security, Email Security, IT and Infrastructure, SIEM & Log Management, Threat Intelligence, and Identity and Access Management.

  • Easier SOC Reporting

SOC teams can gain access to automatic, reliable reporting, both with easy-to-configure templates and with custom reports. SOC reporting speeds up the incident response process by enabling teams to view all relevant data related to potential breaches as they occur. With SOAR tools, analysts can schedule automatic reports or pull on-demand reports in seconds.

 Enable your SOC Team with SOAR

In today’s volatile and sophisticated environment SOC teams require practical tools to tackle the abundance of incoming threats and security alerts. Security analysts can add SOAR tools to their toolkits to decrease workloads, respond to incidents faster, and automate alert triage, investigation, and response. SOAR platform can be easily customized to fit the varied requirement of organizations like people, security procedures, and technology. Security teams can better utilize their expertise to counter advanced threats and quickly handle alerts without adding additional workload.

D3 Security launched D3 Chronos

D3 Security has introduced D3 Chronos, a simplified SOAR package for managed security services providers (MSSPs) that can reduce alert-handling times by 90% in under two weeks. D3 Chronos is designed to provide return on investment and prioritize MSSPs’ effectiveness and business outcomes, in contrast to full-scale SOAR implementations that can take months. By optimizing the customer-to-analyst ratios, D3 Chronos enables MSSPs to onboard their clients and automate triage, both of which boost profitability. 

Denis Barnett, VP of Sales at D3 Security, “In today’s competitive managed services landscape, everyone needs automation, but not every MSSP has the resources to commit to a full-scale SOAR implementation. D3 Chronos fills a critical gap in the market by making the revenue-generating potential of SOAR immediately accessible to every MSSP without compromising the power of the software.” 

MSSPs can begin saving time and money by connecting D3 Chronos to the alert sources of their clients. The pricing structure of D3 Chronos is flexible, and it includes a pay-monthly option for smaller businesses that fits the revenue cycle of MSSPs while assisting them in reducing capital expenditures. 

D3 Security’s Event Pipeline, a SOAR technology that works globally to normalize, deduplicate, and triage incoming events, filtering out 90-98% of events and removing false positives before they reach a human analyst, recently made a breakthrough that allowed the development of D3 Chronos. 

D3 Chronos is made for busy MSSPs who want to automate their client growth and increase profits. According to D3 Security, automating triage alone can result in annual savings of more than $1 million for an MSSP processing 400 events per day. 

D3 Chronos also automates tracking of client SLAs and billable hours in addition to the triage and enrichment pipeline. When a situation necessitates a second level of investigation, D3 Chronos compiles the findings into a report for the client, saving MSSP analysts a tremendous amount of time. Growing D3 Chronos MSSPs are supported as they develop with new SOAR options that are suited to their requirements. 

Read More : Security Automation & Orchestration (SOAR)

Security Orchestration, Automation, and Response (SOAR) – Buying Guide

Purchasing a Security Orchestration, Automation, and Response (SOAR) platform is a smart and strategic move. Selecting a system for building a security operation center (SOC) is perhaps more crucial than selecting a specific security solution. The SOAR system becomes a central and critical component of an organization’s cybersecurity, serving as the operating software for its security environment.

The Power of Automation

When the SOC identifies a threat, the security incident response might mean the difference between containing the danger and allowing a devastating data breach to occur. Because manual processes take longer to respond, cybercriminals have more time to cause damage. Common inquiries and reactions can be automated to decrease response times and risk to the organization. While buying SOAR solution organizations should look for vendors who have powerful automation systems with highly efficient machine learning algorithms.


Orchestration is an approach that links tools, integrates systems, and eventually simplifies and automates activities and it is a critical aspect in determining an organization’s security operation readiness. The security procedures should always be examined and improved to improve performance. Codifying these processes allows businesses to make substantial progress in reducing risk. Organizations should look for SOAR solution providers whose system easily connect or integrates with security systems. The SOAR solutions security processes must be easy to code and improve.

Automation Use Cases

Each security incident is turned into a case that is managed by the SOC and several other departments within the company, including, network operations, IT operations and legal. When a security organization has few established processes, employee wisdom becomes the vehicle for completing tasks. This only helps as long as the team stays together. If someone goes, they take their knowledge, skills and experience with them. Analysts can decrease incident reaction time with pre-packaged, customized automation. Case books or prepared procedures are used in automation use cases. This helps to retain internal knowledge. Automation frequently conjures up images of abrasive defences. The use cases for different sectors like medical, pharma, logistics and IT will be different. An organization should look for vendors who have rich and industry-related use cases.


The dashboard should be professional and simple to use. Analysts should be guided by intuitive workflows and information reports rather than having to comprehend the underlying data architecture. Security Staff in the SOC should be able to work naturally, assigning and completing tasks without thinking about the tool. To enhance event investigation, powerful search capabilities and single-click capability should be accessible. 

Customizability and Flexibility

Choosing a SOAR solution that provides a high degree of customization and flexibility is always a good option. A good SOAR solution will allow an organization to integrate with other security technologies easily and provide an easy-to-use user interface.


The cost of SOAR varies depending on the size, capability of the network, use cases and power of automation. It’s important to note that a SOAR solution must comply with other security solutions. Because SOAR systems have an expiration policy, which means the vendor will no longer support them, the cost and frequency of system upgrades must be considered. How much money firm is ready to spend? What are the benefits company is going to receive?

Security Support and Maintenance

The second step after selecting a SOAR solution is to implement and support it. In order to be effective, SOAR must be administered by committed trained staff or added to the responsibilities of professional employees. Does the vendor provide training to security teams? There are disparities in terms of costs and levels of service assistance. It’s essential to look into the type of assistance that a particular vendor offers. In any case, comprehensive technical support is an optional extra that could dramatically increase implementation expenses.

The SOAR solution operates as a strategic instrument for the security team, allowing it to accomplish more with fewer resources while freeing up important analyst time from data overload, dull and repetitive activities. It enables the security staff to be more useful and accurate. Using this solution would surely shorten the time it takes to detect and resolve threats, boost the return on existing security solutions, and lower the risk posed by security incidents.