On-Demand-Webinar: Protect Your External Attack Surface: Findings and Best Practice in 2024  Register now >>

Sweepatic Logo in white

Sweepatic EASM Platform offers Cortex XSOAR integration

A new addition in the Sweepatic integrations stack: Cortex XSOAR. Connect the Sweepatic-discovered issues and misconfigurations with your orchestration platform.
Sweepatic - Palo Alto Cortex XSOAR integration

How does it work

Palo Alto Networks’ extended security orchestration, automation and response platform helps security professionals with taking action against bad actors across their organization.

The Sweepatic EASM solution is a key data source regarding your organization’s external attack surface with insights about exposed assets, vulnerabilities, misconfigurations, hygiene issues, reputation problems and encryption risks.

You can configure the Cortex XSOAR integration in our integrations module, using your organization’s Cortex XSOAR domain and a newly created API key.

These can be created in the security tab (Settings > Integration > API keys) in your Cortex XSOAR instance. For the set-up, the Cortex XSOAR user should have “write” permissions to allow the creation of “incidents” and “incident types”.

That’s it, the Sweepatic prioritized observations are now orchestrated directly in the incidents of your Cortex XSOAR instance.

Benefits

Customers that use the Sweepatic – Cortex XSOAR integration in their cybersecurity workflow, can directly ingest the Sweepatic data on internet-facing assets and external attack surface issues to enrich and orchestrate the follow-up on their incidents.

Thanks to this integration, IT security professionals save a lot of time, leading to faster response times and ultimately a more cyber-resilient organization.

More information on Sweepatic.
More information on Cortex XSOAR.

Want to know more?

Sweepatic is specialized in External Attack Surface Management. Our cloud-native platform will get your organization up and running with EASM in no time.

Curious to see what your external attack surface looks like? Book a personalized demo and follow us on LinkedIn and Twitter to stay in the loop.