The threat data and cyber alarms creates a huge volume of incidents to work on that. Each and every single cases creates more data when working on a single case. All activities must be recorded to the platform and it may turn some meaningful views when needed such as dashboards or reports.

In many SOC settings today, the activities taking place during an investigation are not logged and it is impossible to keep a trail of previous actions, whatever the results and timings. When such critical information is missing, it is almost impossible to collect detailed metrics on the investigation processes, hence come up with essential KPIs. This does not only adversely impact the SOC governance, but it also leads to consequences for auditability.

ATAR® allows to watch all different performance or workload criteria by using dashlets in different dashboards. It is easily measured the SLA times and efficiency of Analyst. By using ATAR® you get a report for your needs. ATAR® Labs builds next generation Cyber Security Operations Center (CSOC) platforms. Our flagship product ATAR® helps CSOC teams improve their efficiency in responding to cyber attacks using various and diverse forms of automation.

ATAR® also helps SOC managers better govern their business by providing insight and accountability to SOC processes.

Automation and the analysts using the ATAR® interface are logged at all times.

Such trail of activities are used for metrics collections. A typical SOC can answer the following questions with ease:

* Are we able to hit our SLAs?
* What is the breakdown of incident types that we analyze?
* Can we see the analyst’s workload distribution in real time?
* Is our incident backlog growing or shrinking?

ATAR® collects these answers and many others responding to 20+ other questions key indicators and allows them to be shown on operational dashboards.
ATAR® collects KPIs and metrics on SOC processes. These allow insight and guides better strategic decisions. Is your incident backlog growing or shrinking? Are you able to hit your differetiated SLAs? Which of your analysts are slower than others?
ATAR® provides SOC managers with a single pane of glass to understand what is really happening. From charts to push to videowall screens to metrics for strategic decisions, ATAR® quickly becomes indispensable for SOC Managers.
ATAR® stores all investigation activities, collected data and artifacts (e.g. malware samples) in its database. Auditors love ATAR®, as there is a complete history for all incident investigations, even for the ongoing ones. An internal or 3rd party auditor can randomly pick a group of incidents, only to find a perfect review: how did the incident occur, who handled the triage, who was in charge of the investigation or how long did every single individual activity take. Individual accountability has never been so easy in SOCs.
ATAR® comes with a pre-package of 25 different dashlets visualizing different aspects of SOCs distilled in metrics. These dashlets can be mixed and matched to build multiple different dashboards; a SOC analyst can see his or her stats, whereas a SOC Manager can see the big picture of things.

Subscribe to our email newsletter
to receive updates.