HYAS Insight and King & Union Avalon Cyber Analysis Platform Integrate To Speed Cybersecurity Investigations
Integration enables security teams to better visualize, investigate, and collaborate on investigations
HYAS, a leader in threat intelligence and attribution, and King & Union, creator of the Avalon Cyber Analysis Platform, today announced integration of their products to enable faster and more accurate cybersecurity investigations. Through this collaboration, Avalon customers using HYAS Insight can visualize intelligence, enabling analysts to efficiently prioritize security responses and threat investigations via custom-built capabilities.
Read More: Tips To Maximise Online Sales For Ecommerce Businesses During Downtime
Cybersecurity professionals struggle to connect specific attack instances and campaigns to billions of historical indicators of compromise. This integration pairs HYAS’ unparalleled threat intelligence with the Avalon Cyber Analysis Platform’s enrichment user interface and easy visualization of data sets, enabling swift, accurate, and efficient fraud and actor attribution research. Avalon enhances the HYAS Insight experience by streamlining queries into simple use-case-based query calls and allows investigators to easily enrich the data using additional data sources, collaborate with others, draft context-specific reports, and tie finished data directly back into the security stack for immediate action.
“King & Union provides an exceptional integrated platform which enables security teams to collaborate and accelerate investigations,” said HYAS CEO, David Ratner. “We are excited to embark on this unique partnership which integrates HYAS Insight data into the Avalon platform.”
“King & Union strives to provide security analysts with the high-quality threat intelligence, tools, and collaboration they need and bring them together in a single, integrated platform to help make their lives easier,” said John Cassidy, CEO, and Co-Founder, King & Union. “Our integration with HYAS enhances analyst access to telemetry and provides the depth of threat intelligence they need for accurate, thorough investigations that can arrive at attribution.”