Automatic Security Telemetry Enrichment

Security teams are often overwhelmed by a flood of data from various tools that lacks the external context needed to prioritize threats. By integrating real-world threat intelligence into your existing security systems, you can transform these raw alerts into clear, actionable insights. This shift allows analysts to move away from simply reacting to data and instead focus on making faster decisions and automating responses to sophisticated attacks.

How can Google Threat Intelligence help?

Google TI is designed to integrate directly into your security ecosystem, enriching your internal telemetry in real-time. By leveraging our API, you can automate the process of adding deep, multi-angular context to your alerts, empowering your team to work more efficiently and make more confident decisions directly within their existing workflows.

Alert Triage & Prioritization provides immediate context for raw alerts, such as verdicts and actor profiles, allowing analysts to focus on the most critical threats without switching between tools.

This process transitions into Automated Investigation & Response, where that same intelligence is used to automatically enrich data in your SIEM or SOAR and trigger pre-set playbooks. By integrating high-confidence IoCs and vulnerability data directly into your security controls, you can operationalize threat data at machine speed and automate responses to real-world attacks.

Use Cases

Enriching alerts in SecOps

A high volume of alerts is flooding your security tools. You need to cut through the noise and quickly identify which alerts represent a genuine, high-priority threat.

How to do it?

  1. Navigate to the SecOps Marketplace and search for the Google TI integration.
  2. Install the integration and configure your API key in it.
  3. Create a Playbook including the IOC enrichment action.
  4. Configure the trigger of the playbook to be executed on every new case that contains IOCs, or trigger it manually on each case.