D3 Security Partner
Support via Micro Focus Software Support, with a ticket filed against the associated product.
Micro Focus offers a content partnership program for select partners. Support for Partner Content offerings is provided by the partner and not by Micro Focus of the Micro Focus community.
Micro Focus Community Content is provided by Micro Focus for the benefit of customers, support for it is not available via Micro Focus Software Support but through specific community content forums.
Community Contributed Content is provided by Micro Focus customers and supported by them.
The D3 Incident Response Platform is the only SOAR tool that combines security orchestration with robust case management, in an intuitive, battle-tested and highly scalable solution.
The platform combines security alerts from Micro Focus ArcSight ESM with threat intelligence and other products, in order to seamlessly automate the analysis and response process.
Users can respond with guided playbooks based on leading methodologies, which are fully or partially automated. D3's applet library features 200+ out-of-the-box integrations, while still allowing analysts to write and execute their own scripts. A visual playbook editor gives users a dynamic interface for building response processes, including for on-the-fly scenarios.
A robust case management and collaboration system serves to streamline and automate the compliance, audit and privacy management obligations related to cyberattacks and security incidents. Unlike any other product, D3 automates both the security and compliance/documentation requirements; enabling truly 'full-lifecycle' incident management.
The combination of Micro Focus ArcSight ESM and D3 provides advanced threat detection with efficient workflows and playbooks. Analysts can seamlessly move from detection, through analysis, and remediation within a single platform.
The ability to correlate events and IP addresses in Micro Focus ArcSight ESM with previously pushed incidents and cases in D3 provides investigators with powerful tools to look for persistent threats and threat actors.
CEF Integration Guide
Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox