Back to the Future of Firewall
June 15, 2021
Introducing our new Senior CISO Advisor, Bruce Brody
June 16, 2021

SecureX threat response Turnkey Integrations

SecureX turns one year old next month. It has been quite a journey from the first announcement at RSA Conference 2020, when there was one 3rd party integration (VirusTotal), to the release of SecureX the summer of 2020 with a large ecosystem. When SecureX was launched, we had several turnkey partner integrations into SecureX, like the Splunk add-on and QRadar extension. However, for all other SecureX threat response 3rd party modules, there was a requirement to deploy code from GitHub to a relay server (self-hosted by the user or a cloud, like AWS) so the APIs could communicate with each other and translate the threat intelligence.

Now, all Cisco-supported integrations in SecureX are turnkey/out-of-the-box. No configuration is required, just enter your API key. For those who would like to host their own integrations, tinker/hack around some code and/or build your own integrations, we continue to post the code to GitHub for educational purposes. The training and documentation resources of DevNet remain available. Cisco Secure is committed to an open and robust ecosystem, as explored in the ESG Showcase paper.

SecureX Integration Modules
SecureX Integration Modules

Nearly a dozen free/community security technology integrations are included, with details on how to set up your own free account.

urlscan.io Add New Module
urlscan.io – Add New Module

And, then just paste in the API key and click Save.

urlscan.io API Key
urlscan.io – API Key

In just a few moments, you will have the new integration available to you in an investigation, with critical context visualized, such as related malicious URLs and hash values, and if your network is affected (if you have Target information from Cisco Secure Endpoint, Secure Firewall or other target sources).

urlscan IP Address
urlscan – IP Address

From there, you will be able to take immediate response action, such as blocking an IP address on your firewall.

Response Action
Response Action

In case you missed it, here are some of the latest integrations with SecureX:

Splunk CESA

Cisco and Splunk Logos - Better Together Cisco Endpoint Security Analytics (CESA) delivers Cisco AnyConnect endpoint data to prebuilt Splunk analytics and dashboards. This add-on enables SecureX threat response investigations to access telemetry that has been generated by the AnyConnect Network Visibility Module. Supported observable types include IPv4 addresses, IPv6 addresses, domains, file names and SHA256 file hashes. The extension for Splunk is also available for download.

 

IBM X-Force Exchange

IBM Security Logo IBM X-Force Exchange integration in SecureX enables an investigator to query X-Force Exchange for observables (IP, IPV6, Domain, URL, MD5, SHA1, SHA256) and return verdicts to SecureX threat response, based on the Risk Score. Be sure to view our demo video of IBM QRadar – SecureX – IBM X-Force Exchange for additional information.

 

Bastille Networks

Bastille Networks Logo Radio frequency (RF) network and device data collected by Bastille Networks are available in SecureX threat response as an integrated source. Data includes: RF Device location information RF Device packet information RF Network connectivity Data is available on a number of RF protocols including Cellular, Bluetooth, Bluetooth Low Energy, Wi-Fi, and IEEE 802.15.4 RF information can be cross-referenced back to an endpoint on your network using the SecureX Threat Response Bastille integration.

 

Vade Secure IsItPhishing

Vade Secure IsItPhishing Logo Vade Secure’s IsItPhishing API provides a quick way to lookup a URL to determine if it is phishing. SecureX threat response user initiates an investigation via the UI or API, and module returns Judgement and Verdict. More details are available.

Palo Alto Networks AutoFocus

Palo Alto Networks Logo SecureX threat response queries Palo Alto Networks AutoFocus for Sightings, Targets, and Judgements as well as any observable relations (such as name of SHA256, IP hosting a domain, etc.). Investigator has the ability to pivot into AutoFocus for additional context. Take a look at our GitHub page for more information.

Sixgill Darkfeed

Sixgill Darkfeed Logo Block threats and enrich endpoint protection in real-time, straight from the SecureX dashboard with Darkfeed. Powered by Sixgill’s unparalleled deep and dark web automated collection, SecureX users can now:

1. Automatically Enrich IOCs from Cisco Secure X (machine-to-machine)
2. Gain unparalleled context with essential explanations of IOCs (hash/url/domain)
3. Enhance Cisco SecureX with seamless integration of real-time contextual data from the most comprehensive coverage of deep and dark underground sources
4. Proactively analyze and investigate new malware threats as they emerge
5. Get actionable insights to effectively mitigate threats and better understand malware TTPs and trends
6. Easily & intuitively visualize your threat map

 

As the SecureX ecosystem turns one year old, look for more integrations to be released this summer. If you have a favorite security tool that is not currently integrated in SecureX, encourage them to check out the resources on DevNet and GitHub, and then drop us a note. The Cisco Secure Technical Alliance is  comprised of 200+ companies / 350+ integrations, growing and open to those security companies who are working to solve problems and help build a more secure and inclusive future for all.

 


We’d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!

Cisco Secure Social Channels

Instagram
Facebook
Twitter
LinkedIn