PagerDuty has created a partner ecosystem around a PagerDuty for Security Operations initiative based on the company’s incident management software.
The PagerDuty incident management platform now supports over 25 new and existing integrations addressing security information and event management (SIEM) (Sumo Logic, LogRhythm, Logz.io, AlienVault an AT&T Company); security orchestration, automation, and response (SOAR) (Demisto, Swimlane, Cybersponse, DFLabs); threat Intelligence, cloud and application Security (Twistlock, Threat Stack, Aqua Security, Templarbit, Signal Sciences); endpoint and network security, vulnerability Management (Expel, Nucleus); and cloud compliance (CloudGuard Dome9 from Check Point).

PagerDuty is looking to make it simpler for its end customers to embrace best DevSecOps process that makes addressing cybersecurity issues a natural extension of a quality assurance process, says David Cliffe, a product manager for PagerDuty.
The PagerDuty software first synthesizes all the alerts generated by the cybersecurity tools in the environment to reduce cybersecurity fatigue, says Cliffe. That aggregated data can then be fed back into an integrated DevOps process to help developer prioritize which vulnerabilities need to be addressed first, adds Cliffe.
“It creates a feedback loop,” says Cliffe.
Many IT organizations are now in the early stages of shifting responsibility for implementing security controls on to application developers. That approach not only leads to more secure software being deployed in the first place; it also over time lightens the load for cybersecurity teams that are already overtaxed.
The PagerDuty incident management platform is already employed by over 10,500 organizations. The goal now is to extend the reach of that incident management platform to include security events. The PagerDuty ecosystem should also make it easier for channel partners to build a practice dedicated to teaching organizations how to leverage DevSecOps processes wrapped around an incident management platform. The challenge, of course, will be finding the IT organizations that are willing to embrace that level of change to application development and deployment practices that by any cybersecurity measure are known to be seriously flawed.
Be First to Comment