Skip to content

Explore Tidal Cyber with our Demo Video Library

  • November 12, 2024

Are you interested in digging a little deeper into how Tidal Cyber works? Our video library of brief demo tours shows how Tidal Cyber empowers security teams with Threat-Informed Defense. Each video dives into a different aspect of Tidal Cyber Enterprise Edition, so that in 5-minutes or less you can understand how to use a specific capability and the value it delivers.

 

Tidal Cyber: “Out of the Box” Value

If you’re new to Tidal Cyber, walk through an overview of the “out of box” value of the platform with Frank Duff, our co-founder and Chief Innovation Officer. Learn how to make MITRE ATT&CK® more actionable than ever with access to a constantly growing library of Tidal-curated threat content, updated every week to fill the gaps in between MITRE ATT&CK’s twice-a-year updates. Develop a customized threat profile for the threats and the behaviors you care about. With a few clicks, compare your entire defensive stack (e.g., CrowdStrike, SentinelOne, and Wiz) against relevant threats and generate a coverage map and a Tidal Confidence Score™ to gain visibility into your attack coverage. Get immediate answers, understanding what your actual coverage looks like and recommendations for how to improve with the tools that you have.

 

Tidal Cyber: How to Configure a Defensive Stack in Enterprise Edition

In this video James Juran, Senior Director of Product, shows how easy it is to add your custom defensive stack in Tidal Cyber Enterprise Edition. Simply choose the products to include in your defensive stack from categories including Aggregation, Email, Endpoint, Identity, Network, Cloud, Test, and others. Then, select each product’s capabilities that are available to defend your organization, and the efficacy-level based on your experience with the product in your environment. For products with many capabilities, integrations can help you pull these into the platform automatically. Once your defensive stack is built in Tidal Cyber, you can toggle settings within your current products to see how the efficacy of each capability changes within your environment against relevant threats.

 

Tidal Cyber: How to Build a Coverage Map in Enterprise Edition

Join Rich Struse, our co-founder and CTO, as he dives into how to build a coverage map to compare threats of concern within your environment with the security tools that are defending that environment. Start by giving your coverage map a name and description and specifying the platform it represents (e.g., Windows, Containers, Network, etc.) Then, select the threats of concern to your organization and the defenses in your environment. You have the flexibility to select as many threat profiles and defensive stacks that you want and, therefore, build as many coverage maps as you would like in order to model different parts of your environment. Simply click to generate the coverage map and see your coverage against underlying threats along with an assigned Tidal Confidence Score. Instantly pinpoint your areas of relative strengths and weaknesses across different adversary TTPs and your environment, and get specific recommendations for how you can improve your defenses starting with the tools you already own.

 

Tidal Cyber: The Strength of our Recommendation Engine

Take a tour of the Tidal Cyber Recommendation Engine with our co-founder and Chief Innovation Officer, Frank Duff. Starting with your coverage map, the intersection of the threats you care about and the defenses you have, this video shows how the Recommendation Engine helps you understand what you can do to improve those defenses. With knowledge of all the techniques a current threat of concern is using, you can assess what your current posture is and quickly see which defensive capabilities are turned off and which reconfigurations to prioritize. Simply click to run a “what if” scenario to see the impact on your Tidal Confidence Score if you selected a specific option or wrote a new rule. You can even get information on how to implement the new configuration. Each technique is rank ordered to help you prioritize based on your available resources and where to apply them most effectively to strengthen your security posture.

 

Tidal Cyber: CTI Use Case in Enterprise Edition

In this video Scott Small, Director of Cyber Threat Intelligence, explains how CTI analysts can easily use Tidal Cyber Enterprise Edition to increase efficiency and improve their ability to understand, track, and respond to top adversary tactics, techniques, and procedures (TTPs). Timely intelligence is added at least weekly to the knowledge base, built on top of the critical foundation provided by the MITRE ATT&CK knowledge base. You can also add threat intel from other third-party sources which sync relevant CTI with the Tidal knowledge base and use it in threat profiles and coverage maps. See how the platform enriches threat intel with context, and how easy it is to populate and maintain your threat profiles and even set and adjust custom weightings. Threat profiles are paired with your defensive stack in a coverage map which provides useful outputs for CTI users including defensive coverage metrics for each threat in your profile. Any changes to a threat profile are automatically reflected in the coverage map.

 

Ready to try Tidal Cyber Enterprise Edition? Contact us to schedule a more in-depth demo or try it for 14-days.

 

Data-Driven Threat-Informed Defense

Meet Tidal Enterprise Edition

Quickly and easily develop custom threat profiles and defensive stacks, see your coverage and identify gaps and redundancies, and get daily recommendations to improve your cybersecurity posture.