https://store-images.s-microsoft.com/image/apps.35622.9be05171-89f8-4f45-b195-abddd45093f4.440ee51f-ff0c-4282-a33a-e45a05b170e9.b55e6792-d5e4-4761-aa16-8e5472550f39

Joshua Cyberisk Vision

Almaviva SpA

Joshua Cyberisk Vision

Almaviva SpA

Enabling actionable security data feed focused on NIS critical infrastructures

This application is also available in Italian


The Solution provides two main use cases:

  • Get Indicators: Playbooks that automate the ingestion of Joshua Cyberiskvision threat indicators into the ThreatIntelligenceIndicator table of Microsoft Sentinel workspace. This operation can be triggered on a defined schedule and allows correlation between the indicators of the two platforms. This data contains malicious domains, URLs, IPs, file hashes and phishing e-mail addresses.
  • Alert Enrichment: Playbooks that use the Joshua Cyberiskvision threat intelligence to automatically or manually enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.