Always _____ your SE before a call
or
Why?
What types of Intel reports do you leverage/ would yo like to leverage?
2) Purchase timeframe
3) Identified who's paying for it/who is the final authority.
4) Buy Plan
2) Vulnerability Management
This log source is used commonly used to track a domain lookup.
theres a lot we can show you....for you to understand our value it's best if I understand more about your environment.
an alert fires from splunk about a potential bad IP address, it is then researched to see what is known about it, that IP address is shown to be malicious and associated with a bad hash, that hash is then banned.
Really? Then maybe we could talk about one of our less expensive packages, would you be open to that.
This type of project that leverages technology instead of human for analysis within a SOC and is a perfect fit for Recorded Future.