• Feb 10, 2025
  • 2 min read

TouchCyber Security Platform User Guide

Overview

The TouchCyber Security Platform User Guide is your complete resource for understanding and utilizing all of TouchCyber's powerful cybersecurity capabilities. Whether you are a security analyst exploring basic threat detection or an expert leveraging advanced security automation, this guide ensures you can extract meaningful insights from your security data. With TouchCyber, you can seamlessly monitor, analyze, and visualize your security posture using an intuitive platform designed for efficiency and accuracy.

Core Concepts

Security Data Integration & Preparation

TouchCyber allows you to integrate security data from multiple sources, including SIEM systems, firewalls, endpoint detection, and cloud security platforms. Efficient security data preparation is key to accurate threat analysis, and TouchCyber provides built-in tools to help you:

  • Normalize your security data: Remove duplicates, handle missing logs, and standardize security event formats.
  • Enrich security events: Apply threat intelligence, geolocation data, and other enrichments for better analysis.
  • Correlate security data: Combine multiple security data sources effortlessly for comprehensive threat visibility.

Security Analysis & Threat Detection Models

TouchCyber offers a variety of pre-built security models and threat detection algorithms that can be applied in just a few clicks. Depending on the nature of your security data, you can choose from:

  • Threat Detection Models: Identify advanced persistent threats and behavioral anomalies.
  • Risk Assessment & Scoring: Categorize your security events into meaningful risk levels.
  • Threat Intelligence Analysis: Leverage external threat feeds for contextual analysis.

Security Visualization Tools

Communicating security insights effectively is crucial, and TouchCyber provides over 25 customizable security visualization templates, including:

  • Security dashboards, threat maps, and timeline graphs for threat analysis.
  • Risk heat maps and attack flow diagrams for pattern recognition.
  • Interactive security dashboards that update in real time.