Solutions and Applications
3 min
turbine solutions are end to end use cases that contain components, playbooks, and assets that are mostly preconfigured to reduce an practitioner’s time and level of effort when creating common security solutions solution terminology solution term meaning content including but not limited to widgets, dashboards, reports, playbooks, assets, connectors, applications, applets, and workspaces that enable and enhance automation integrated marketplace turbine's integrated content distribution platform content includes solutions, components, and connectors mean time to detect (mttd) a measure of the average time it takes for an organization to detect a security breach or incident mean time to respond (mttr) the time it takes to fully resolve an incident or a security concern and restore systems open cybersecurity schema framework (ocsf) provides a standard schema for common security events and includes a self governance process for security log producers and consumers security, information, and event management (siem) collects, aggregates, and then identifies, categorizing and analyzing incidents and events secops maturity model (somm) security based model that groups and describes the state at which security programs have embraced automation solutions specific end to end use cases that contain a number of components swimlane solution package (ssp) file extensions ( ssp) to import or export a solution and/or collection of playbooks, assets, applications, etc into a swimlane turbine system components/vendor interaction component (vic) bundled content used to ingest or enrich data from third party tools that transform into appropriate open cybersecurity schema framework (oscf)/swimlane object schema (sos) objects why use solutions? helps newer users to learn turbine accelerates user's self sufficiency demonstrates playbook best practices saves time configuring a playbook from scratch, decreases user errors, and identifies established playbook practices for use in future playbooks achieves common outcomes quickly on an ongoing basis where can i find solutions? solutions are located in turbine on the integrated marketplace, along with components and connectors applications in solutions see applications and applets docid\ ohdsopcq7mzmi0kyiela2 for details about building and managing turbine applications and applets you can use applications separately or with turbine solutions applications can assist with threat intelligence, case and incident management, alert, and phishing triage, and any other situation where interacting with records is required this section provides information for the processes, installation, and configuration on current turbine solutions and/or applications