
"Fig Security, a startup by veterans of Israel's cyber and data intelligence units 8200 and Mamram, claims to help security teams deal with that by monitoring the security stack to see if their rules, mitigation tools, and detection and response capabilities are functioning or skewed off course by changes."
"In a nutshell, the startup's tech traces data flows in the security stack, from the origin at sources through data pipelines and data lakes to security orchestration and automation response platforms, and then alerts security teams when changes at any point affect detection or response capabilities."
"Instead of looking at the data and tracing it forward and seeing where it ends up, we look at your detections because that is the thing that you need to work. Detection or response is the single source of truth, and then we back-trace the health and what needs to happen on the data in order for it to trigger the detection."
Modern enterprises rely on complex technology stacks with dozens of interconnected tools that create unique failure points. Security teams cannot wait for systems to break; they must proactively verify their detection and response capabilities remain functional. Fig Security, founded by veterans from Israeli intelligence units, addresses this challenge by monitoring security stacks to track data flows from sources through pipelines and lakes to orchestration platforms. The platform alerts teams when changes affect detection capabilities and enables simulation of potential impacts before deployment. By back-tracing from detections to verify underlying data health, Fig ensures security systems maintain effectiveness despite constant system modifications.
Read at TechCrunch
Unable to calculate read time
Collection
[
|
...
]