Cyber Defense – STORM
In one place, ingest alerts from SIEMs and firewalls, enrich IOCs with built‑in intelligence and configurable sources, and triage using ready‑to‑use best‑practice workflows built on 20+ years of incident management. Watch a suspicious email become a fully tracked case in minutes: analyse files via VirusTotal, VMRay, or Joe Security, tag artifacts, and capture results automatically. Then launch response, add stakeholders, assign sub‑tasks, and generate audit‑ready reports – without switching tools.
The outcome: faster analysis, cleaner handoffs, and real‑time visibility from first alert to lessons learned.
Key Benefits
Security incident process landscape based on proven FIRST.org methodology
High level of transparency
Audit compliance of processes and communication
Reduced manual effort through automation and data enrichment
E-Mail signing and encryption features
Scalable for growing service organizations
Connect OTRS with your existing solution
OTRS is one of the most widely used service management systems, and it can be seamlessly integrated with existing applications, such as SAP, Salesforce or HP Service Center. The generic interface and the XSLT mapping module of OTRS allow both the integration of existing systems and also the individual combination of several OTRS solutions. This significantly reduces the risks, effort, and costs involved in creating and maintaining conventional interfaces.
Included Incident Process landscape
Alert triage
Incoming alerts and events from SIEM solutions can be enriched with external data, e.g. whois, Threat Intel tools, and SOAR solutions and classified fast.
Incidents can be created with one click and reporting data is gathered for false positives
Security Incident Process
Start an incident from events or user communication and follow the cybersecurity community’s best practices for your incident response.
Track secure communication with stakeholders, assign and monitor tasks for aligned teams like forensic, store evidence, and send automated reports and advice.
Use state of the art classification schemes as TLP or enisa taxomony or add your own ones in a matter of second. Tagging of incidents allows agile reaction to new threats and malware.
Risk Management Process
Identify your Risk and document mitigations, exceptions and be supported on a regular assessment following simple and pragmatic approaches based on standards from the field of basic protection for critical infrastructures.
Risks can be assigned to security assets, providing a simplified view of the IT landscape without having to deal with individual systems.
Reporting and Insights
- Reports on incidents can be created in a wizard according to your needs
- Dashboards show the current workload and allow planning of team resources via integrated calendar planning tool
Open for more
Build your own workflows and integration with the powerful process designer and the Webservice API backend. Customers build custom processes e.g. for vulnerability management, forensics and alerting in case of security breaches. Also orchestration of other tools e.g. for vulnerability scanning can be integrated
Integrations
STORM can be integrated via JSON/Rest, E-Mail and SOAP to a variety of security tools. Starting from SIEM solutions, SOAR systems, Threat sharing platforms, and alerting tools to malware analysis platforms. Integrations via Python library to own tools or predefined Node-red connectors allow seamless integration in your existing or planned toolset.
Why STORM powered by OTRS
- Trusted by leading governmental, public and private security teams
- More than 20 years of experience serving this critical sector
Discover the OTRS Solutions
Choose the solution that fits your use case or combine them on one platform.