Tines SOAR

For SpyCloud Enterprise Protection.

🤖 Enterprise Protection + Tines

Use SpyCloud’s recaptured darknet exposure data – from breaches, malware-infected devices, and successful phishing – to automate response with Tines. Generate cases, triage by source/severity, and run policy-driven playbooks to reset credentials, revoke sessions, notify users, and more.

Integrations page: https://spycloud.com/products/integrations/tines/


🚀 What you get (at a glance)

  • Ingest SpyCloud exposure records (breach, malware, phished) into Tines
  • Pre-built, customizable templates to jump-start automation
  • Granular triage by source/severity to focus on the highest-risk users first
  • Case management: auto-generate new cases when matching exposure records are detected
  • Proactive notifications (e.g., Slack/email) for high-impact events
💡

Outcome: Shorter exposure windows and repeatable, low-friction response – straight from Tines.


🧭 Quick start

  1. Choose a SpyCloud template in Tines to start your Story
  2. Add your SpyCloud API key to begin ingesting exposure data
  3. Automatically ingest exposures (breach, malware, phished) tied to employee identities and route to cases/notifications

🧱 Templates & Stories

Kick off with SpyCloud starter templates in Tines and extend as needed:

  • Create separate paths per source (breach vs. malware vs. phished)
  • Enrich with local context (IdP, HRIS, EDR, IAM)
  • Branch by severity and artifact type (plaintext credentials, cookies/tokens, etc.)

🔧 Common use cases

  • Tailored response – Remediate exposed employee or customer credentials with the specific steps your policy requires
  • Granular triage – Segment SpyCloud notifications by breach, malware, and phished sources; prioritize Critical/High first
  • Case management – Detect new SpyCloud exposure records and auto-create cases in Tines (only if not already present)
  • Proactive notification – Alert users (Slack/email) when a new exposure is surfaced for their identity

🛠️ How it works (expand to see steps)

1) Ingest – bring SpyCloud exposure data into Tines

Use the SpyCloud templates to pull exposure records sourced from breaches, malware infections (infostealer logs), and phished credentials into Tines.

2) Triage – sort by source & severity

Route by exposure source (breach/malware/phished), severity (e.g., Critical/High), and artifact type (plaintext password, cookies, tokens) to determine next actions.

3) Act – run playbooks

Automate remediations: reset credentials, revoke sessions, force re-auth, disable accounts, and notify end-users or admins.

4) Prove – document & measure

Create/update cases, track outcomes, and export metrics that show time-to-response and volume of exposures remediated.


📚 Resources

  • SpyCloud Enterprise Protection APIs – use for flexible ingestion & enrichment
  • Tines Story Library – browse/import automation templates here
  • Contact SpyCloud – to enable additional datasets or discuss policy/IR playbooks
🔗

Want to do more with Tines + SpyCloud? See all stories here


✅ Summary

  • One integration to ingest & act on breach/malware/phished exposures
  • Templates to move fast; Stories to customize deeply
  • Automated, measurable remediation that shrinks your identity exposure window