Skip to content

AttackTrace#

AI-Native SOC Investigation Workspace

AttackTrace connects SIEM, cloud logs, threat intelligence, and internal tools so analysts can triage alerts, follow evidence, reconstruct attack paths, and close cases faster with explainable AI.

The workspace keeps tools, evidence, memory, and reports together. Built-in threat intelligence helps with the first pivots, while optional integrations connect your existing stack when an investigation needs environment-specific evidence.

What analysts use it for#

  • Incident response


    Move quickly from an urgent alert to scoped impact, likely root cause, and a handoff-ready case.

  • Threat hunting


    Turn hypotheses into repeatable investigations across infrastructure, identity, cloud, and telemetry.

  • Alert triage


    Reduce noisy queues by turning raw signals into verdict drafts, next steps, and escalation context.

  • Report and reuse


    Generate structured investigation reports and preserve useful memory for future cases in the same environment.

Typical investigation flow#

flowchart LR
  alert[Security signal] --> prompt[Describe alert or IOC]
  prompt --> sources[Connected data sources]
  sources --> evidence[Evidence and pivots]
  evidence --> path[Attack path explanation]
  path --> report[Report and reusable memory]

AttackTrace is designed to support the analyst workflow. AI output should be reviewed against evidence before action.

Quick navigation#

I want to... Go to
Start my first investigation Quick Start →
Ask and pivot in chat First Conversation →
Understand integrations Integrations →
Configure models Model Config →
Manage account and subscription Account & Subscription →
Troubleshoot issues Troubleshooting →