Trustar: Trustash integrations

Crest developed TruStashes using the TruSTAR framework (third pary integrations).

Executive Summary

Crest Data Systems developed TruStashes using the TruSTAR framework, which are third party integrations, whose data we want to ingest into the TruSTAR platform. Most of the time this data are the Incident Reports.

About Customer

TruSTAR offers an API-first cloud-native intelligence management platform.
Using custom API solutions, It takes third party data and puts it to work, helping security teams speed up detection, response to incidents, collaborations, and investigative work.

Business Challenge

TruSTAR being a threat-sharing platform, the ability to read threat data from multiple threat sources is absolutely necessary. Given the fact that each threat source represents the data in different formats, normalizing it prior to ingestion is required. To level up the challenge, the number of new threat sources to be integrated is huge. There's a need for a well-defined integration development process that standardizes the normalization process required.

Customer Solution

Crest Data Systems developed TruStashes using the TruSTAR framework, which are third party integrations, whose data we want to ingest into the TruSTAR platform. Most of the time this data are the Incident Reports. As part of TruStash development, Following actions were implemented:

Crest Data Systems developed 25+ TruStashes of two types, Closed source and Open source.

CONTACT OUR EXPERTS

We’d love to hear about your project and help you get started.

Contact our sales team to discuss your business requirements.