Over the past few months, Scinary Centurion platform has evolved—significantly. What started as a powerful monitoring and alerting engine is now transforming into a full-fledged Extended Detection and Response (XDR) platform. This marks a major step forward in how we protect our customers across cloud, endpoint, and identity layers.
At the heart of this evolution is Scinary Connect, our next-generation alert processing pipeline and integration layer. It’s enabling Centurion to see deeper, respond faster, and deliver smarter context across environments.
Scinary Connect: The Core of Centurion XDR
As Scinary Connect comes out of beta, it becomes the operational brain of Centurion XDR. It enables:
- Normalized, enriched third-party logs in one pane of glass.
- Enrichment with IP threat intelligence and ASN data.
- Fast triage of alerts from tools like Microsoft 365, Google Workspace, Duo, and ThreatDown.
Our team uses this enriched data to act faster on behalf of customers. Whether it’s isolating an endpoint or signing a user out of a suspicious session, we’re shortening the time between alert and action.
Scinary Connect Alerts
With Scinary Connect on its way out of Beta testing, we’ve rewritten our alert processing pipeline to support Scinary Connect alerts, allowing both users and our SOC to quickly investigate and triage alerts, including:
- Duo Failed MFA
- Suspicious Google Workspace Activity
- Suspicious Microsoft 365 Activity
- Suspicious Endpoint Activity (via ThreatDown EDR)
Scinary Connect not only collects supported third-party logs in a single pane of glass, but each event is also analyzed and enriched with IP address threat intelligence and network (ASN) information, including what types of attacks or users are associated with a specific IP/network.
Scinary Connect Actions
Via our internal SOCView platform, our analysts are able to act on Microsoft 365 and Google Workspace alerts:
- For Google Workspace, our analysts can sign users out of sessions, which would block an attack in the event of stolen authentication tokens or MFA bypass.
- For Microsoft 365, our analysts can sign users out of sessions and also deactivate the user account completely, blocking MFA attacks and password attacks.
- For ThreatDown EDR, our team can quickly isolate an endpoint from the network.
Change is constant in cybersecurity, but we believe upgrades should feel like relief, not risk.
With every enhancement to Centurion, our goal is simple: more signal, less noise, and a platform that works with you, not against you. We appreciate your partnership as we roll these updates out.
Let us know if you have any questions!