Loading...
Loading...
Kronos
Ekko AI Assistant
Case Study — DATES
A production case study: AI-powered security operations automation deployed for a managed security and IT services provider
The Problem
A managed security and IT services provider. Two analysts. Over 1,000 endpoints. 80+ security tickets every month. And 22 minutes of manual work per ticket just to triage — before remediation even started.
50 uninvestigated alerts per month isn't a risk being accepted. It's a risk that can't be seen. The threat that slips through is always the one nobody had time to look at.
The Answer
Defendify Automated Triage, Escalation & Suppression
An AI-powered Tier 1 security analyst that works alongside the human team. It handles the research and triage grunt work so your analysts can focus on what actually requires human judgment: complex investigations and remediation.
Automated threat research across CrowdStrike, VirusTotal, MITRE ATT&CK, and device health — simultaneously, in seconds
Intelligent triage with severity assessment, response playbook selection, and escalation routing. Every ticket gets a tailored investigation, not a hardcoded query
7-dimension confidence scoring — the system quantifies exactly how certain it is and tells you why, so your analysts review with full context
Automated escalation — if nobody reviews within 15 minutes, the next person up is notified automatically. Nothing falls through
Full audit trail — every decision logged for compliance. No more verdicts that live only in someone’s head
Transformation
~22 minutes. Manual. Repetitive.
60 seconds of AI work + 5 minutes of human review.
8 manual steps became 2. Research became review.
Architecture
DATES Engine
Credential Vault
Completely separate service holding all third-party API keys. The analysis engine never has direct access to credentials.
Even if the main system were compromised, third-party credentials remain isolated.
Containerized deployment (Docker)
identical behavior in dev and production
Private AI model endpoint (Azure AI Foundry)
company data never used for training
Cloud hosting with infrastructure as code
fully automated setup
227 automated tests
Integrations
DATES integrates with the tools the organization already uses — not a black box, but a system that works within the existing security stack.
CrowdStrike Falcon
Active detections, host info, fleet-wide threat search
VirusTotal
File hash lookups, IP/domain reputation
Endpoint Central
Device health, patch status, security posture
Jira
Auto-create tickets with analysis results
Microsoft Teams
Real-time escalation notifications
Alerts and AI-generated executive digests
Impact
Numbers first. Then what they actually mean.
| Metric | Before | With DATES |
|---|---|---|
| Triage time per ticket | ~22 min | ~60 sec AI + ~5 min review |
| Monthly triage hours | ~29 hrs (80 tickets) | ~8 hrs (review only) |
| Cost per ticket | ~$13.50 (at $36/hr) | ~$0.003 AI + review time |
| Coverage | Highs/Criticals only (~30) | All severity levels (80+) |
| Audit trail | None | Complete |
0 hrs
analyst hours back every month
0+
previously uninvestigated tickets now fully triaged
0%
audit trail — every decision logged for compliance
What's Next
Every ticket fully investigated. No more coverage gaps. Patterns tracked. Confidence calibrated against analyst feedback.
Historical pattern matching sharpens verdicts. False positive rates drop. The system accumulates institutional knowledge your analysts would otherwise carry in their heads.
Automated remediation for high-confidence verdicts: device isolation, user lockout, patch deployment. Human approval required for anything below confidence threshold. Speed without recklessness.
DATES isn't just a triage tool. It's the foundation for a security operations center that gets smarter every week.
Every team has processes burning hours that machines should handle. Talk to an expert and find out exactly where yours are.