RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research
Why RL Built Spectra Assure Community
April 14, 2026

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Read More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
January 11, 2023

ReversingLabs Elastic Threat Infrastructure Update: Integration, Automation for SOC Teams

...

FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
reversinglabs elastic threat infrastructure new updates

The January 2023 update improves file and report storage options for Microsoft and Amazon Web Services (AWS) platforms, as well as appliance management for SOC Administrators and other users. 

ReversingLabs Elastic Threat Infrastructure (TitaniumScale) helps enterprises baseline the security of their environment, assessing millions of files per day to quickly find and prioritize threats for remediation. It uses unique ReversingLabs File Decomposition Technology to extract detailed metadata, add global reputation context and classify threats. It automatically acquires files by integrating with shared drives, email gateways, intrusion detection systems, firewalls and other devices. Results feed into analytics platforms to provide visibility and enriched data for remediation and advanced hunting.

ReversingLabs Elastic Threat Infrastructure provides value in a number of ways. Organizations can improve their security posture by reducing cyber risks, while also ensuring data and file privacy. Additionally, they are able to decrease operational workload and tool costs. And equally important, practitioners benefit from using our solution's advanced technology, which reduces MTTD by prioritizing malicious files for triage. 

Better Integration and Automation that Drives Security Operations Forward

In this enhanced version of ReversingLabs Elastic Threat Infrastructure, several updates have been made to improve file and report storage options for Microsoft and Amazon Web Services (AWS) platforms, as well as appliance management for SOC Administrators and other users. 

Below, we break down these major product updates for you. 

Microsoft Cloud Storage Integration Expands OneDrive and SharePoint Online (SaaS) File Threat Analysis and Management

Building on the solution’s threat detection and analysis support of Microsoft Cloud Storage (OneDrive and SharePoint Online), users now have the option to save files, extracted files and reports to the same OneDrive folder or SharePoint Online (SaaS) site from which files were processed and classified, improving file analysis and coverage.  

SOC teams have more flexibility to organize unclassified and classified files in their OneDrive or SharePoint Online platform, without the need to use another storage platform for files that have been processed.  This also gives users a better means for sharing files and reports with other SOC analysts and team members.

TitaniumScale file scanning flow with OneDrive and SharePoint

Figure 1. TitaniumScale file scanning flow with OneDrive and SharePoint

Additional Options for AWS S3 Report Storage 

AWS S3 users as well as S3-compatible storage users have more flexibility on where to store their file analysis reports with the latest ReversingLabs Elastic Threat Infrastructure release. SOC administrators have a choice to store reports in a default S3 bucket, the input bucket from which the processed file originated, or choose more than one output location for these reports by mapping output to input buckets. The administrator can determine where a report should be stored based on ease of access for themself as well as other users in the organization.

report storage options for AWS and S3-compatible storage

Figure 2. Report storage options for AWS and S3-compatible storage

A Single View for Appliance Management 

At ReversingLabs, we understand that SOC administrators have many responsibilities to juggle, which means saving time is important. Based on customer feedback, we’ve centralized management of appliances on one screen to improve ease of use and system performance. We’ve also added appliance Type and Version columns for version control, and a simple way to copy IP addresses for updates. Administrators can more easily troubleshoot appliance issues with the addition of system health metrics available on the Central Manager Appliance Management tab.

This redesign greatly benefits our customers by giving users an ease of administration and better usability, thanks to an overall improved user interface.

Centralized appliance management

Figure 3. Centralized appliance management

Going Above and Beyond our Customers’ Expectations

ReversingLabs will continue to enhance the Elastic Threat Infrastructure solution, so that organizations can continue to bolster their robust programs to can help mitigate today’s most serious malware threats.

New updates to this solution, such as Microsoft Cloud Storage integration, more file and report storage options, and a redesigned appliance management system improve work efficiency so users can complete tasks more efficiently.

About ReversingLabs

ReversingLabs is the leading provider of explainable threat intelligence solutions that shed the necessary light on complex file-based threats for enterprises stretched for time and expertise. Its hybrid-cloud Titanium Platform enables digital business resiliency, protects against new modern architecture exposures, enables software risk verification, and automates manual SOC processes with a transparency that arms analysts to confidently take action.

ReversingLabs is used by the world’s most advanced security vendors and deployed across all industries searching for a more intelligent way to get at the root of the web, mobile, email, cloud, app development and supply chain threat problem, of which files and objects have become major risk contributors.

Tags:Modern SOC

More Blog Posts

envelopes with pixelated bugs crawling out of them

How to Stop Phishing Attacks Being Missed

Unveiling the Hidden Threats: Enhancing Email Security with Object-Level Analysis

Learn More about How to Stop Phishing Attacks Being Missed
How to Stop Phishing Attacks Being Missed
laptop screen with green shield checkmark being labelled as malicious

How SOC analysts and threat hunters can expose malware undetected by EDR

Enhancing Endpoint Visibility: Leveraging Advanced File Intelligence to Uncover Evasive Threats

Learn More about How SOC analysts and threat hunters can expose malware undetected by EDR
How SOC analysts and threat hunters can expose malware undetected by EDR
The Week in Cybersecurity: Vice Society ransomware group targets back-to-school

The Week in Cybersecurity: Vice Society ransomware group targets back-to-school

Vice Society ransomware group targets America’s education sector, the U.S. government’s new position on software supply chain security, and more.

Learn More about The Week in Cybersecurity: Vice Society ransomware group targets back-to-school
The Week in Cybersecurity: Vice Society ransomware group targets back-to-school
The Week in Cybersecurity: NPM removes malicious modules, Microsoft backtracks on macros

The Week in Cybersecurity: NPM removes malicious modules, Microsoft backtracks on macros

Fallout from another supply chain attack involving malicious npm modules. Also: Microsoft backtracks on a pledge to disable Office macros.

Learn More about The Week in Cybersecurity: NPM removes malicious modules, Microsoft backtracks on macros
The Week in Cybersecurity: NPM removes malicious modules, Microsoft backtracks on macros

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top