#RSAC26CISO SafeSpace at RSAC26
Unified Actions Framework

One framework.
Action across your entire stack.

AI decisions become real containment and recovery actions across your entire stack.

Backed by security leaders from
Kaiser PermanenteYouTubeSnowflakeEquinixCoupangThoughtSpotKaiser PermanenteYouTubeSnowflakeEquinixCoupangThoughtSpot
AI-Generated Actions

Actions synthesized for this alert, not selected from a list.

  • Action parameters derived from live device context
  • Priority sequencing calculated from actual blast radius
  • Approve and execute in one click, audit log updated automatically
Credential Dump · LAPTOP-0924
CrowdStrikeEndpoint
2026-03-15
04:11:33
MK
98
AI Reasoning
Parsing alert context...
Checking device telemetry...
Evaluating threat scope...
Modeling affected assets...
Synthesizing action sequence...
Instant Actions
Approve + Execute All
Audit Log · INC-4821
Isolate DeviceExecuted
Block Outbound IPExecuted
Disable User AccountExecuted
Unique to this alert · Unique to this device · No templates
Cross-Tool Orchestration

One AI decision. Coordinated action across your stack.

  • Multi-tool chains complete in under one second
  • Dependency ordering handled automatically by the framework
  • Results surface back into the investigation timeline
AI DECISION · CONFIDENCE 97%
Lateral movement confirmed. Contain immediately.
5 actions dispatching simultaneously across your stack
READY TO DISPATCH
CrowdStrike
CrowdStrike
Isolate endpoint
Okta
Okta
Revoke sessions
Jira
Jira
Create ticket
PagerDuty
PagerDuty
Alert on-call
Slack
Slack
Notify SOC channel
Awaiting AI decision...0.78s
Human-in-the-Loop Controls

Set any action to require approval before execution.

  • Approval thresholds configurable per action type and risk level
  • Full context and rationale included with every approval request
  • Executes in the same second you confirm, no manual handoff
Instant ActionsPENDING
Isolate host DESKTOP-K2M4P1CRITICAL
Ready·CrowdStrike·Full network isolation
Execute
AI Agent Rationale
Lateral movement detected from this host to 3 internal IPs. Isolation prevents further spread. No active user sessions detected.
3 internal IPs at risk if not isolated · 1 active session will be interrupted
View Details
MITRE T1021Lateral Movement
3 similar actions approved in the last 7 days · avg 0.4s execution
JM
Assigned to J. MartinezSOC L2
Approve
Review context
Execution Timeline
CrowdStrikeEndpoint isolated
310ms
OktaSessions revoked
180ms
JiraTicket created
240ms
Complete Audit Trail

Every action attributed, timestamped, and reversible.

  • 100% of actions logged with full attribution
  • Exportable chain-of-custody for audit and compliance review
  • Reversibility record included for every write-class action
Audit Log· Incident INC-4821
Recording
14:23
07
Isolated endpoint DESKTOP-K2M4P1
AIAI Agent: Triage-07·
CrowdStrike
Success
Response timems · per action
CrowdStrike
Okta
Alaris
Jira
Palo Alto
PagerDuty
6 actions · 100% attributed · exportableView full audit →
How It Works

From AI decision to confirmed execution

Stack Connected
CrowdStrike EDRConnected
Okta IdentityConnected
AWS SecurityConnected
PagerDutyConnected
01

Connect Your Stack

Alaris integrates with your existing tools via native APIs. No agents required on most platforms, connections are ready within minutes, not weeks.

Action Dispatched
Threat: Lateral movement detected
Confidence 95% · Triage Agent
AI decision made
Action prepared
Approval queued
Isolate host DESKTOP-K2M4P1
Via CrowdStrike EDR · Awaiting approval
02

Agent Triggers an Action

The AI agent dispatches the action through the Unified Actions Framework. Actions requiring approval queue with full context for analyst review.

Execution Confirmed
Host isolatedCrowdStrike
Session revokedOkta
Ticket createdServiceNow
Audit log updated · Full chain of custody
03

Execution Confirmed

Alaris confirms execution from the target tool and surfaces the result back into the investigation timeline, host isolated, session revoked, ticket created.

Integrations

Works with your existing stack

CrowdStrike
Splunk
Microsoft Sentinel
Elastic
SentinelOne
Okta
Jira
ServiceNow
PagerDuty
Microsoft Teams
Microsoft Defender
IBM QRadar
Palo Alto
Fortinet
Zscaler
Cisco
Check Point
Darktrace
AWS Security Hub
Azure Security
Google Cloud
Wiz
CyberArk
Microsoft Entra
Slack
Recorded Future
Tines
Snyk
CrowdStrike
Splunk
Microsoft Sentinel
Elastic
SentinelOne
Okta
Jira
ServiceNow
PagerDuty
Microsoft Teams
Microsoft Defender
IBM QRadar
Palo Alto
Fortinet
Zscaler
Cisco
Check Point
Darktrace
AWS Security Hub
Azure Security
Google Cloud
Wiz
CyberArk
Microsoft Entra
Slack
Recorded Future
Tines
Snyk

+ 100 more integrations

See it close a real incident in under 60 seconds.

Why Alaris

Purpose-built execution framework.

Alaris Actions
Manual Process
Action coverage
500+ pre-built across every layer
Dependent on tool access and runbooks
Execution speed
Under 1 second to confirmed result
Minutes to hours per manual sequence
Cross-tool chains
Coordinated multi-tool in one decision
Sequential, error-prone handoffs
Audit trail
100% of actions, full attribution
Inconsistent, analyst-dependent
Human-in-the-loop
Configurable per action, instant exec
All actions require human initiation
Playbook maintenance
None, actions managed by Alaris
Runbooks written and maintained by team
Further Reading

Additional Resources

Response that moves at the speed of the threat