Skip to main content

In order for AI Agents to do deep analysis and truly help your SOC move faster, they need all of the information available to make sound decisions.

That is why I am so excited to announce two major new capabilities in Bricklayer: Public Blog Source Support and CSV DataStores.

AI Agents Can Now Use External Blogs & Organizational Context

These two new features allow Bricklayer to work with external public blog sources of your choosing and internal organization context in CSV format to further power Bricklayer AI Agents to conduct autonomous investigations and report generation.

Bricklayer AI’s Agents can now use a curated list of public blogs to provide referenced information for various SOC operations. For example, if you ask our agents to build a threat intelligence report that focuses on threats to the telecommunications sector in the US, we can do that using trusted sources of information from blogs.

 

Built for Your Unique SOC Needs

Every organization has unique requirements, and Bricklayer was built from the beginning to accommodate those needs. With this release, our customers can disable any sources from our curated list and add their trusted blogs to ensure their Agents are getting the information they need to act fast.

This feature extends our AI agents knowledgebase vastly by providing a near real time index of publicly available data for them to use in their analysis. Since we index historical data as well, this is a unique capability where our agents can access historical insights and use them in their investigative workflow and in their reporting.

No more security information stuck in CSVs

We’ve also excited about extending our DataStore technology to CSV files. As security practitioners know, a wealth of security information is often stored in CSVs. This ranges from asset information to network definitions.

With Bricklayer’s new CSV DataStore support, organizations can upload these files to Bricklayer to give Bricklayer’s AI Agents immediate security context on the information contained in the files.

Our AI agents use this information to help speed up security investigations and better understand your environment. For example, Bricklayer can prioritize or escalate alerts based on asset criticality and network definitions. This feature is a great example of how Bricklayer’s AI agents can quickly adapt to your policies, processes and technology environment.

Also New in Bricklayer: Better views of procedure output and new UI Security Features

At Bricklayer, in addition to our new features, we’re always rolling out powerful updates to improve user experience and security:

Procedure Output Sections

When a group of AI agents in Bricklayer complete a procedure, the output sections that are displayed now reflect the structure of the report used in the procedure. This helps the results be more aligned with the work being performed in the procedure.

Inactivity Timeout for the UI

To help secure your UI sessions, Bricklayer will now log you out automatically in the event of inactivity. This timeout period can be changed by your Organization Administrator and can also be disabled. The new timeout configuration will be applied the next time the user logs out.

Bricklayer continues to build the world’s most advanced AI Agents for security operations. Come build the future with us — we’re just getting started.

Book a Demo

 

Subscribe to our blog.