• Pricing
Book a demo

Execute your TheHive playbooks automatically with AI

Swiftask connects your AI agents to TheHive. Automate the triggering and tracking of your incident response playbooks for faster reaction times.

Result:

Reduce MTTR (Mean Time To Respond) and free your SOC analysts from repetitive tasks during incident management.

Manual playbook management slows down your SOC

In a fast-paced cybersecurity environment, manually executing response steps in TheHive is a bottleneck. Analysts waste valuable time following standardized procedures instead of focusing on complex analysis.

Main negative impacts:

  • Increased response time (High MTTR): Manually transitioning between steps in TheHive mechanically increases the time needed to contain a threat.
  • Human errors in procedures: Repeating complex tasks increases the risk of omitting a crucial playbook step, compromising security.
  • Analyst cognitive overload: SOC teams are burnt out by repetitive alert management, hindering vigilance against real threats.

Swiftask allows your AI agents to steer the execution of your TheHive playbooks. Trigger automated workflows as soon as an alert is qualified, ensuring fast and compliant response.

BEFORE / AFTER

What changes with Swiftask

Without Swiftask

An alert arrives in TheHive. An analyst must open the case, consult the playbook, manually execute each action, update statuses, and document evidence. This process takes precious minutes or even hours.

With Swiftask + TheHive

As soon as an alert is created, the Swiftask AI agent analyzes the context, triggers the appropriate playbook in TheHive, executes containment actions, and notifies the analyst for final validation.

Orchestrate your TheHive playbooks in 4 easy steps

STEP 1 : Define your agent in Swiftask

Create an AI agent dedicated to incident response. Configure its capabilities to interact with the TheHive API.

STEP 2 : Establish secure connection

Connect Swiftask to your TheHive instance via API key. Swiftask respects the permissions defined in your platform.

STEP 3 : Configure triggers

Associate specific alert types with your playbooks. The agent will know exactly which workflow to run based on the threat.

STEP 4 : Deploy and validate

Activate the automation. Monitor executions in real-time from the Swiftask dashboard with full history.

AI orchestration capabilities for TheHive

The agent analyzes alert metadata, severity, and Indicators of Compromise (IOCs) to adjust playbook execution in real-time.

  • Target connector: The agent performs the right actions in thehive based on event context.
  • Automated actions: Automated playbook triggering. Task status updates. Adding comments and evidence to cases. Escalating alerts based on criticality.
  • Native governance: All actions performed by the agent are logged to ensure an audit trail compliant with security standards.

Each action is contextualized and executed automatically at the right time.

Each Swiftask agent uses a dedicated identity (e.g. agent-thehive@swiftask.ai ). You keep full visibility on every action and every sent message.

Key takeaway: The agent automates repetitive decisions and leaves high-value actions to your teams.

Operational benefits for your SOC

1. 24/7 instant response

Playbooks are executed upon detection, without waiting for human intervention.

2. Rigorous standardization

Every incident is handled according to your established procedure, ensuring total consistency.

3. Focus on high-value analysis

Free your analysts from repetitive tasks to focus on threat hunting.

4. Audit and compliance

Full traceability of every action performed by the AI agent.

5. No-code flexibility

Adapt your playbooks in a few clicks without any code.

Security and compliance

Swiftask applies enterprise-grade security standards for your thehive automations.

  • Robust API authentication: Secure use of TheHive API tokens with fine-grained permission management.
  • Data isolation: Each workspace is isolated, guaranteeing the confidentiality of your incidents.
  • Full traceability: Complete logs of all interactions between the agent and TheHive.
  • Human-in-the-loop: Option to configure human validation for critical actions.

To learn more about compliance, visit the Swiftask governance page for detailed security architecture information.

RESULTS

Impact on your SOC performance

MetricBeforeAfter
Response time (MTTR)Minutes / HoursSeconds
Process error rateVariableNone
Operational loadHighMinimal (supervision)
New playbook deploymentDays/WeeksFew minutes

Take action with thehive

Reduce MTTR (Mean Time To Respond) and free your SOC analysts from repetitive tasks during incident management.

Real-time TheHive alerts: automate your incident response

Next use case