1. Demisto.
https://www.demisto.com/wp-content/uploads/2017/04/MH-Demisto-Security-Automation-WP.pdf
. Accessed 11 Oct 2017
2. Koyama, T., Hu, B., Nagafuchi, Y., Shioji, E., Takahashi, K.: Security orchestration with a global threat intelligence platform. NTT Tech. Rev. 13, 1–6 (2015)
3. Luo, S., Salem, M.B.: Orchestration of software-defined security services. In: 2016 IEEE International Conference on Communications Workshops, ICC 2016, pp. 436–441 (2016)
4. Enterprise Strategy Group.
https://www.esg-global.com/research/esg-research-report-cybersecurity-analytics-and-operations-in-transition
. Accessed 25 Feb 2019
5. McAfee.
https://www.mcafee.com/au/solutions/orchestration.aspx
. Accessed 20 Oct 2017