Skip to main content
All CollectionsRelease Notes
Release Notes - Build 4.0.8
Release Notes - Build 4.0.8
Ali Murtaza avatar
Written by Ali Murtaza
Updated over a week ago

🚀 Introducing the Latest Release of SIRP - v4.0.8!

We are thrilled to unveil the latest version of SIRP, packed with powerful features and enhancements to boost your security operations. With a focus on seamless usability, enhanced reporting, and refined workflows, this release is designed to make your experience more intuitive and efficient.

Custom PDF Reports - Tailored Just for You!

You asked, and we delivered! Alongside the already popular Excel export reports, users can now generate custom PDF reports according to their specific needs. Customize and share your security insights effortlessly, making reporting a breeze. Learn more

Enhanced Performance and Connectivity Insights

No more worries about excess RAM consumption! Our latest update resolves the issue, ensuring optimal performance. Plus, with the new connectivity buttons, you can now have a clear view of all connected applications, providing you with instant visibility.

More Data Processed, Faster Results

Time is of the essence in security, and we've taken this to heart. Now, you can ingest more data in a shorter time frame with the initial frequency of ingestion sources set at 1 and 2 minutes. Get quicker insights into potential threats without compromising on accuracy.

Enhanced Comment Engine! 🗣️💬

In our relentless pursuit of improving user experience, we are excited to introduce a major upgrade to our communication tool. The comment engine has been enriched with a host of new features, giving you unprecedented control over communication within your security operations.

Tailored Comment Visibility

Your communication, your rules! Now, you have the power to define who can view each comment. Choose from three visibility options:

  • Members: Share comments exclusively with users added as members of the incident, fostering seamless collaboration within the team.

  • Private: Keep sensitive information limited to selected users, ensuring the right people are privy to critical details.

  • Public: Broadcast important updates to everyone involved, promoting transparency and facilitating broader communication.

Enhanced Comment Notifications

Stay on top of every update! With our new notification settings, you can select specific users to receive notifications for each comment. Never miss a crucial message, ensuring timely responses and action.

Effortless User Tagging

Streamline communication and direct messages to the right individuals by simply tagging them. Using the "@" symbol, followed by the user's SIRP ID, you can quickly tag users in the comments. This feature makes collaboration more efficient and helps ensure messages reach the intended recipients promptly.

Streamlined Data Entry with Mandatory Fields

We've made data entry even more user-friendly! Required fields are now clearly marked with asterisks (*), improving form usability and ensuring that no critical information is overlooked at the time of form submission.

Better Control Over URLs and Domains

Say goodbye to accidental clicks on malicious URLs and domains! With the addition of curly brackets encapsulation, the URLs and domains appear unclickable on emails, reducing the risk of accidental navigations.

Save and Reuse Search Filters

No need to recreate the same searches repeatedly. With our new Save Search filters feature, you can now save your favorite filters and use them again in the future. Even better, these saved filters seamlessly appear in the Reporting module, allowing you to schedule reports effortlessly.

Automated Scheduling of Reports

Save time and effort with automated report scheduling in Threat Intelligence and Cases modules. Stay on top of your security insights without having to manually generate reports. Learn more

View “All” Incidents Tab for Flexible Reporting

New permission in user roles allows users to view the “ALL” tab in the Incident Management module. This new tab contains containers of all Dispositions (Alerts, Investigations, Incidents). You can use this view to save Search Filters in SIRP and access them in the reporting module to configure reports.

Fresh Look with New Report Template Colors

Who said reports have to be dull? Enjoy the new vibrant and appealing color templates that will make your reports stand out and captivate your audience.Learn more

Intuitive Artifacts View with Scrollbar

Navigate through multiple artifacts effortlessly in Threat Intelligence, Incident Management, and Cases containers. Our added scrollbar enhances the viewing experience, allowing you to access the artifacts list smoothly.

Enhanced Search Filters

In Cases Management, find what you need quickly with filters and columns based on departments, offering easy sorting and a clearer picture of your data.

New Integrations

Thrilled to announce the addition of a wide range of new integrations to SIRP, enabling you to supercharge your security operations with seamless orchestration and automation.

  • Carbon Black Cloud

  • USM Anywhere

  • Jira

  • Fresh Desk

  • Skybox

  • Kaspersky

  • Slack Notifications

  • CTM Hacker View

  • CTM Threat Cover

  • BMC Remedy

  • Symantec Mail Gateway (SMG)

  • Mime Cast

  • Huawei Firewall

  • SangFor Firewall

  • LogSign

Misc. Enhancements and Bug Fixes

  • We've revamped the incident and case workflow, preventing data conflicts. A separate permission now restricts users from Editing “Closed” incidents. Reducing the data conflicts in KPI stats.

  • Added an option to choose from a list of ITSM tool configurations to post comments. You can now utilize multiple ITSM tools in your environment or different projects/boards within the same ITSM tool. Tailor your automation to fit your workflow perfectly.

  • TI analysts can now focus solely on TI cases, without being overwhelmed by other cases. Enjoy a clear and dedicated view of TI cases for enhanced efficiency.

  • The action GET CONTAINER details in the playbooks is now set to bring data from the Analysis Summary field too.

  • Clickable Source URL added in the Alert View. Now, not only you can access the Alert’s “Source” from the Alert List, but you can also directly access the URL from the Alert View. You can click on the link and directly go to the source page (e.g. SIEM).

  • Adding output of any Automation Action now goes into the “Evidence Description” field instead of “Analysis Summary”.

  • Collaboration is crucial in security operations. With our latest update, you can now tag specific people or users in Slack notifications, ensuring the right individuals are promptly notified about critical incidents.

  • Stay informed about the origin of assessments effortlessly. The new Source filter in the Vulnerability Assessment view indicates whether the assessment was automatically initiated or manually imported from an import file.

  • We understand the importance of accurate data mapping. That's why we've introduced several new fields in the Vulnerability Management module, allowing seamless mapping of data against ingested or imported assessments.

    • Plugin ID

    • Plugin Name

    • MAC Address

    • DNS Name

    • NetBIOS Name

    • First Discovered

    • Last Observed

    • Vuln Publication

    • Patch Publication

    • Source

    • Closed/Risk Acceptance Comments

    • Closed By

    • Focal Point

    • Plugin type

    • Plugin Output

    • Plugin Family

    • Focal Point

    • Plugin type

    • Plugin Output

    • Plugin Family


  • Maintain strict control over your alerts with our new permission setting “Edit Alert”. Now, you can restrict users from editing any alerts, ensuring data integrity and preventing unauthorized changes.

  • Empower your security team with more control over case dispositions. We've introduced a new permission that allows you to enable or disable case dispositions. You can now customize the visibility of dispositions in the Incident Management module, tailoring it to your needs.

  • We believe in empowering our users with more options. With the introduction of new permission, you can now disable "Default" Incident Categories, making it easier to configure and tailor the incident management process to your organization's unique requirements.

We are committed to making your security operations efficient and effective, and this latest release of SIRP is a testament to that commitment. Empower your security teams with powerful features, enhanced performance, and a more delightful user experience. Upgrade now to experience the future of security workflow! 🚀🔒💼

Did this answer your question?