Another short video that covers integration commands and how they can be used to add and enrich, pivot or investigate data in the ESM Console. In this example I am taking the example of the Anomali ThreatStream threat intelligence platform, but it does show what is possible and how it can be used.