Splunk Security Accelerates Detection and Response with Analytics-Fueled, Automation-Driven and Cloud-Delivered Solutions
Splunk Inc. (NASDAQ: SPLK) unveiled a series of innovations aimed at enhancing security for organizations navigating digital transformation. These advancements, including updates to Splunk Security Cloud and Splunk SOAR, enhance security visibility and response times in a complex threat landscape. Splunk's extensive partner integrations, exceeding 2,400, enable effective Security Operations Centers (SOCs) to manage evolving risks. The launch of the SURGe team aims to bolster support during critical cyber incidents, while new visualizations and Risk-Based Alerting improve operational insights and threat detection.
- Introduced innovative products like Splunk Security Cloud and Splunk SOAR, enhancing security measures.
- Over 2,400 partner integrations support effective SOC operations.
- Launch of SURGe provides critical support during high-profile cyber incidents.
- Risk-Based Alerting reduces alert volume while improving prioritization and detection.
- Risks associated with rapid growth, especially outside the US.
- Challenges in realizing value from significant investments in product innovations.
- Shift from license sales to cloud services affects revenue timing and margins.
- Potential integration difficulties with acquired businesses and technologies.
Splunk Keeps Organizations Secure as Their Cloud Adoption Migration Expands Attack Surface
Enterprise security leaders are in the midst of massive digital transformation, which was further accelerated over the last year due to the scale of remote work and cloud computing adoption. At the same time, organizations are confronted with a continuously evolving threat landscape. Many security products are not designed to integrate with one another, so maintaining end-to-end visibility across on-premise, hybrid and cloud environments can be too complex for security teams to handle, which leads to blind spots that attackers can exploit. As a result, SOC’s may struggle to quickly detect, investigate and respond to cyberattacks. To address these challenges, Splunk provides an extensive cloud-delivered SOC platform, which is fueled by analytics and driven by automation. With Splunk, organizations can conquer complexity, and defend against threats all the while securely enabling innovation.
“Digital transformation is a top priority for all organizations,” said
In the face of an ever-expanding array of security tools, technology partnerships continue to be integral to delivering positive security outcomes for organizations. Splunk strengthens customer success through more than 2,400 partner integrations, including Mandiant for enhanced SOC effectiveness , Zscaler for end-to-end zero trust and DTEX for insider threats.
“As global cyberattacks emerge, organizations must have confidence in their ability to detect and respond,” said
Splunk Provides End-to-Visibility for Comprehensive Threat Detection
As cloud migration continues, security teams must focus on reducing their time to detect threats to keep their organizations running securely and compliant. With Splunk Security Cloud, coming soon, customers will have access to new, rich visualizations that allow senior leaders to see key metrics and insights into the overall health of their organization’s security program. Additionally, Risk-Based Alerting (RBA) enhances threat detection abilities, reduces alert volume, and improves alert prioritization to help drive better outcomes in the SOC.
“At VMware we take a proactive approach to security monitoring, so we require a high level of confidence in our detections along with the context to focus our efforts where it matters most,” said
“Over the last year, our manufacturing clients have faced unique, evolving security challenges,” said
Splunk Enhances User Productivity and Increases the Speed of Response with Automation
When seconds can count against a fast-moving adversary, the response to security alerts must be as close to immediate as possible. In August, Splunk SOAR launched an updated visual playbook editor. This feature made it easier to create, edit, implement and scale automated playbooks to help businesses eliminate manual security tasks, and respond to security incidents at machine speed.
Today, Splunk is releasing a new Splunk SOAR App Editor, which provides a new way to edit, test, and create SOAR apps. This provides easy integration and automation between Splunk SOAR and commonly used third-party tools. Furthermore, there are more than 350 Splunk SOAR apps now available on Splunkbase, Splunk’s extensive ecosystem of partner and community-built technical integrations, which provides customers with a one-stop shop to extend the power of SOAR.
Outsmart Tomorrow’s Threats with the Best Intelligence and Research
Splunk is providing new, additional sources of intelligence to identify threats faster to better secure the enterprise. Following the acquisition of TruSTAR earlier this year, Splunk considerably expanded its intelligence marketplace sources. Today, Splunk announced that TruSTAR is now Splunk Intelligence Management, which enables customers to operationalize all sources of security intelligence across their ecosystem of teams, tools and partners, and directly delivers insights into Splunk Enterprise Security and Splunk SOAR.
In addition, Splunk has launched SURGe, an elite team of cybersecurity experts that will provide technical guidance during high-profile, time-sensitive cyberattacks. This team is dedicated to researching, responding, and educating on the threats that impact the world. As a trusted advisor, SURGe offers further support to security teams with response guides and in-depth analyses in the form of research papers and webinars. Organizations can rely on SURGe to provide appropriate context and timely recommendations so they can navigate global security incidents with confidence and intelligence.
“SURGe is your partner during high profile security incidents,” said
Today, SURGe published their inaugural SURGe research paper, which explores several methodologies for identifying potential abnormal SSL/TLS communications specifically around supply chain compromise using multiple Splunk commands and queries and open source data sources.
For more information on .conf21 announcements, visit the Splunk .conf21 website.
Safe Harbor Statement
This press release contains forward-looking statements that involve risks and uncertainties, including statements regarding Splunk’s security products and services, including Splunk Security Cloud, Splunk SOAR, Splunk Intelligence Management and SURGe, cybersecurity, and information about Splunk’s roadmap outlines and general product direction. We undertake no obligation either to develop the features or functionalities described (in preview or beta, which are used interchangeably) or to include any such feature or functionality in a future release. There are a significant number of factors that could cause actual results to differ materially from statements made in this press release, including: risks associated with Splunk’s rapid growth, particularly outside of
Additional information on potential factors that could affect Splunk’s financial results is included in the company’s Quarterly Report on Form 10-Q for the fiscal quarter ended
About
Splunk, Splunk>, Data-to-Everything, D2E and Turn Data Into Doing are trademarks and registered trademarks of
View source version on businesswire.com: https://www.businesswire.com/news/home/20211019005375/en/
Media Contact
press@splunk.com
Investor Contact
ir@splunk.com
Source: Splunk
FAQ
What are the latest innovations announced by Splunk (SPLK) for security?
How does Splunk (SPLK) address digital transformation challenges?
What is the purpose of Splunk's SURGe team?