Splunk Keeps Organizations Secure as Their Cloud Adoption Migration Expands Attack Surface
Splunk Inc., a data platform leader, announced a series of new product innovations designed to help organizations securely embrace digital transformation by providing the security visibility needed to accelerate time to detection, investigation and response. Led by new enhancements to Splunk Security Cloud and Splunk SOAR, Splunk provides organizations a comprehensive Security Operations Center (SOC) platform with industry-leading intelligence, analytics and automation.
“Splunk’s solutions help us reduce false positives, quickly deploy new alerting and take action on the most critical threats.”
Enterprise security leaders are in the midst of massive digital transformation, which was further accelerated over the last year due to the scale of remote work and cloud computing adoption. At the same time, organizations are confronted with a continuously evolving threat landscape. Many security products are not designed to integrate with one another, so maintaining end-to-end visibility across on-premise, hybrid and cloud environments can be too complex for security teams to handle, which leads to blind spots that attackers can exploit. As a result, SOC’s may struggle to quickly detect, investigate and respond to cyberattacks. To address these challenges, Splunk provides an extensive cloud-delivered SOC platform, which is fueled by analytics and driven by automation. With Splunk, organizations can conquer complexity, and defend against threats all the while securely enabling innovation.
Top iTechnology Networking News: Aunalytics to Showcase Portfolio of Managed Services, Enterprise Cloud, and Data Cleansing Solutions at the Grand Rapids IT Symposium
“Digital transformation is a top priority for all organizations,” said Jane Wong, Vice President of Product Management, Security at Splunk. “However, many security teams lack visibility across their cloud environments, are overwhelmed by alerts and manual tasks and use too many disparate tools. With Splunk, security teams can detect and respond to threats faster, effectively keeping their organizations more secure in the face of an ever-evolving attack surface.”
In the face of an ever-expanding array of security tools, technology partnerships continue to be integral to delivering positive security outcomes for organizations. Splunk strengthens customer success through more than 2,400 partner integrations, including Mandiant for enhanced SOC effectiveness , Zscaler for end-to-end zero trust and DTEX for insider threats.
“As global cyberattacks emerge, organizations must have confidence in their ability to detect and respond,” said Kevin Mandia, CEO of Mandiant. “Mandiant Incident Responders are on the frontlines and often see emerging threats first. Through our partnership with Splunk, customers have the ability to validate their controls and security operations program to determine how they would fare against a given adversary. In addition, Splunk customers have access to threat intelligence that is backed by Mandiant research, which improves detections in Splunk Enterprise Security.”
Splunk Provides End-to-Visibility for Comprehensive Threat Detection
As cloud migration continues, security teams must focus on reducing their time to detect threats to keep their organizations running securely and compliant. With Splunk Security Cloud, coming soon, customers will have access to new, rich visualizations that allow senior leaders to see key metrics and insights into the overall health of their organization’s security program. Additionally, Risk-Based Alerting (RBA) enhances threat detection abilities, reduces alert volume, and improves alert prioritization to help drive better outcomes in the SOC.
“At VMware we take a proactive approach to security monitoring, so we require a high level of confidence in our detections along with the context to focus our efforts where it matters most,” said Matt Snyder, Advanced Security Analytics Program Lead at VMware. “Splunk’s solutions help us reduce false positives, quickly deploy new alerting and take action on the most critical threats.”
“Over the last year, our manufacturing clients have faced unique, evolving security challenges,” said Kyle Miller, Director at Booz Allen Hamilton and a leader in the firm’s Commercial Operational Technology Cybersecurity practice. “Simply put, the manufacturing industry is changing quickly and the sector requires radically new automation, communications and analytics capabilities. With Splunk’s security solutions, we have been able to scale our data sources and reduce alert fatigue, allowing our customers to prioritize the alerts that are actionable. Our manufacturing clients can now detect threats earlier and faster than ever before.”
Top iTechnology Security News: Yenlo Acquires Datacon to Join Forces in Integration Landscape
Splunk Enhances User Productivity and Increases the Speed of Response with Automation
When seconds can count against a fast-moving adversary, the response to security alerts must be as close to immediate as possible. In August, Splunk SOAR launched an updated visual playbook editor. This feature made it easier to create, edit, implement and scale automated playbooks to help businesses eliminate manual security tasks, and respond to security incidents at machine speed.
Today, Splunk is releasing a new Splunk SOAR App Editor, which provides a new way to edit, test, and create SOAR apps. This provides easy integration and automation between Splunk SOAR and commonly used third-party tools. Furthermore, there are more than 350 Splunk SOAR apps now available on Splunkbase, Splunk’s extensive ecosystem of partner and community-built technical integrations, which provides customers with a one-stop shop to extend the power of SOAR.
Outsmart Tomorrow’s Threats with the Best Intelligence and Research
Splunk is providing new, additional sources of intelligence to identify threats faster to better secure the enterprise. Following the acquisition of TruSTAR earlier this year, Splunk considerably expanded its intelligence marketplace sources. Today, Splunk announced that TruSTAR is now Splunk Intelligence Management, which enables customers to operationalize all sources of security intelligence across their ecosystem of teams, tools and partners, and directly delivers insights into Splunk Enterprise Security and Splunk SOAR.
In addition, Splunk has launched SURGe, an elite team of cybersecurity experts that will provide technical guidance during high-profile, time-sensitive cyberattacks. This team is dedicated to researching, responding, and educating on the threats that impact the world. As a trusted advisor, SURGe offers further support to security teams with response guides and in-depth analyses in the form of research papers and webinars. Organizations can rely on SURGe to provide appropriate context and timely recommendations so they can navigate global security incidents with confidence and intelligence.
“SURGe is your partner during high profile security incidents,” said Ryan Kovar, Distinguished Security Strategist at Splunk. “In the face of new cyberattacks, like Kaseya or SolarWinds, SURGe empowers blue teams by providing contextual awareness. We’re here to provide details like who is behind a major cyberattack, details on the techniques being used and its implementation. We’ll also show you how to apply our trusted security research in your response workflow so that you can quickly identify exploits and act on it.”
Today, SURGe published their inaugural SURGe research paper, which explores several methodologies for identifying potential abnormal SSL/TLS communications specifically around supply chain compromise using multiple Splunk commands and queries and open source data sources.
Top iTechnology IT and DevOps News: NTT DATA Empowers Work, Workers and Workspaces
[To share your insights with us, please write to sghosh@martechseries.com]