We're a small SOC team and looking to integrate threat intel matching into our Splunk deployment. We know ES does this well, and might purchase in the future, though right now I'm looking for advice about how others are working with intel in Splunk (apps / add-ons / integrations, etc).
Thanks!
Hi @rogerblanc
Check out the TAXII Connect App for Splunk. You can connect it to any TAXII feed and it will pull intel into Splunk KVStores. The app also ships with some saved searches to match logs and intel: