Splunk Tech Talks
Deep-dives for technical practitioners.

Enhancing Security Operations With Automated Threat Analysis

WhitneySink
Splunk Employee
Splunk Employee

Phishing and malware attacks continue to surge, and phishing campaigns grow increasingly complex – all of which leaves analysts buried under a daily avalanche of alerts.


As threat actors become more adept at evading detection solutions with novel ways to deliver malware, the SOC requires an advanced solution to keep up with the continual shift of threat actor TTPs to protect the enterprise.

Join Sr. Principal Product Manager, Neal Iyer, to learn how automated threat analysis strengthens the overall unified security operations experience of Splunk Security through:

  • Initial triage at scale via automated end-to-end threat analysis and response and the ability to prioritize SOAR cases for analyst review
  • Enhanced Splunk Enterprise Security (ES) notables with automated analysis of URLs
  • Out of the box dashboards that empower SOC leadership to understand patterns in alert volumes and provide blue teams insights on how adversaries are getting past their defenses

Watch the full Tech Talk here:

Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...