Splunk Tech Talks
Deep-dives for technical practitioners.

Intelligence Management with Splunk + TruSTAR

melissap
Splunk Employee
Splunk Employee

View our Tech Talk: Security Edition, Intelligence Management with Splunk + TruSTAR 

(view in My Videos)

Manual vetting and data from multiple sources cause analysts to waste much of their time data wrangling, taking time away from alerts that matter the most. Analysts need the ability to normalize and enrich multiple data sources for an objective view of security events. 

The TruSTAR Unified App for Splunk Enterprise and Enterprise Security helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. 

Tune in to learn how to:

  • Customize data ingest preferences using TruSTAR Indicator Prioritization Intel Workflows
  • Automatically download observables into Splunk KV stores
  • Enrich and prioritize notable events in Splunk Enterprise Security 
Contributors
Get Updates on the Splunk Community!

Observability Simplified: Combining User Experience, Application Performance & ...

Tech Talk Observability Simplified: Combining User Experience, Application Performance & Network ...

Event Series May & June: From Network Visibility to Service Intelligence

Unifying the Network: Moving from Alert Noise to Service Intelligence with Splunk ITSI In today’s hybrid ...

Global Splunk User Group Events: May + June 2026

Your Splunk Community Awaits: Discover Upcoming User Group Events Worldwide    Staying ahead in the fast-paced ...