Splunk Attack Analyzer Introduces Built-in Translation and Achieves SOC 2 Compliance

We’re excited to share that Splunk Attack Analyzer recently introduced the ability to translate content and achieved SOC 2 Type II certification.

Built-in Translation for Emails and Documents

Phishing emails pose a variety of challenges for SOCs today. Analysts are dealing with an overwhelming amount of potential phishing threats to triage and address each day, and traditional analysis tools often can’t navigate modern evasion and obfuscation techniques that attackers employ throughout the attack chain. As a result, analysts often have to manually collect and analyze intelligence from disparate security tools to understand whether it’s a legitimate threat and — if it is — what exactly the threat actor is trying to accomplish.

This process is made even more arduous if your SOC receives potential phishing threats in languages your analysts aren’t familiar with. For example, employees of multinational enterprises may receive phishing emails that use their local language to target them. If the SOC isn’t familiar with that language, analysts then need to spend even more of their time — and use more tools — to safely translate the content to support the investigation process.

But not anymore! Splunk Attack Analyzer’s automated analysis capabilities now include in-platform translation for emails and documents. When a potential phishing email is submitted to Splunk Attack Analyzer, the solution automatically performs the actions required to fully execute the attack chain, including:

Analysts can then view screenshots of the extracted email and/or documents, as seen in the image below.

Original email extracted by Splunk Attack Analyzer

But wait…my analysts aren’t familiar with French. Not a problem: now, they can simply click the “View translation” button to see a translated version of the email — without needing to navigate to a separate screen or tool.


Translated email content directly within Splunk Attack Analyzer

With this, analysts can quickly get additional context about the threat without interrupting the process to make time for translation, helping SOCs further accelerate the investigation and response process.

SOC 2 Compliance for Splunk Attack Analyzer

Splunk Attack Analyzer also recently achieved SOC 2 compliance. As explained on Compliance at Splunk, SOC 2 compliance “is designed to provide assurance about the effectiveness of controls in place that is relevant to the security, availability, and confidentiality of the systems where customer data is processed.”

In addition to SOC 2, Splunk Attack Analyzer also maintains SOC 1 and ISO 27001 compliance, which focus on the protection of financial information and information security management systems, respectively.

Get Started with Splunk Attack Analyzer

Splunk Attack Analyzer’s translation feature is now available to all current customers, and additional information and documentation about SOC 2 compliance is accessible from the Customer Trust Portal.

Looking to learn more about Splunk Attack Analyzer? Check out our on-demand webinar Splunk Demo Day: Automating Threat Analysis with Splunk Attack Analyzer for a step-by-step demo of the solution.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.