Supercharge Cybersecurity Investigations with Splunk and Graphistry: A Powerful Combination for Interactive Graph Exploration

As a data scientist and Splunk user, you know the importance of leveraging the right tools to gain valuable insights from your cybersecurity data. In this blog post, we'll dive deeper into how combining Splunk and Graphistry can help you unlock new capabilities for your cybersecurity investigations and gain better resilience for your organization. We'll highlight the key features of both platforms and show you how to integrate them easily with the Splunk App for Data Science and Deep Learning (DSDL) for advanced interactive graph data science. We also share useful links and a Jupyter notebook example that is available on GitHub, so you can get started quickly and for free.

Splunk allows you to collect and index machine-generated data from various sources, providing a comprehensive view of your organization's security posture and tackling advanced threat detection. With Splunk, you can analyze and investigate security incidents, detect anomalies in real-time and get notified so you can be proactive in your responses. As mentioned in an earlier article about graph analytics, many data sources in Splunk allow us to build a graph that describes the relationship between entities. Analysis of the graph can reveal valuable information that is vital for cybersecurity analytics and investigations. Interactive graph visualization is essential for such analyzes to quickly navigate through larger datasets and find the connections of interest. You can easily view smaller graphs on a Splunk dashboard using the 3D graph network topology visualization app. However, with larger graphs, this quickly runs into limitations, especially if you want to compute a layout to actually see the topological structure of a graph properly.

This is where Graphistry shines because it allows you to work smoothly with much larger graphs. Graphistry is a platform that enables you to explore and analyze large-scale graph data in real-time using GPU-accelerated visualization, analytics, and AI. It provides a highly interactive and intuitive user interface, allowing you to visualize and investigate complex cybersecurity data sets with ease. With Graphistry, you can explore network traffic patterns, identify suspicious activity or visualize the relationships between different data points. Once you have used Splunk and Graphistry to understand the graph patterns & outliers in your data you can start experimenting with more advanced AI. Graphistry greatly simplifies applying many graph analytics and AI ideas that allow you to derive more valuable insights from your graphs quickly. Some can be applied directly in Graphistry’s user interface, others can be flexibly used in Python via PyGraphistry. This allows you to explore graphs with a set of AI algorithms and once you are happy with a certain analysis pipeline you can operationalize it and use it to automatically create incidents or contribute to your risk-based alerting in Enterprise Security.

By combining Splunk and Graphistry, you can unlock new interactive graph explorations for your cybersecurity use cases and investigations. One way of getting started is by integrating the power of Graphistry into your data science workflows and using it straight from a Jupyter notebook (as shown in the screenshot above) which is available in DSDL. This comes with two main benefits:

  1. You can work flexibly with your datasets in Python and explore them iteratively and interactively in Graphistry.
  2. You can code flexibly your graph analytics pipeline in Python, leverage useful algorithms like UMAP and operationalize it with a DSDL container that can run on CPU or GPU infrastructure or uses a Graphistry server.

Here are some examples of how you can use these tools together:

Last but not least, the latest version 5.1.1 of DSDL contains an example Jupyter notebook on GitHub that shows how you can interact with Splunk and Graphistry seamlessly and hopefully get you started quickly. On Graphistry’s GitHub you can find even more examples and security-related use case demos that you can explore further. Also, feel free to check out Graphistry’s latest generative AI system called louie.ai which allows you to work interactively with your data in natural language to retrieve Splunk data and then work further with it in Graphistry.
Watch out for the next blog post by my colleague Tanzil who will dive deeper into one use case.

Happy Splunking,

Philipp

Thanks to Leo Meyerovich and Alex Morrise from Graphistry for your guidance on your technology and for keeping me technically honest. On the Splunk side, I want to thank Tanzil Kazi for your great continued collaboration on this topic as well as Mina Wu for editing this blog post.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.