TruSTAR Intel Workflows Series: Shifting from App-Centric to Data-Centric Security Operations

Over the past two decades, SOC teams have grown by adding people, tools, and threat intelligence sources that were needed “in the moment.” Today, security leaders are struggling to integrate and automate to capitalize on their investments and keep up with the alerts. A recent survey indicated that 50% of organizations use more than 25 security tools, with a whopping 28% using more than 50 tools. Combine the tool sprawl with almost as many disparate sources of enrichment data and you have a security program that operates in fragmented siloes, relying on skilled professionals to wrangle the data to ‘make it work’ on a daily basis. In talking with TruSTAR customers, here’s some of the challenges they’ve brought up in the fight against cybercriminals.

Signal to Noise

The promise of threat intelligence was supposed to help us detect better and faster, but this promise is yet to be realized. Without proper curation, these open and premium external data sources create more false positives than true detections and overwhelm your SOC. 42% of cybersecurity professionals say that their organizations simply ignore a significant number of security alerts because they can’t keep up with the volume of data that their tools generate. [i]

Disparate Sources of Enrichment

Many organizations subscribe to an average of 3-6 third-party intelligence sources that provide some level of context for observables, ranging from IP addresses to emails and hashes. But each source scores their data differently. One source uses a 1-100 scale while another, like VirusTotal, provides a count like 52/71, and a third will use a High/Medium/Low framework. How can any organization make sense of those scales at the speed of automation?

Sharing Across Teams

Sharing data internally can be a challenge when the detection or response tools used within one group differ from another within the same organization. Figuring out how to connect valuable data across teams becomes a nightmare of ad-hoc emails and sprawling orchestration playbooks - not to mention sharing vetted data with external organizations and sharing groups.

As one recent TruSTAR customer told us:

“We belong to a number of formal and informal sharing groups, and I’d love to do more intel sharing, but I’m drowning in signals across my different silos. I can’t seem to get the right data at the right time into the right tools''

Common Challenges

Surprisingly, challenges with intelligence management haven’t changed in my decade-long career in the CTI space. Maybe the expectation of which tool or industry category needs to solve may have shifted but the challenges themselves remain painfully consistent:

The current situation finds us spending more money to fight cyber-criminals but the data we really need to do the job is still trapped in silos and so we miss critical signals. Teams get frustrated and management demands faster, more effective solutions.

78% of Enterprise Security Leaders identified data silos, fragmented tools and lack of integration and automation as the core barrier to improving cyber resilience. — 2020 Ponemon Cyber Resilience Study

Teams need a better way to identify that malicious “needle in the haystack” that might be an email, web page, or log event.

Managing Intelligence

The intelligence management space has been playing catch-up with the volumes of data needed to be handled in order to provide good cybersecurity protection. The space has diverged into two major categories and how they deal with intelligence data: threat intelligence platforms (TIP) and Security Orchestration, Automation, and Response (SOAR).

TIP Tools

TIP tools were developed to manage the massive amounts of data generated by external sources but they have defaulted to providing a ‘faster horse’ when the industry needs a bigger change. Current TIPs have invested in user interfaces and business models that are built on one single fact → the human should do the data-wrangling. These tools are application-centric, creating yet another manually intensive data silo, missing the opportunity to provide extensive intel sharing and automation across tools and teams.

SOAR Tools

SOAR platforms focus on automating responses to security events. Using IF-THEN logic, they offer the ability to create playbooks for different events and responses with customized handling of different data sources to work around data disparity. Over time, however, those playbooks can become extremely complicated and difficult to manage, especially when using multiple third-party data sources or attempting to prioritize observables across those different sources.

Moving from App-Focused to Data-Focused

TruSTAR believes that by moving away from the current application-centric infrastructure to fully data-driven security, triaging and managing threats becomes more efficient. TIP tools provide a scoring framework for intelligence sources, but they can’t be tailored for different destinations or specific use cases. SOAR tools leverage playbooks to manage data and automate responses to security threats but those playbooks can quickly grow in complexity and are limited in how they handle intelligence sources. By focusing on data rather than applications, TruSTAR Intel Workflows extend the power of SIEM, SOAR and XDR tools.

Watch the below video to see how it works.

YouTube video player

In part 2 of this series, we’ll dive into the TruSTAR Intel Workflow and how they can be tailored for your use cases, intelligence sources, and destinations.

----------------------------------------------------
Thanks!
Elvis Hovor

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.