Automating With Splunk Phantom: How Norlys Does It

Some tasks are better off automated. Paying bills on time? Automated payments. Orchestrating a coordinated response to security alerts and triaging security events? There’s Splunk Phantom for that. Monotonous tasks, in our work and personal lives, should and can be automated in order to free up time and energy to focus on the things that matter.

One organization that has embraced automation is Norlys, Denmark’s largest power, utility and telecommunications company servicing 1.5 million customers. They turned to Splunk Phantom, Splunk’s security orchestration, automation and response (SOAR) technology, to automate manual workflows, repetitive tasks and difficult-to-maintain processes. As a result, Splunk Phantom has helped the Norlys team save 35 hours per week. Processes that once took 30 minutes to complete manually now take a mere 30 seconds.

Norlys Uses Automation to Accelerate and Simplify Their Security Operations in These Five Ways:

1. Forwarding notables from Splunk Enterprise Security to Splunk Phantom: By forwarding notables from your SIEM to your automation platform, the security team can centralize (and easily automate) post-alert enrichment, threat hunting and containment. For Norlys, forwarding notables manually can take three minutes per event. The Norlys team performs this action 50 times a week. Using automation, this action takes two seconds instead of three minutes, saving the team 2.5 hours per week while reducing mean time to detect (MTTD).

2. Investigating antivirus (AV) alerts: Manually reviewing an antivirus alert is tedious and time-consuming;- it takes Norlys about 40 minutes per investigation. By automating the investigation of AV alerts, the process takes approximately 10 minutes per alert, without the need for human interaction. The automated action collects information immediately after the event occurs, reducing forensic data loss and mean time to respond (MTTR).

3. Investigating IOCs from a threat feed: Investigating indicators of compromise (IoCs) from a threat feed can take the Norlys team 15 minutes per event, if performed manually. For instance, if investigating IP reputation, the team may need to cross reference IP intelligence, query for related IPs and eventually add the IP to a block list (among other tasks). By automating these actions using Splunk Phantom, Norlys has transformed a 15-minute exercise into a 10-second exercise.

4. Obtain browser history and other important artifacts from an endpoint: Manually obtaining artifacts from an endpoint during an investigation takes time, effort and countless clicks from the UI of your endpoint security technology (EDR or EPP). Furthermore, this workflow can be messy and prone to error. It took Norlys 30 minutes on average to perform this task manually. Using Splunk Phantom automation, it now takes 20 seconds.

5. Opening tickets in external systems: Manually opening tickets is one of the main causes of analyst burnout in a high-volume alert environment. In some cases where the security alert is ambiguous, an analyst can choose not to open a ticket simply because of the inconvenience. By automating this process, Norlys reduced the time to open tickets from 10 minutes to 10 seconds.

Want to dig deeper to see how Norlys achieved these results using automated playbooks? Check out our webinar, “The Top 5 Boring Tasks Every Security Team Should Automate,” to see how automated playbooks can revolutionize your security operations.

----------------------------------------------------
Thanks!
Olivia Courtney

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.