Automation Made Easy: What’s New with Splunk Phantom

The Splunk Security Team is excited to share some of the new and enhanced capabilities of Splunk Phantom, Splunk’s security orchestration, automation and response (SOAR) technology. Phantom’s latest update (v4.10) makes automation implementation, operation and scaling easier than ever for your security team. Using automation, you can more efficiently address the ever-increasing volume of security events your SOC receives each day, reduce mean time to detect (MTTD) and mean time to respond (MTTR), and optimize your security operations.

Let’s Take a Look at Some of the Recent Innovations:

Security automation is now easier than ever — see all of these capabilities in action in this webinar.

To learn more about Splunk Phantom, watch a demo or sign up for the Free Community Edition of Splunk Phantom to begin your automation journey today.

Already a current Phantom user? Check out the 4.10 Release Notes or download Phantom v4.10 to take advantage of the latest updates.

----------------------------------------------------
Thanks!
Olivia Courtney

Related Articles

Educating the Next Generation of Cyber Defenders
Security
3 Minute Read

Educating the Next Generation of Cyber Defenders

Splunk's Eric Fusilero emphasizes the need for cyber defender education and aligns with the National Cyber Workforce Strategy, offering training and scholarships.
REvil Ransomware Threat Research Update and Detections
Security
8 Minute Read

REvil Ransomware Threat Research Update and Detections

On July 2, 2021, REvil group used Kaseya to distribute malware to its on-premises customers. Splunk has pushed out guidance to help understand and detect REvil. Learn more about the REvil ransomeware group, their tactics, and how to detect them using Splunk.
Atlassian Confluence Vulnerability CVE-2022-26134
Security
7 Minute Read

Atlassian Confluence Vulnerability CVE-2022-26134

Get a closer look at the Atlassian Confluence Vulnerability CVE-2022-26134, including a breakdown of what happened, how to detect it, and MITRE ATT&CK mappings.