Cisco Intends to Acquire Threat Detection and Defense Company SnapAttack, Driving Further Splunk Innovation to Power the SOC of the Future

January 31, 2025, Update: We have completed the acquisition of SnapAttack. Welcome to Cisco!

The threat landscape is constantly evolving and expanding, making it more difficult than ever for organizations to keep up and defend against the latest threats. Today’s SecOps teams need cutting-edge security tools and threat intelligence-driven detection content to proactively defend against the latest tactics, techniques and procedures (TTPs) that organizations face today.

Effectively deploying and enabling threat detection is a critical capability of security operation centers (SOC) and key to keeping businesses protected. Splunk’s threat detection, investigation and response (TDIR) solution is anchored by its market-leading Security Information and Event Management (SIEM) platform, Splunk Enterprise Security (ES), which includes Enterprise Security Content Updates (ESCU) that provide customers pre-packaged, regularly updated detection content.

SnapAttack provides a solution that supports the complete detection content lifecycle, starting with curated detection content discovery that is prioritized by current threat activity, potential impact and other factors, all the way through to the continuous validation, testing and assessment of deployed content. Today, SnapAttack is used by some of the world’s largest organizations in industries with the most stringent cybersecurity regulations.

With Cisco’s acquisition of SnapAttack, security teams using Splunk security products will see even more innovation with accelerated delivery of capabilities that offer even more control, visibility and advanced management of all their security content, including the content they develop themselves.

Using a unique, threat intelligence-driven approach, SnapAttack monitors changes in the threat landscape and helps organizations understand if their current detection content protects them against the latest threats. If not, it recommends detection content that’s readily deployable for security teams to apply.

Accelerating the SOC of the Future with SnapAttack

By bringing the new capabilities provided by SnapAttack together with Splunk’s existing security products, customers will benefit from an enhanced TDIR platform that enables them to quickly adapt to changes in the threat landscape.

Key acceleration areas and benefits include:

As we continue to innovate and deliver solutions that support today’s new era of SIEM, we look forward to completing the acquisition and welcoming SnapAttack to Cisco and the Splunk team!

Related Articles

Updated Baseline Creation and Dashboards in OT Security Add-on for Splunk Version 2.3
Security
3 Minute Read

Updated Baseline Creation and Dashboards in OT Security Add-on for Splunk Version 2.3

Version 2.3 of the OT Security Add-on for Splunk is here and it delivers three main updates.
SOC Models: In-House, Out-Sourced, or Hybrid SOC?
Security
5 Minute Read

SOC Models: In-House, Out-Sourced, or Hybrid SOC?

Splunk's Kirsty Paine shares best practices from a roundtable held at Gartner Security & Risk Management Summit 2023.
Reduce Operational Complexity with Splunk SOAR Logic Loops
Security
2 Minute Read

Reduce Operational Complexity with Splunk SOAR Logic Loops

Learn about the logic loops feature introduced in Splunk SOAR version 6.2 and how you can implement them in your own use cases and playbooks.
Laying the Foundation for a Resilient Modern SOC
Security
7 Minute Read

Laying the Foundation for a Resilient Modern SOC

Splunk Security supports your journey to digital resilience by providing comprehensive security visibility to reduce business risk; equipping your team with risk-based threat detection, investigation, and response technologies to help you build a modern SOC; and fueling security innovation through Splunk’s vibrant community.
Unmasking the Enigma: A Historical Dive into the World of PlugX Malware
Security
8 Minute Read

Unmasking the Enigma: A Historical Dive into the World of PlugX Malware

The Splunk Threat Research Team (STRT) unravels the mystery of a PlugX variant, peeling back the layers of its payload, tactics, and impact on the digital realm.
User Behavior Monitoring with M-21-31
Security
6 Minute Read

User Behavior Monitoring with M-21-31

OMB M-21-31 requires US Federal Civilian agencies to implement user behavior monitoring. We'll explain what that means and how to do it right.
CIO Roundtable: Harnessing GenAI for Resilient Security and Observability – Insights and Strategies
Security
2 Minute Read

CIO Roundtable: Harnessing GenAI for Resilient Security and Observability – Insights and Strategies

Get insights from a recent roundtable discussion in collaboration with CIO magazine. The talk focused on the dual challenge faced by IT and security managers: mitigating risks associated with AI while leveraging AI to enhance organizational capability.
Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox
Security
6 Minute Read

Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox

Got some parsed fields that you're ready to analyze... possibly for threat hunting? We'll use Levenshtein, Shannon & URL Toolbox to show you how!
Parsing Domains with URL Toolbox (Just Like House Slytherin)
Security
3 Minute Read

Parsing Domains with URL Toolbox (Just Like House Slytherin)

One of the most popular Splunk security apps of all time, URL Toolbox’s URL parsing capabilities have been leveraged by thousands. Full story here.