Cisco Intends to Acquire Threat Detection and Defense Company SnapAttack, Driving Further Splunk Innovation to Power the SOC of the Future

January 31, 2025, Update: We have completed the acquisition of SnapAttack. Welcome to Cisco!

The threat landscape is constantly evolving and expanding, making it more difficult than ever for organizations to keep up and defend against the latest threats. Today’s SecOps teams need cutting-edge security tools and threat intelligence-driven detection content to proactively defend against the latest tactics, techniques and procedures (TTPs) that organizations face today.

Effectively deploying and enabling threat detection is a critical capability of security operation centers (SOC) and key to keeping businesses protected. Splunk’s threat detection, investigation and response (TDIR) solution is anchored by its market-leading Security Information and Event Management (SIEM) platform, Splunk Enterprise Security (ES), which includes Enterprise Security Content Updates (ESCU) that provide customers pre-packaged, regularly updated detection content.

SnapAttack provides a solution that supports the complete detection content lifecycle, starting with curated detection content discovery that is prioritized by current threat activity, potential impact and other factors, all the way through to the continuous validation, testing and assessment of deployed content. Today, SnapAttack is used by some of the world’s largest organizations in industries with the most stringent cybersecurity regulations.

With Cisco’s acquisition of SnapAttack, security teams using Splunk security products will see even more innovation with accelerated delivery of capabilities that offer even more control, visibility and advanced management of all their security content, including the content they develop themselves.

Using a unique, threat intelligence-driven approach, SnapAttack monitors changes in the threat landscape and helps organizations understand if their current detection content protects them against the latest threats. If not, it recommends detection content that’s readily deployable for security teams to apply.

Accelerating the SOC of the Future with SnapAttack

By bringing the new capabilities provided by SnapAttack together with Splunk’s existing security products, customers will benefit from an enhanced TDIR platform that enables them to quickly adapt to changes in the threat landscape.

Key acceleration areas and benefits include:

As we continue to innovate and deliver solutions that support today’s new era of SIEM, we look forward to completing the acquisition and welcoming SnapAttack to Cisco and the Splunk team!

Related Articles

You Bet Your Lsass: Hunting LSASS Access
Security
13 Minute Read

You Bet Your Lsass: Hunting LSASS Access

Dive in as the Splunk Threat Research Team shares how Mimikatz, and a few other tools found in Atomic Red Team, access credentials via LSASS memory.
Risk-Based Alerting: The New Frontier for SIEM
Security
7 Minute Read

Risk-Based Alerting: The New Frontier for SIEM

Risk-Based Alerting (RBA) is an intelligent alerting method with SIEM for security operations to operationalize cyber security frameworks like MITRE ATT&CK, Lockheed Martin's Killchain, or CIS20.
Threat Update: CaddyWiper
Security
4 Minute Read

Threat Update: CaddyWiper

Get a breakdown of the features of the new malicious payload used against Ukraine, CaddyWiper.
Living Off The Land: Threat Research February 2022 Release
Security
6 Minute Read

Living Off The Land: Threat Research February 2022 Release

In this February 2022 release, the Splunk Threat Research Team (STRT) focused on comparing currently created living off the land security content with Sigma and the LOLBas project.
Threat Update DoubleZero Destructor
Security
5 Minute Read

Threat Update DoubleZero Destructor

The Splunk Threat Research Team shares a closer look at a new malicious payload named DoubleZero Destructor (CERT-UA #4243).
Staff Picks for Splunk Security Reading March 2022
Security
2 Minute Read

Staff Picks for Splunk Security Reading March 2022

Check out our Splunk security experts' curated list of presentations, white papers, and customer case studies that we feel are worth a read in the month of March.
Gone in 52 Seconds…and 42 Minutes: A Comparative Analysis of Ransomware Encryption Speed
Security
4 Minute Read

Gone in 52 Seconds…and 42 Minutes: A Comparative Analysis of Ransomware Encryption Speed

With the release of SURGe's new ransomware research, Splunker Shannon Davis shares a closer look into measuring how fast ransomware encrypts files.
Ransomware Encrypts Nearly 100,000 Files in Under 45 Minutes
Security
3 Minute Read

Ransomware Encrypts Nearly 100,000 Files in Under 45 Minutes

Splunk SURGe Report reveals the need for ransomware prevention over response and mitigation.
Detecting HermeticWiper
Security
9 Minute Read

Detecting HermeticWiper

Detecting HermeticWiper destructive software and ransomware decoy with Splunk.