Cisco Intends to Acquire Threat Detection and Defense Company SnapAttack, Driving Further Splunk Innovation to Power the SOC of the Future

January 31, 2025, Update: We have completed the acquisition of SnapAttack. Welcome to Cisco!

The threat landscape is constantly evolving and expanding, making it more difficult than ever for organizations to keep up and defend against the latest threats. Today’s SecOps teams need cutting-edge security tools and threat intelligence-driven detection content to proactively defend against the latest tactics, techniques and procedures (TTPs) that organizations face today.

Effectively deploying and enabling threat detection is a critical capability of security operation centers (SOC) and key to keeping businesses protected. Splunk’s threat detection, investigation and response (TDIR) solution is anchored by its market-leading Security Information and Event Management (SIEM) platform, Splunk Enterprise Security (ES), which includes Enterprise Security Content Updates (ESCU) that provide customers pre-packaged, regularly updated detection content.

SnapAttack provides a solution that supports the complete detection content lifecycle, starting with curated detection content discovery that is prioritized by current threat activity, potential impact and other factors, all the way through to the continuous validation, testing and assessment of deployed content. Today, SnapAttack is used by some of the world’s largest organizations in industries with the most stringent cybersecurity regulations.

With Cisco’s acquisition of SnapAttack, security teams using Splunk security products will see even more innovation with accelerated delivery of capabilities that offer even more control, visibility and advanced management of all their security content, including the content they develop themselves.

Using a unique, threat intelligence-driven approach, SnapAttack monitors changes in the threat landscape and helps organizations understand if their current detection content protects them against the latest threats. If not, it recommends detection content that’s readily deployable for security teams to apply.

Accelerating the SOC of the Future with SnapAttack

By bringing the new capabilities provided by SnapAttack together with Splunk’s existing security products, customers will benefit from an enhanced TDIR platform that enables them to quickly adapt to changes in the threat landscape.

Key acceleration areas and benefits include:

As we continue to innovate and deliver solutions that support today’s new era of SIEM, we look forward to completing the acquisition and welcoming SnapAttack to Cisco and the Splunk team!

Related Articles

Breaking Down Termite Ransomware: Infection Methods and Detections
Security
8 Minute Read

Breaking Down Termite Ransomware: Infection Methods and Detections

Deep dive into Termite ransomware: Discover its infection methods, targeted vulnerabilities (like Cleo's CVE-2024-50623), and Splunk security detections.
Imposters at the Gate: Spotting Remote Employment Fraud Before It Crosses the Wire
Security
6 Minute Read

Imposters at the Gate: Spotting Remote Employment Fraud Before It Crosses the Wire

Remote Employment Fraud actors don’t steal credentials—they’re issued them. This blog explores early detection and why security can’t face this threat alone.
Australia Is Investing in Resilience – Are Businesses Ready?
Security
3 Minute Read

Australia Is Investing in Resilience – Are Businesses Ready?

Splunker Craig Bates explains why the most immediate — and underestimated — consequence of disruption isn’t always data loss. It’s downtime.
Cloak and Firewall: Exposing Netsh’s Hidden Command Tricks
Security
10 Minute Read

Cloak and Firewall: Exposing Netsh’s Hidden Command Tricks

Learn about hidden Netsh command tricks, detection methods, and Splunk security detections to protect your Windows systems.
A Data-Driven Approach to Windows Advanced Audit Policy – What to Enable and Why
Security
14 Minute Read

A Data-Driven Approach to Windows Advanced Audit Policy – What to Enable and Why

Maximize visibility without overwhelming your SIEM with this data-driven guide to Windows Advanced Audit Policy.
Splunk at RSAC™ 2025: Helping Users Build the SOC of the Future
Security
1 Minute Read

Splunk at RSAC™ 2025: Helping Users Build the SOC of the Future

Join Splunk at RSAC™ 2025 to discover cutting-edge security solutions for building the SOC of the Future. Explore data management, SIEM advancements, and more.
Supercharge Your SOC Investigations with Splunk SOAR 6.4
Security
4 Minute Read

Supercharge Your SOC Investigations with Splunk SOAR 6.4

Splunker Nick Hunter explains how to integrate Cisco Talos threat intelligence, leverage Azure scalability, and streamline investigations.
The High Cost of Security Investigations
Security
8 Minute Read

The High Cost of Security Investigations

Splunk Asset & Risk Intelligence (ARI) can significantly reduce investigation costs, improve analyst efficiency, and accelerate threat containment.
Splunk Security Ops: Building the Blueprint for Success
Security
3 Minute Read

Splunk Security Ops: Building the Blueprint for Success

Learn how Splunk Global Security runs ops at scale and enables the business by focusing on what matters—solving problems through data, automation, and collaboration.