Cloud SOAR Achieves IRAP Assessment Along With Enterprise Security 8.0, DMX Edge Processor & Federated Search S3

We are delighted to announce that our Cloud SOAR solution has successfully completed the Infosec Registered Assessors Program (IRAP) assessment, marking a significant milestone for our customers seeking to enhance their security capabilities. The IRAP assessment, overseen by the Australian Cyber Security Centre (ACSC), provides organisations with access to top-tier evaluation services for cloud-based offerings. With Cloud SOAR achieving the IRAP Protected level, Australian Government agencies can now leverage enhanced security infrastructure orchestration, playbook automation and case management capabilities. This milestone reinforces our commitment to supporting federal, state, and local governments, as well as non-government entities, in achieving digital resilience and leveraging data-driven strategies for SOC modernisation and risk management.

Along with this achievement, we are thrilled to introduce Enterprise Security 8.0, a groundbreaking solution designed to combat the dynamic cybersecurity threats of today. Core to the SOC of the future, Enterprise Security 8.0 enables organisations to respond more effectively to potential threats, ensuring their digital environments remain secure and dependable. Additionally, we are proud to unveil the DMX Edge Processor, which boosts data processing capabilities, and Federated Search S3, offering comprehensive search functionalities across diverse data sources, thereby enhancing our security and observability platform.

Together with Cisco, we are committed to delivering innovative solutions that drive digital resilience for our customers.

Related Articles

Detecting HAFNIUM Exchange Server Zero-Day Activity in Splunk
Security
9 Minute Read

Detecting HAFNIUM Exchange Server Zero-Day Activity in Splunk

This blog discusses how to detect HAFNIUM activity around the recent CVEs released affecting Exchange Server using Splunk and Splunk Enterprise Security.
From Prompt to Payload: LAMEHUG’s LLM-Driven Cyber Intrusion
Security
10 Minute Read

From Prompt to Payload: LAMEHUG’s LLM-Driven Cyber Intrusion

The Splunk Threat Research Team analyzes the LAMEHUG malware, examining its tactics and techniques to provide insights that can help SOC analysts and blue teamers identify and respond.
Automating With Splunk Phantom: How Norlys Does It
Security
2 Minute Read

Automating With Splunk Phantom: How Norlys Does It

Learn why Denmark’s largest power, utility and telecommunications company turned to Splunk Phantom, Splunk’s security orchestration, automation and response (SOAR) technology, to automate manual workflows, repetitive tasks and difficult-to-maintain processes.