Integrated Intelligence Enrichment With Threat Intelligence Management

SOC analysts are overwhelmed with alerts and manual repetitive tasks that negatively impact their ability to conduct and prioritize investigations of critical events. They don’t have the time, or bandwidth, to sift through data feeds or sources to identify and synthesize intelligence related to an incident. It’s critical that analysts have seamless access to associated intelligence in order to have an objective view into critical events, and a comprehensive understanding into the potential risk to the enterprise.

Today, we are excited to announce the release of Threat Intelligence Management!* As a feature of both Splunk Enterprise Security (ES) and Splunk Mission Control, Threat Intelligence Management enables analysts to fully investigate security events or suspicious activity by providing the relevant and normalized intelligence to better understand threat context and accelerate time to triage.

This feature supports the SOC by reducing the number of alerts to investigate by filtering out the intelligence that is not relevant to the organization, allowing you to monitor only for intelligence related to specific use cases. By synthesizing intelligence into a single, normalized view, we're making it even easier for analysts to understand threat context and take action.

Monitor Against Curated IOC Lists to Reduce Alert Volume and Detect Faster

Threat Intelligence Management enables analysts to create indicator of compromise (IOC) threat lists for Enterprise Security in order to receive relevant alerts that align to specific detection use cases. Analysts reduce alert-fatigue by detecting IOCs relevant to their environment and access pertinent intelligence.

Access Integrated Intelligence within Incidents to Reduce Time to Investigate

Threat Intelligence Management integrates directly with Splunk Mission Control’s incident framework which enables analysts to detect sophisticated threats and reduce alert fatigue. Having Threat Intelligence Management integrated into Mission Control incidents provides analysts with an integrated intelligence solution to support investigation of critical events.

Ready to learn more? Check out the Splunk Enterprise Security or Mission Control Product Tours!

*Initial availability to eligible AWS customers in select US regions only

Related Articles

Add to Chrome? - Part 3: Findings and Recommendations
Security
5 Minute Read

Add to Chrome? - Part 3: Findings and Recommendations

SURGe explores findings and general recommendations on whether or not you should click 'Add to Chrome' the next time you find a fancy new extension.
Introducing Our New SOAR Integrations: Why Panorama and FortiManager Users Should Be Excited
Security
1 Minute Read

Introducing Our New SOAR Integrations: Why Panorama and FortiManager Users Should Be Excited

The Splunk SOAR team shares more on the latest firewall management apps introduced in Splunk SOAR 6.2.
How To Start Threat Hunting: The Beginner's Guide
Security
6 Minute Read

How To Start Threat Hunting: The Beginner's Guide

Ready to hunt threats? Starting a hunt in a new data environment? This is the place to begin! We've got you covered in this threat hunting 101 tutorial.