Introducing the World’s First Modern Cloud-Based SecOps Platform: Splunk Security Cloud

To say that the past year presented its fair share of cybersecurity challenges to the InfoSec community would be a drastic understatement. The rapid migration to remote work at scale left 80% of CIOs unprepared, and SecOps teams struggled to confront the evolving threat landscape with disparate toolkits and skill sets. Not to mention that as more organizations shifted to hybrid and multi-cloud environments at scale, cloud complexity (and cloud-based threats) skyrocketed. In fact, according to recent findings from our State of Security Report, cloud security is currently the No. 1 business priority and security challenge driving investment and change.

That is why today, we’re excited to announce the new Splunk Security Cloud — the only data-centric modern security operations platform that delivers enterprise-grade advanced security analytics, automated security operations, and threat intelligence with an open, unparalleled ecosystem.

Splunk Security Cloud: Modern Cybersecurity for a Hybrid Cloud World

Splunk Security Cloud was designed with a data-centric approach to security in mind — helping teams drive better decisions. This first-of-its-kind, modern, robust security operations platform includes the following capabilities:

“Splunk Security Cloud combines advanced security analytics, streamlined security operations and an open and thriving ecosystem, bringing together Splunk’s and our partners’ industry leading security solutions to help our customers securely embrace digital transformation and SOC modernization.” — Jane Wong, Vice President, Product Management, Security at Splunk

University of Arizona Tackles New Security Challenges with Splunk

The University of Arizona turned to Splunk to understand and mitigate new challenges when nearly all of its 60,000 students, faculty and staff quickly moved off-campus when the pandemic hit last year.

“Security solutions with advanced analytics and automation help educational institutions and universities better defend against new challenges, such as IoT and edge computing attacks, and help us provide the most secure experience to our students and faculty. We are excited to partner with Splunk into the future and look forward to their continuous innovation in security.” — Lanita Collette, Deputy Chief Information Officer and Chief Information Security Officer, University of Arizona

Activating Partnerships to Enable Best-of-Breed Choice

But, wait — that’s not all! Our ever-expanding partner ecosystem continues to be a massive driver for security success at scale. With over 2,500 plus partners, Splunk’s open approach to its partner ecosystem enables organizations to take a more agile approach to high impact integrations — enabling best-of-breed choice for joint customers.

Plus, our automation ecosystem now includes over 300 third-party integrations that support more than 2,000 operations actions — allowing customers to better correlate data across disparate security tools for increased visibility and more prescriptive detection.

Not to mention that now, with Amazon Web Services (AWS), we're launching Splunk Security Analytics for AWS for small security teams! Designed for lean security teams running on AWS, Splunk Security Analytics for AWS provides deep, centralized visibility into AWS environments, accelerating threat detection and investigation capabilities for security teams with fewer staff. With enhancements like these, we’re helping make your security team lean, mean, SecOps machines — no matter the size!

The Best of Both Worlds: Security Analytics and Cloud-Native Threat Intelligence

Lastly, the launch of Splunk Security Cloud comes on the heels of Splunk’s recent acquisition of TruSTAR, a cloud-native security company specializing in data-centric threat intelligence. TruSTAR, which further extends Splunk’s leadership in security analytics through cloud-native threat intelligence integration and automation, will be integrated deeper into the Splunk Security Cloud in the coming months — allowing Splunk customers to enrich their SOC workflows with normalized threat intelligence from third-party sources and from their own historical events and investigations.

Get Started with Splunk Security Cloud Today

Visit our website for more information on the Splunk Security Cloud for security team solutions and get started today.

----------------------------------------------------
Thanks!
Jane Wong

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.