Little Code, Big Impact: Easily Scale your Security Automation with Splunk SOAR

Security Splunk
The great Ricky Bobby from Talladega Nights once said, “If you ain’t first, you’re last.” Whether we’re talking about a NASCAR race or responding to a security alert, being able to quickly discover attacks and adversaries and respond rapidly is critically important to reducing risks and managing threats to your organization. How do we suggest you do that? With a SOAR (Security Orchestration Automation & Response) tool.

Splunk Phantom is used to automate alert triage, investigation, response, threat hunting, application vulnerability management, and much more. Phantom playbooks are how you automate these actions, ensuring a repeatable and auditable process around your security operations. Being able to customize these playbooks to fit the needs of your business is essential.

Our latest revision of Splunk Phantom’s “custom functions” make playbook creation and execution faster and easier than ever. You can now create shareable custom code across playbooks while introducing complex data objects into the playbook execution path. Once you write your custom code, you are now able to reuse that function across multiple playbooks, and introduce complex data objects into the playbook execution path — thereby saving time and effort, and maximizing playbook versatility.


These aren’t just out-of the-box playbooks, but out-of-the-box custom blocks that save you time and effort allowing for centralized code management and version control of custom functions. These capabilities provide the building blocks for scaling your automation, even to those without coding capabilities. You can create your own custom functions, or use out-of-the-box custom functions from Splunk so there’s no need to lift a finger.

Join our webinar "Little Code, Big Impact - Easily Scale your Security Automation with Splunk SOAR" to learn more about custom functions and how they can help you scale out automation within your organization.

----------------------------------------------------
Thanks!
Olivia Courtney

Related Articles

User Behavior Monitoring with M-21-31
Security
6 Minute Read

User Behavior Monitoring with M-21-31

OMB M-21-31 requires US Federal Civilian agencies to implement user behavior monitoring. We'll explain what that means and how to do it right.
Threat Advisory: SwiftSlicer Wiper STRT-TA03
Security
4 Minute Read

Threat Advisory: SwiftSlicer Wiper STRT-TA03

The Splunk Threat Research Team shares a closer look at the SwiftSlicer wiper, a new payload discovered by ESET and found in a recent January 2023 campaign.
Threat Update: AcidRain Wiper
Security
10 Minute Read

Threat Update: AcidRain Wiper

The Splunk Threat Research Team shares the details on the new malicious payload named AcidRain, designed to wipe modem or router devices (CPEs).