Splunk at RSAC™ 2025: Helping Users Build the SOC of the Future

It’s almost time once again for RSA Conference. As you’re finishing up your travel arrangements and plans for the trip to sunny San Francisco and the familiar halls of the Moscone Center, we hope you will take some time to make Splunk a part of your RSAC™ 2025 experience.

Splunk is committed to providing SecOps teams with cutting edge solutions that help improve digital resilience. Our latest advancements in Data Management, continuous innovation for our market-leading SIEM, and more, make it easier than ever for our customers to maximize their data value to optimize security outcomes. From the stage to the show floor, our goal is to arm security professionals with the knowledge and tools they need to help build the SOC of the Future for a more secure tomorrow.

We’ll have plenty of new info to share on the latest and greatest innovations in Splunk’s expansive security offerings at RSAC™ this year, including what’s to come in the next major updates for products like Splunk Enterprise Security as well as recent developments and updates for Splunk SOAR, Splunk Attack Analyzer, Splunk Asset and Risk Intelligence, and more.

Splunk is once again proud to be a Platinum Plus sponsor at RSAC™ 2025 where we will be showcasing how our security solutions can help our customers build the SOC of the Future. There’s no shortage of ways for you to connect and engage with Splunk at RSA Conference 2025. Here are some of the highlights you won’t want to miss:

Day 1

Day 2

Day 3

General

Related Articles

Security Insights: Investigating Ivanti Connect Secure Auth Bypass and RCE
Security
6 Minute Read

Security Insights: Investigating Ivanti Connect Secure Auth Bypass and RCE

The Splunk Threat Research Team has swiftly developed Splunk analytics and hunting queries, helping defenders quickly adapt and respond to emerging threats CVE-2023-46804 and CVE-2024-21887.
Detecting HAFNIUM Exchange Server Zero-Day Activity in Splunk
Security
9 Minute Read

Detecting HAFNIUM Exchange Server Zero-Day Activity in Splunk

This blog discusses how to detect HAFNIUM activity around the recent CVEs released affecting Exchange Server using Splunk and Splunk Enterprise Security.
Deploy, Test, Monitor: Mastering Microsoft Defender ASR with Atomic Techniques in Splunk
Security
17 Minute Read

Deploy, Test, Monitor: Mastering Microsoft Defender ASR with Atomic Techniques in Splunk

Explore Microsoft Defender ASR's role in cybersecurity with Splunk and learn deployment, testing, and monitoring strategies for robust defense.