Splunk SOAR: Anyone Can Automate

If you haven’t heard the news, Splunk Phantom is now Splunk SOAR – available both on-prem and in the cloud. What does this mean to you?

You can deploy SOAR in the way that best supports your business needs. No matter what deployment you choose, you can automate from anywhere, and truly “SOAR your own way!”

Hot on the heels of our cloud release is another exciting announcement: Splunk SOAR’s new Visual Playbook Editor. This new, modern visual playbook editor makes it easier than ever to create, edit, implement and scale automated playbooks to help your business eliminate security analyst grunt work, and respond to security incidents at machine speed.

With the new Splunk SOAR visual playbook editor, we’ve focused on making changes and improvements to ensure that anyone can automate. We’ve decreased the amount of custom code needed to perform basic and complex tasks, and delivered a more intuitive, familiar interface ensuring it’s approachable to all. Advanced users will appreciate increased modularity, improving reusability and scale.

Splunk SOAR’s new, modern visual playbook editor delivers:

Effortless Automation Through a Simplified Interface

Scale Automation Efficiently and Quickly with Modular Playbooks

Advanced Yet Approachable

For those that are fans of the original experience, don’t worry, users still have the option to build and edit playbooks in the classic visual playbook editor pictured here.

To learn more about cloud-delivered Splunk SOAR, fill out this form and we’ll be in touch. Also, catch us at our SOAR virtual event where our SOAR experts will show you how to orchestrate and automate common use cases such as phishing, application vulnerability management, and cloud security management, all while using the new visual playbook editor.

----------------------------------------------------
Thanks!
Ian Forrest

Related Articles

Solving User Monitoring Use Cases With Splunk Enterprise Security
Security
4 Minute Read

Solving User Monitoring Use Cases With Splunk Enterprise Security

We all know Splunk’s data platform is capable of delivering incredible analytics and insights at scale, but how do we tie that power with all of the security content and premium solutions for security that Splunk provides? I thought it would be a good idea to jot some thoughts down about some common high level security use cases becauseI get asked this question so much.
I Azure You, This Will Be Useful
Security
3 Minute Read

I Azure You, This Will Be Useful

This blog post describes how to use Azure Active directory for basic hunting and discovery
Unknown and unseen, the cyberwar between Crimsonia and Berylia
Security
3 Minute Read

Unknown and unseen, the cyberwar between Crimsonia and Berylia

First week of December, unbeknown to many the island of Berylia engaged in cyberwarfare with their neighbors Crimsonia after a number of months of heightened tensions. The goal of the Berylian attackers was to disable as many critical infrastructure components of the Crimsonian Ministry of Defense in order to prevent the Crimsonian Navy from sailing. This would give the Berylian fleet the time to aid and protect critical locations and assets.