Unveiling Splunk UBA 5.3: Power and Precision in One Package

Security Tom Smit

In the face of an ever-evolving cybersecurity landscape, Splunk never rests. Today, we're ecstatic to share the release of Splunk User Behavior Analytics (UBA) 5.3, delivering power and precision in one package, and pushing the boundaries of what's possible in user and entity behavior analytics.

Redefining the Cluster Landscape: 20 Node XL

Splunk UBA is already renowned for its scalability, but with Splunk UBA 5.3, we're setting a new benchmark. Say hello to the 20 Node XL cluster. More than just an upscaled version of our classic 20 node, the XL is designed for power users. Whether you're dealing with a colossal volume of events per second (up to 160,000), managing up to 750,000 accounts, or monitoring up to a whopping 1 million devices, the 20 Node XL is your reliable powerhouse to deliver extraordinary scale and scope. Want a deep dive into the XL's offerings? Check out the Plan and Scale your Splunk UBA Deployment Manual.

Fresh Splunk UBA Models: Writing the Next Chapter in Cybersecurity

Every cybersecurity professional knows the importance of staying ahead of the curve. That’s why Splunk UBA 5.3 introduces innovative models to amplify your defense strategies:

Triad of Tech Upgrades: OS, Health, and Security

Consistency is key. The Splunk UBA 5.3 release supports:

And for our cloud enthusiasts, the UBA 5.3.0 AMI package will soon grace AWS environments.

With Splunk UBA 5.3, we've also integrated disk utilization into the Health Monitor UI. This enhancement offers peace of mind, ensuring that your backups are always ready and waiting when you need them most.

But that's not all! We've made several security updates in UBA 5.3. Please refer to the release notes for details.

Your Next Step in Behavioral Analytics

The journey of cybersecurity is unending, with every step being crucial. With UBA 5.3, we've taken a giant leap, ensuring that you remain at the forefront of protection and insight. Eager to embrace the advancements? Dive deeper into Splunk UBA and explore how 5.3 can redefine your analytics journey!

Related Articles

Simulating, Detecting, and Responding to Log4Shell with Splunk
Security
13 Minute Read

Simulating, Detecting, and Responding to Log4Shell with Splunk

Splunk Threat Research Team simulated the Log4j vulnerabilities in the Splunk Attack Range. Using the data collected, we developed 13 new detections and 9 playbooks to help Splunk SOAR customers investigate and respond to this threat.
Stat! 3 Must-Have Data Filtering Techniques
Security
6 Minute Read

Stat! 3 Must-Have Data Filtering Techniques

To hunt for threats, there's a lot of data you do NOT need. Here are the 3 must-have data filtering techniques so you can hunt those threats STAT!
UEBA Superpowers: Simplify Incident Investigations to Increase SOC Efficiency
Security
4 Minute Read

UEBA Superpowers: Simplify Incident Investigations to Increase SOC Efficiency

Fernando Jorge explains how Splunk UBA simplifies incident investigations and enhances SOC efficiency with advanced machine learning and behavior analytics.