Use Investigation Workbench to Reduce Time to Contain and Time to Remediate

Security teams continue to see the attack surface grow as mobile communication, cloud computing, the Internet of Things (IoT) and transportation continue to evolve with digital transformation. To help address this growing variety of attacks and attack surfaces, security buyers are shifting towards solutions that accelerate Advanced Threat Detection, Incident Investigation and Response.[1]

Whether it’s the Advanced Threat Detection or Incident Response use case, knowing the attack vectors and data attackers used provides SecOps teams with the insights to respond to the incident. Having timely access to all security-relevant data helps identify what to monitor, analyze and how to respond to incidents.[2] Having the right data reduces the time to compromise to detection (often called dwell time) and the time from detection to remediation.

Reducing the time to detect and contain, and the time between containment and remediation is where Investigation Workbench—the new Splunk Enterprise Security capability—comes in.

Introducing Investigation Workbench

The latest version of Splunk ES v 5.0 introduces Investigation Workbench, which streamlines investigations and accelerates incident response.

Streamlined Incident Investigations

Investigation Workbench makes it possible to centralize an investigation augmented by detailed context from endpoint, network and all other security data that is relevant to an incident. It helps analysts focus on investigating incidents and potential mitigation by eliminating the need to switch to other dashboards and panels to get details on an incident.

Analysts and investigators can now investigate the activities of potential threat actors within the SIEM workflow by using detailed context on Assets and Identities. They can gain full extent of an incident under investigation using endpoint, network (web, email, DNS, traffic, etc.), vulnerabilities, IDS, etc.

Accelerate Incident Response

With Investigation Workbench, analysts can investigate one or more notable events and events that may represent a potential security incident. The Asset and Identity data associated with those notable events are automatically extracted for further analysis and to determine the best response.

Investigation Workbench is flexible. Analysts can adjust the time range that is suited to the incident under investigation to determine the scope of activities and respond.

Investigation Workbench extends existing Incident Review capabilities—such as Investigation Timeline—for better collaboration and tracking of the investigation.

Leverage With Your Existing Use Cases, Content and Analytic Stories

Investigation Workbench can be used to solve Incident Investigation and Incident Response use cases by leveraging third party contextual data. For example, an analyst can use human curated threat intelligence from Booz Allen Cyber4Sight for Splunk as part of the investigation cycle.

For SaaS use cases, analysts can use the Investigation Workbench (Splunk Enterprise Security) with their SaaS apps to gain visibility and insight from SaaS as an attack vector.

Analytic Stories from Splunk ES Content Update can be directly used with Investigation Workbench, which helps extend security team’s Vulnerability, Compliance, Threat Detection and Response use cases.

The Time Is Now

If you are an existing Splunk Enterprise Security customer, you can download the latest version in Splunkbase.

If you are not familiar with Splunk Enterprise Security, use the free seven-day cloud Splunk Enterprise Security Sandbox to get started in minutes.

Contact us to find out how you can benefit from Splunk Security Solutions.

Girish Bhat
Director, Security Product Marketing
Splunk
@girishb

[1] Source: 2017 Gartner SIEM Magic Quadrant
[2] Source: 2017 SANS Incident Response survey

----------------------------------------------------
Thanks!
Girish Bhat

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.