Tag: Splunk Soar

Latest Articles

Streamlining Vulnerability Management with Splunk Phantom
Security
2 Minute Read

Streamlining Vulnerability Management with Splunk Phantom

Manage the entire lifecycle of vulnerability management with automation and orchestration using Splunk’s SOAR technology, Splunk Phantom, to automate actions and reduce the time spent on patch management by 40%.
Taking Automation Beyond the SOC With Advanced Network Access Control
Security
2 Minute Read

Taking Automation Beyond the SOC With Advanced Network Access Control

Learn how you can scale IT operational processes and enhance network performance by leveraging security orchestration, automation and response (SOAR) tools such as Splunk Phantom.
Splunk SOAR Playbooks: Conducting an Azure New User Census
Security
3 Minute Read

Splunk SOAR Playbooks: Conducting an Azure New User Census

Learn how to use automated playbooks to monitor new user accounts to ensure that threat actors like Hafnium cannot leverage the Active Directory system to exploit vulnerabilities.
Analytics-Based Investigation and Automated Response with AWS + Splunk Security Solutions
Security
2 Minute Read

Analytics-Based Investigation and Automated Response with AWS + Splunk Security Solutions

Learn how AWS and these Splunk products work together to help you strengthen your security posture and defend against threats to your environment.
Orchestrate Framework Controls to Support Security Operations with Splunk SOAR
Security
2 Minute Read

Orchestrate Framework Controls to Support Security Operations with Splunk SOAR

Learn more about how to identify use cases for automation and dive deeper into the five steps of designing security workflows around framework regulations
How to Marie Kondo Your Incident Response with Case Management & Foundational Security Procedures
Security
3 Minute Read

How to Marie Kondo Your Incident Response with Case Management & Foundational Security Procedures

Learn how successful security teams “Marie Kondo” their security operations, cleaning up their “visible mess” to identify the true source of “disorder” (the cyber attack itself).
Splunk for OT Security V2: SOAR and More
Security
3 Minute Read

Splunk for OT Security V2: SOAR and More

OT attacks are on the rise, as we've seen from the Oldsmar water facility attack. the Splunk IoT, Manufacturing and Energy team has been hard at work improving Splunk for OT Security to help secure your environment.
Building a Superstar SOC with Automation and Standardization
Security
2 Minute Read

Building a Superstar SOC with Automation and Standardization

Splunker Kelly Huang explains the how and why of standardizing your team's security processes to build a superstar SOC.
As Funding Cuts Arrive, Can CDM Deliver on the Value of Its Promises?
Industries
3 Minute Read

As Funding Cuts Arrive, Can CDM Deliver on the Value of Its Promises?

Cybersecurity is a tough job done. But when funding allocations suddenly shift after essential programs are already under development, it can be hard for even the most creative, resilient CIOs and CISOs to keep up.
/en_us/blog/fragments/subscribe-footer