Enterprise Security Features
Explore detailed product features and in-depth workflows to see how Enterprise Security (ES) drives efficiency, precision, and impact across your security operations.
Explore detailed product features and in-depth workflows to see how Enterprise Security (ES) drives efficiency, precision, and impact across your security operations.
Deploy detections with confidence for faster mean time to detect. Get the complete detection lifecycle experience to enable engineers to seamlessly test, deploy, and monitor detections. Measure and enhance your coverage that maps to the MITRE ATT&CK® Framework — so that your team can keep pace with evolving TTPs and swiftly take action on detection gaps.
*Available in Cloud only
Learn how finding-based detections can help your security team quickly understand security incidents and respond accordingly. A finding-based detection is based on the specific detail or analytics observed, including timestamps key/value pairs, entity information, impact, risk score, threat object, and more.
Learn how detection versioning can help you better manage detection hygiene in your SIEM. Automatic detection versioning provides native, automatic version control of ESCU and customer-owned detections. Detection engineers can easily and efficiently save new versions of detections, back up detections, roll back to prior versions of detections with a single click, and maintain custom detections.
Built on a scalable platform, ES delivers data-driven insights so you can gain full-breadth visibility across your organization.
The Security Posture dashboard provides high-level insight into real-time notable events across your security operations center. You can configure the dashboard with the KPIs you need and monitor change over a 24-hour period.
Risk-Based Scoring (RBA) is a component of Entity Risk Scoring (ERS), which provides a weighted, explainable, and normalized score from a 0-100 model according to the findings associated with that entity. During an incident review process, you can easily expand the score to view the calculation details and the timeline of detection activity.
Access to threat intelligence provides SOC analysts actionable intelligence with associated normalized risk scores and the necessary context from intelligence sources that are required in order to detect, prioritize, and investigate security events. Analysts can fully investigate security events or suspicious activity by providing the relevant and normalized intelligence to better understand threat context and accelerate time to triage. Leverage intelligence from Cisco Talos to expand security coverage against evolving threats to uncover the unknown.
The Splunk Threat Research Team (STRT) are industry-recognized security experts who help security teams defend against threats by creating pre-configured detections so that analysts can easily integrate into their workflows enabling analysts to seamlessly investigate, respond to, and remediate threats. The STRT releases security content in the form of pre-packaged detections and responses to help your team stay on top of the latest threats.
Find this content in the Use Case Library in the form of Analytic Stories, where you can filter by use case or by an industry framework like MITRE ATT&CK.
In this SIEM in Seconds demo, we’ll explore the new and improved Analyst Queue in Splunk Enterprise Security. This is where security analysts spend the majority of their time triaging and investigating alerts. With our new right-hand side panel, analysts can consume all details of a finding and instantly kick off investigations and automate response.
Threat Topology allows analysts to gauge the extent of an incident by mapping all the associated risk and threat objects. Analysts can immediately discover the scope of a security incident and quickly pivot between affected assets and users in the investigation, saving time and increasing productivity.
The Asset Investigator dashboard aggregates events over time into swim lanes for easier threat hunting and incident forensic. Each swim lane defines high and low activity periods by color shade, revealing patterns in host and user actions.
Within Security Domains are ready-to-use dashboards with individual focuses — such as tracking login attempts, breach endpoints or network intrusions — that you can pivot and correlate across to reduce remediation time.
SOAR orchestrates workflows and responses across your security and IT stack so that each tool is active in your defense strategy. Case management functionality uses workbooks to codify your processes into reusable templates. Whether you're using custom templates or industry standards for incident response, SOAR facilitates task segmentation, assignment, and documentation, ensuring a cohesive and collaborative investigative process.
SOAR apps have parameters for action inputs and outputs called "contains." These are used to enable contextual actions in the SOAR user interface. A common example is the contains type "ip." This is a powerful feature that the platform provides, as it allows the user to chain the output of one action as input to another.
Splunk Enterprise Security revolutionizes the SOC workflow experience, enabling security analysts to seamlessly detect what matters, investigate holistically, and respond rapidly. Elevate security operations with complete and unified TDIR workflows, simplified terminology, modern aggregation and triage capabilities, and enhanced detections. This comprehensive demonstration covers all features and capabilities of Splunk Enterprise Security.
See how Response Plans in Splunk Enterprise Security allow users to easily collaborate and execute incident response workflows for common security use cases. Response Plan templates allow users to see each phase of an incident response plan, assign key stakeholders to specific phases, and apply simple automation playbooks to tasks for rapid remediation.
Adaptive Response Actions are actions that can be taken either manually or automatically against any notable event generated. These actions can help gather context or help accelerate response and remediation when investigating notable events and are a great foundation for automating certain processes before expanding to full security orchestration, automation, and response solution with Splunk Enterprise Security’s native SOAR capability.
Whether you’re new to coding or a Python expert, SOAR provides you with the means to create and customize playbooks. The Visual Playbook Editor simplifies the playbook creation process by allowing you to assemble custom workflows with prebuilt code blocks and action strings. It also features input playbooks for basic IT tasks, which can be integrated into larger playbooks and security workflows.
SOAR’s custom functions allow you to share custom code across playbooks while introducing complex data objects into the execution path. These aren’t just out-of-the-box playbooks, but out-of-the-box custom blocks that save you time and effort. These capabilities provide the building blocks for scaling your automation, even to those without coding capabilities.
Splunkbase features an extensive catalog of SOAR apps, which facilitate integration across 300+ third-party tools and support 2,800+ automated actions. This allows you to connect and coordinate complex workflows across your teams and tools, so you don’t need to rip and replace your existing stack.
© 2005 - 2026 Splunk LLC All rights reserved.