SOC teams continue to struggle with slow detection times, lack of context around security incidents, and inefficient implementation and execution of incident response workflows. The latest release of Splunk Enterprise Security directly addresses these challenges.
Splunk Enterprise Security 7.1 is now available! In this release, we provide three new capabilities to help security teams detect suspicious behavior in real-time, quickly discover the scope of an incident to respond accurately, and improve security workflow efficiencies using embedded frameworks. Let’s get into it!
Attacks are faster and more sophisticated than ever. That’s why Splunk continues to develop capabilities within Splunk Enterprise Security to improve and support the SOC’s ability to detect suspicious and malicious behavior.
A new feature called cloud-based streaming analytics integrates with Splunk’s risk-based alerting (RBA) framework to deliver enhanced analytics for improved situational awareness and response time to suspicious behavior. This feature brings scalable real-time streaming analytics for a broader range of advanced security detections and focuses on addressing common use cases including insider threat, credential access and compromise, lateral movement, and living off the land attacks. Cloud-based streaming analytics will support ‘Windows Event Log’ XML source-types, and provide Splunk Enterprise Security users with an introductory set of 50 real-time streaming detections focused on insider threat use cases. This augments our traditional search-based correlation to scale security monitoring, and drive down detection time, firing off alerts in seconds versus minutes.
Splunk Enterprise Security 7.1 users get:
As security practitioners, we often cannot see the forest for the trees. It’s sometimes easier to see the details of an incident, but not be immediately able to decipher the bigger picture. When investigating a security incident, we have to quickly be able to see the situation from both lenses simultaneously.
This is why we developed a feature called threat topology visualization. Using this feature, security analysts can quickly discover relationships between Splunk Enterprise Security assets and identities (a.k.a. users and machines) and threat objects (a.k.a. malicious executables, IP addresses, and file hashes). Analysts can pivot between affected assets and users in the investigation to see the scope of the incident beyond the infected user, providing improved situational awareness and an expanded viewpoint. This also allows the analyst to quickly determine the severity level of an incident, and identify additional impacted subjects without having to write a single line of code. And perhaps most importantly, it saves time and increases productivity, further reducing mean time to response (MTTR) for the SOC.
In summary, threat topology visualization enables Splunk Enterprise Security 7.1 users to:
See threat topology visualization in action in this demonstration video.
Stick to the plan. This has never been more important than in security. To investigate and respond to incidents quickly, efficiently and comprehensively, SOC analysts should adhere to tried and true industry frameworks, and embed those workflows into the operational fabric of their SOC.
Using our new MITRE ATT&CK® visualization capability, security analysts can quickly build situational awareness around an incident in the context of the MITRE ATT&CK Matrix. Security analysts can leverage and visualize MITRE ATT&CK annotations in Splunk Enterprise Security risk events and get a comprehensive picture of how the asset or identity has been impacted by various tactics and techniques. From there, analysts can easily drill down into MITRE ATT&CK reference material to gather additional context and plan the response. This will allow analysts to operationalize the MITRE ATT&CK Framework as they respond to notable events, and speed their understanding of the attack lifecycle as they defend the organization's assets.
In summary, MITRE ATT&CK visualization enables Splunk Enterprise Security 7.1 users to:
See MITRE ATT&CK visualization in action in this demonstration video.
Splunk Enterprise Security 7.1 also delivers features that increase deployment flexibility, improve the user experience, and increase the fidelity of risk-based alerting.
There you have it. Splunk Enterprise Security 7.1 updates are available today in both cloud and on-prem environments.
To learn more about Splunk Enterprise Security 7.1, check out a few demos, release notes, and the Splunk Enterprise Security website.
Happy Splunking!
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.