Skip to main content
false

Tag: SOAR

Latest Articles

Security 2 Min Read

Streamlining Vulnerability Management with Splunk Phantom

Manage the entire lifecycle of vulnerability management with automation and orchestration using Splunk’s SOAR technology, Splunk Phantom, to automate actions and reduce the time spent on patch management by 40%.
Security 2 Min Read

Taking Automation Beyond the SOC With Advanced Network Access Control

Learn how you can scale IT operational processes and enhance network performance by leveraging security orchestration, automation and response (SOAR) tools such as Splunk Phantom.
Security 3 Min Read

Splunk SOAR Playbooks: Conducting an Azure New User Census

Learn how to use automated playbooks to monitor new user accounts to ensure that threat actors like Hafnium cannot leverage the Active Directory system to exploit vulnerabilities.
Security 2 Min Read

Analytics-Based Investigation and Automated Response with AWS + Splunk Security Solutions

Learn how AWS and these Splunk products work together to help you strengthen your security posture and defend against threats to your environment.
Security 2 Min Read

Orchestrate Framework Controls to Support Security Operations with Splunk SOAR

Learn more about how to identify use cases for automation and dive deeper into the five steps of designing security workflows around framework regulations
Security 3 Min Read

How to Marie Kondo Your Incident Response with Case Management & Foundational Security Procedures

Learn how successful security teams “Marie Kondo” their security operations, cleaning up their “visible mess” to identify the true source of “disorder” (the cyber attack itself).
Security 3 Min Read

Splunk for OT Security V2: SOAR and More

OT attacks are on the rise, as we've seen from the Oldsmar water facility attack. the Splunk IoT, Manufacturing and Energy team has been hard at work improving Splunk for OT Security to help secure your environment.
Security 2 Min Read

Building a Superstar SOC with Automation and Standardization

Splunker Kelly Huang explains the how and why of standardizing your team's security processes to build a superstar SOC.
Industries 3 Min Read

As Funding Cuts Arrive, Can CDM Deliver on the Value of Its Promises?

Cybersecurity is a tough job done. But when funding allocations suddenly shift after essential programs are already under development, it can be hard for even the most creative, resilient CIOs and CISOs to keep up.