Splunk Secures and Accelerates the Cloud Journey
New Innovations Across Splunk’s Security Operations Suite Help Customers Embrace the Cloud, Take Action on Data and Defend Their Business at
The dawn of the Data Age has sped up one of the most significant technological and societal transformations in history -- a massive, global shift to the cloud. But as the world continues to embrace multicloud and hybrid cloud environments, a host of new threat actors and security obstacles are emerging, challenging Security Operations Centers (SOCs) to speed up their cloud journeys at the pace required to keep their organizations secure.
“Organizations around the world are rapidly accelerating their cloud journeys. Whether enterprises are migrating workloads and applications to the cloud, managing colossal spikes in data volume or increasing visibility into cloud security risks, one thing is certain - when it comes to the cloud, security is everyone’s business,” said
While cloud is a critical enabler of transformation, SOCs around the world continue to be challenged with juggling a high volume of disparate and siloed security tools in their ecosystem. To help security teams unify and modernize security operations, Splunk introduced new updates to Splunk Mission Control, a cloud-native, unified security operations platform that brings together security data, analytics and operations. With Splunk Mission Control, customers can now plug in Splunk SIEM, SOAR, UBA and other third-party security technologies, giving organizations real-time, contextual visibility and control across their entire security infrastructure.
Splunk Mission Control’s Plug-In Framework enables Splunk customers to accelerate the value they get from combining their Splunk security tools and non-Splunk security tools, such as endpoint security, network security, cloud security posture and threat intelligence technologies. When integrated into Mission Control, these technologies provide unified visibility and control across the entire security ecosystem from a common, cloud-native work surface. Technology partners such as Accenture Security, C3M, Crowdstrike,
“As the volume of data continues to rise, so does the attack surface for every organization. The ability to visualize and control threats in real-time has never been more important,” said
“Accenture’s Cyber Threat Intelligence allows customers to see threats specific to their industry and assets across their ecosystem. Now Splunk has our CTI capabilities integrated into Splunk’s Mission Control Plug-In framework. This provides Splunk security clients individually tailored SOC management, which will be a game changer for modern security teams,” said
In front of an anticipated 20,000+ Splunk customers and partners streaming .conf20 live from home, Splunk also introduced updates across its security portfolio. Additional updates help organizations turn data into doing and thrive in the Data Age:
- Splunk Enterprise Security and Splunk User Behavior Analytics: The newest version of Splunk’s industry-defining security information and events management (SIEM) solution, Splunk ES now offers new, native risk-based alerts that help SOCs further refine the fidelity and priority of notable events. Splunk ES allows incident responders to address their most critical threats first, both in the cloud and on-premises. Combined with the power of Splunk UBA, Splunk’s Security Analytics portfolio helps customers visualize and protect their cloud data and scale security operations in the cloud, no matter where they are on their journey.
- Splunk Phantom®: New updates to Splunk’s industry-leading security orchestration, automation and response (SOAR) solution helps customers automate more of their security operations, allowing SOCs to scale automation. Custom functions from Splunk Phantom make playbook creation and execution faster and easier, with little to no coding required. Custom functions in Phantom allow security analysts to apply a single custom code block across multiple playbooks, enabling faster and easier scaling of automation across a wide array of security use cases.
Splunk, Splunk>, Data-to-Everything, D2E and Turn Data Into Doing are trademarks and registered trademarks of