Integrated Intelligence Enrichment With Threat Intelligence Management

Security Olivia Henderson

SOC analysts are overwhelmed with alerts and manual repetitive tasks that negatively impact their ability to conduct and prioritize investigations of critical events. They don’t have the time, or bandwidth, to sift through data feeds or sources to identify and synthesize intelligence related to an incident. It’s critical that analysts have seamless access to associated intelligence in order to have an objective view into critical events, and a comprehensive understanding into the potential risk to the enterprise.

Today, we are excited to announce the release of Threat Intelligence Management!* As a feature of both Splunk Enterprise Security (ES) and Splunk Mission Control, Threat Intelligence Management enables analysts to fully investigate security events or suspicious activity by providing the relevant and normalized intelligence to better understand threat context and accelerate time to triage.

This feature supports the SOC by reducing the number of alerts to investigate by filtering out the intelligence that is not relevant to the organization, allowing you to monitor only for intelligence related to specific use cases. By synthesizing intelligence into a single, normalized view, we're making it even easier for analysts to understand threat context and take action.

Monitor Against Curated IOC Lists to Reduce Alert Volume and Detect Faster

Threat Intelligence Management enables analysts to create indicator of compromise (IOC) threat lists for Enterprise Security in order to receive relevant alerts that align to specific detection use cases. Analysts reduce alert-fatigue by detecting IOCs relevant to their environment and access pertinent intelligence.

Access Integrated Intelligence within Incidents to Reduce Time to Investigate

Threat Intelligence Management integrates directly with Splunk Mission Control’s incident framework which enables analysts to detect sophisticated threats and reduce alert fatigue. Having Threat Intelligence Management integrated into Mission Control incidents provides analysts with an integrated intelligence solution to support investigation of critical events.

Ready to learn more? Check out the Splunk Enterprise Security or Mission Control Product Tours!

*Initial availability to eligible AWS customers in select US regions only

Related Articles

it-sa 2019 - Germany on alert at Europe’s leading trade fair for IT security
Security
1 Minute Read

it-sa 2019 - Germany on alert at Europe’s leading trade fair for IT security

Splunk went to it-sa 2019 - Europe's leading trade fair for IT security. We share our highlights of the event.
SSO without an Active Directory or LDAP provider
Security
4 Minute Read

SSO without an Active Directory or LDAP provider

Federated Search for Security
Security
3 Minute Read

Federated Search for Security

Splunker Johan Bjerke outlines some of the new security use cases Federated Search enables across Splunk deployments.