Introducing Our New SOAR Integrations: Why Panorama and FortiManager Users Should Be Excited

Security Coty Sugg
Hello there, cybersecurity aficionados! We're thrilled to unveil our latest and greatest Splunk SOAR apps, tailored for the giants of the firewall space: Panorama and FortiManager. These sophisticated apps help us deliver the most compelling automation for our community, no matter the tools they have deployed. Much like our playbooks packs from earlier this year, these integrations are another great way for users to align their incident response approach to MITRE D3FEND.

The Splunk SOAR team has heard your requests for integration options with these titans of the firewall market and we are excited to add them to our growing roster of apps. Users of these platforms can now revel in a suite of advanced automation and orchestration actions enhanced with the power of Splunk SOAR.

๐Ÿ” Panorama Users, Hereโ€™s Your Power List:

๐Ÿ›ก FortiManager Enthusiasts, Get Ready For:

For those safeguarding their digital fortresses with Panorama or FortiManager, life just got a tad simpler, more efficient, and definitely more automated. Dive in, explore the depths, and amplify your security game.

Stay tuned, and as always, keep those digital bastions secure!

Feel free to share, comment, or reach out if you've got any feedback or queries. If you have any new ideas or requests for updates that you'd like to see in future versions of Splunk SOAR, let us know over on Splunk Ideas. We're here, excited, and ready to support your journey with our enriched SOAR apps!

In the next and final blog in our deep dive into the newest features for Splunk SOAR 6.2, we'll take a look at our new CyberARK integration. If you haven't done so already, please be sure to also read our previous blog on logic loops and watch our Tech Talk session where we go over the newest information on Splunk SOAR 6.2.

Related Articles

SUPERNOVA Redux, with a Generous Portion of Masquerading
Security
10 Minute Read

SUPERNOVA Redux, with a Generous Portion of Masquerading

A review of the Pulse Secure attack where the threat actor connected to the network via a the Pulse Secure virtual private network (VPN), moved laterally to its SolarWinds Orion server, installed the SUPERNOVA malware, and collected credentials, all while masquerading the procdump.exe file and renamed it as splunklogger.exe.
Deploy, Test, Monitor: Mastering Microsoft AppLocker, Part 1
Security
11 Minute Read

Deploy, Test, Monitor: Mastering Microsoft AppLocker, Part 1

The Splunk Threat Research Team provides a comprehensive overview of AppLocker and guidance for getting started with AppLocker policies
Hey SDDL SDDL: Breaking Down Windows Security One ACE at a Time
Security
14 Minute Read

Hey SDDL SDDL: Breaking Down Windows Security One ACE at a Time

Explore SDDL in Windows security with our comprehensive guide to help enhance your defensive strategy against privilege escalation attacks.