Introducing the OT Security Solution Accelerator

Security Chris Duffey

In Cisco’s 2024 State of Industrial Networking Report, 89% of organizations surveyed state that Cybersecurity compliance is extremely or very important to their organization and 63% of those organizations have increased spending in this area. OT Security has long been an area where organizations have been able to leverage the power of Splunk to protect their most critical environments.

In many cases, organizations are looking to integrate those capabilities into their security operations center (SOC) and therefore leverage the OT Security Add-on for Splunk which directly integrates into the market-leading SIEM, Splunk Enterprise Security.

However, the reality is some organizations are just starting on their OT Security journey and may be early in their Splunk journey as well. For those customers, the OT Security Solution Accelerator can help them get started on that journey. The OT Security Solution Accelerator provides prescriptive guidance around data collection, reference architectures, and a Splunk app with existing content to accelerate their capabilities.

Data Management and Collection

Knowing what data to collect and how to collect it is a particular challenge in OT environments where many vendors and organizations want to reduce risk to the operational environment and may restrict collection methods. At the same time, many organizations leverage multiple vendors, control systems, and various other technologies, which means tools need to be able to handle all this data in a technology-agnostic manner.

The OT Security Solution Accelerator includes the Data Management Guide which details how to collect OT data and is based on methods used today by Splunk customers. This blog provides guidance on how to leverage existing agents or agentless methods which don’t compromise the safety and availability of OT environments.

Reference Architecture

Being able to implement Splunk to meet customer requirements is always a key discussion point when discussing OT environments. Whether your organization needs to implement Splunk in an isolated OT environment, shared with multiple business units, hybrid, or completely in the cloud, the included Reference Architectures help you to understand how to implement Splunk while minimizing risk to your OT Environment.

OT Security Solution Accelerator App

The OT Security Solution Accelerator App is designed to provide as much as possible an out-of-the-box experience for our customers getting started with Splunk in their OT environment. This app includes the following content:

In addition, the app is built to make a transition to the OT Security Add-on for Splunk as easy as possible when your organization is ready to make that transition.

Installation and Configuration Guidance

For those implementing the OT Security Solution Accelerator app, prescriptive guidance around installation and configuration of the app is crucial to their success. The Installation and Configuration guide helps you to understand key steps in this process including key data sources, macros, and lookup objects involved in implementation.

Want to Learn More?

Want to learn more? Please check out the following useful assets:

If you’re new to Splunk and want to learn more, contact us. Existing customers can reach out to their Splunk sales team for direct assistance.

Related Articles

Splunk Enterprise Security Premier is Now Generally Available: Delivering the Industry’s Best Analyst Experience
Security
5 Minute Read

Splunk Enterprise Security Premier is Now Generally Available: Delivering the Industry’s Best Analyst Experience

Splunk is proud to announce the general availability of Splunk Enterprise Security (ES) Premier for cloud customers.
CISA Top Malware Summary
Security
8 Minute Read

CISA Top Malware Summary

This blog summarizes the Splunk Threat Research Team’s (STRT) recent review of the CISA Top 10 Malware strains for the year 2021 report.
Introducing Synthetic Adversarial Log Objects (SALO)
Security
2 Minute Read

Introducing Synthetic Adversarial Log Objects (SALO)

Synthetic Adversarial Log Objects (SALO) is a framework for the generation of log events without the need for infrastructure or actions to initiate the event that causes a log event. Learn more about its purpose and how you can utilize it.