Splunk at RSAC™ 2025: Helping Users Build the SOC of the Future

It’s almost time once again for RSA Conference. As you’re finishing up your travel arrangements and plans for the trip to sunny San Francisco and the familiar halls of the Moscone Center, we hope you will take some time to make Splunk a part of your RSAC™ 2025 experience.

Splunk is committed to providing SecOps teams with cutting edge solutions that help improve digital resilience. Our latest advancements in Data Management, continuous innovation for our market-leading SIEM, and more, make it easier than ever for our customers to maximize their data value to optimize security outcomes. From the stage to the show floor, our goal is to arm security professionals with the knowledge and tools they need to help build the SOC of the Future for a more secure tomorrow.

We’ll have plenty of new info to share on the latest and greatest innovations in Splunk’s expansive security offerings at RSAC™ this year, including what’s to come in the next major updates for products like Splunk Enterprise Security as well as recent developments and updates for Splunk SOAR, Splunk Attack Analyzer, Splunk Asset and Risk Intelligence, and more.

Splunk is once again proud to be a Platinum Plus sponsor at RSAC™ 2025 where we will be showcasing how our security solutions can help our customers build the SOC of the Future. There’s no shortage of ways for you to connect and engage with Splunk at RSA Conference 2025. Here are some of the highlights you won’t want to miss:

Day 1

Day 2

Day 3

General

Related Articles

Locating IP Addresses
Security
1 Minute Read

Locating IP Addresses

Little Code, Big Impact: Easily Scale your Security Automation with Splunk SOAR
Security
1 Minute Read

Little Code, Big Impact: Easily Scale your Security Automation with Splunk SOAR

Discover how our latest revision of Splunk Phantom’s 'custom functions' make playbook creation and execution faster and easier than ever with the ability to create shareable custom code across playbooks while introducing complex data objects into the playbook execution path.
TruSTAR Intel Workflows Series: Shifting from App-Centric to Data-Centric Security Operations
Security
4 Minute Read

TruSTAR Intel Workflows Series: Shifting from App-Centric to Data-Centric Security Operations

TruSTAR recently introduced API 2.O featuring TruSTAR Intel Workflows. This blog series will explain our motivations for building this feature, how it works, and how users can better inform security operations.