Splunk SOAR: Anyone Can Automate

Security Splunk

If you haven’t heard the news, Splunk Phantom is now Splunk SOAR – available both on-prem and in the cloud. What does this mean to you?

You can deploy SOAR in the way that best supports your business needs. No matter what deployment you choose, you can automate from anywhere, and truly “SOAR your own way!”

Hot on the heels of our cloud release is another exciting announcement: Splunk SOAR’s new Visual Playbook Editor. This new, modern visual playbook editor makes it easier than ever to create, edit, implement and scale automated playbooks to help your business eliminate security analyst grunt work, and respond to security incidents at machine speed.

With the new Splunk SOAR visual playbook editor, we’ve focused on making changes and improvements to ensure that anyone can automate. We’ve decreased the amount of custom code needed to perform basic and complex tasks, and delivered a more intuitive, familiar interface ensuring it’s approachable to all. Advanced users will appreciate increased modularity, improving reusability and scale.

Splunk SOAR’s new, modern visual playbook editor delivers:

Effortless Automation Through a Simplified Interface

Scale Automation Efficiently and Quickly with Modular Playbooks

Advanced Yet Approachable

For those that are fans of the original experience, don’t worry, users still have the option to build and edit playbooks in the classic visual playbook editor pictured here.

To learn more about cloud-delivered Splunk SOAR, fill out this form and we’ll be in touch. Also, catch us at our SOAR virtual event where our SOAR experts will show you how to orchestrate and automate common use cases such as phishing, application vulnerability management, and cloud security management, all while using the new visual playbook editor.

----------------------------------------------------
Thanks!
Ian Forrest

Related Articles

regreSSHion: Uncovering CVE-2024-6387 in OpenSSH - A Critical Vulnerability
Security
9 Minute Read

regreSSHion: Uncovering CVE-2024-6387 in OpenSSH - A Critical Vulnerability

CVE-2024-6387, aka "regreSSHion", exposes Linux environments to remote unauthenticated code execution. Learn how to handle this CVE here.
SSO without an Active Directory or LDAP provider
Security
4 Minute Read

SSO without an Active Directory or LDAP provider

Detecting Microsoft Exchange Vulnerabilities - 0 + 8 Days Later…
Security
13 Minute Read

Detecting Microsoft Exchange Vulnerabilities - 0 + 8 Days Later…

Even if you haven’t uncovered Microsoft Exchange Vulnerabilities and malicious behavior, it is important to continue monitoring, particularly as more actors look to leverage these vulnerabilities for their own purposes.