(NASDAQ: SPLK), provider of the leading software platform for real-time operational intelligence, today announced version 3.0 of the Splunk® App for Enterprise Security, which empowers security professionals to stalk cyberattackers. New visualizations enable advanced threat detection, resulting in a significant reduction in the time to incident discovery and response. The Splunk App for Enterprise Security also includes a new threat intelligence framework, support for new data types, data models and pivot interface.
Threat detection speed and accuracy can be deciding factors in whether an attack becomes a massive data breach or a success story for security teams. In order to know and understand attacks as they unfold, organizations must collect any data that may be security relevant and correlate it with business data that can provide context for security events. Splunk Enterprise 6 and the Splunk App for Enterprise Security 3.0 combine to form a security intelligence platform that can support advanced security analytics at scale for even the largest IT environments, in real time. Watch the
Splunk App for Enterprise Security demo
to learn more about the latest release and the
Splunk for Security video
to better understand Splunk software’s role in organizations’ security infrastructure.
“The new Splunk App for Enterprise Security helps security professionals connect the dots to catch cyberattackers, watching their every step by enabling customers to monitor all data and see potentially malicious activity patterns,” said Steve Sommer, chief marketing officer, Splunk. “The new visualizations enable both Splunk power users and newcomers to perform complex actions needed to find and report on data anomalies and outliers. The threat intelligence framework in the Splunk App for Security delivers something security information and event management (SIEM) systems do not -- all threat feeds in a single view with de-duplicated threat information. These new enhancements can create tremendous efficiencies for security teams whose number one goal is to identify and react to threats in as little time as possible.”