Splunk, a leading cybersecurity vendor, has recently announced a significant integration of its technologies to enhance its security capabilities. During the Splunk conf23 user conference in Las Vegas, the company unveiled the integration of Splunk Attack Analyzer with Splunk SOAR, which aims to provide automatic analysis of malware and credential phishing attacks. This integration will help security teams uncover complex attack techniques used by hackers to evade detection.
In addition to this integration, Splunk also introduced several new AI-powered security capabilities. These capabilities are designed to help organizations automatically mine data, detect anomalies, and prioritize critical decisions. One of the notable additions is the generative AI app known as Splunk AI Assistant. This app offers an interactive chat experience and assists users in authoring Splunk Processing Language (SPL) using natural language.
Splunk recognizes the importance of observability in addressing security vulnerabilities. In a recent Enterprise Strategy Group (ESG) report, it was found that observability enabled senior IT decision makers to gain more insight into vulnerabilities. Additionally, the report revealed that observability remediation capabilities enabled security teams to act faster. By unifying security and observability processes and technologies, organizations can ensure the resilience and efficiency of their digital systems.
The integration of Splunk Attack Analyzer with Splunk SOAR enables security analysts to automate threat forensics, resulting in accurate and timely detections. This integration significantly reduces the time and resources spent on manual investigations. Analysts can now submit identified threat samples directly to Splunk Attack Analyzer or through the use of an API. This allows analysts to draw conclusions and take actions based on the insights generated without wasting manual resources. Splunk Attack Analyzer employs a proprietary technology to safely execute threats, providing analysts with a comprehensive view of the technical details of an attack. Moreover, teams can also generate non-attributable environments within Splunk Attack Analyzer to access malicious content, URLs, and files without compromising the safety of the analyst or the enterprise.
Jon Oltsik, a distinguished analyst and fellow at ESG, emphasizes the importance of a holistic approach to security and observability. He believes that organizations need a comprehensive strategy to safeguard their valuable assets, detect and address potential threats proactively, ensure regulatory compliance, maintain operational continuity, and build trust among their stakeholders.
The integration of Splunk Attack Analyzer with Splunk SOAR and the introduction of AI-powered security capabilities showcase Splunk’s commitment to providing unified experiences for greater customer digital resilience. By automating threat forensics and leveraging AI technology, Splunk empowers security teams to stay ahead of cyber threats, enabling efficient incident response and effective incident management.
In a rapidly evolving digital landscape, organizations must prioritize cybersecurity and observability to mitigate the risks posed by cybercriminals. Splunk’s latest advancements in security technologies set a strong foundation for organizations to proactively protect their digital systems and respond effectively to any cyberattacks.

