Splunk SOAR: Anyone Can Automate

If you haven’t heard the news, Splunk Phantom is now Splunk SOAR – available both on-prem and in the cloud. What does this mean to you?

You can deploy SOAR in the way that best supports your business needs. No matter what deployment you choose, you can automate from anywhere, and truly “SOAR your own way!”

Hot on the heels of our cloud release is another exciting announcement: Splunk SOAR’s new Visual Playbook Editor. This new, modern visual playbook editor makes it easier than ever to create, edit, implement and scale automated playbooks to help your business eliminate security analyst grunt work, and respond to security incidents at machine speed.

With the new Splunk SOAR visual playbook editor, we’ve focused on making changes and improvements to ensure that anyone can automate. We’ve decreased the amount of custom code needed to perform basic and complex tasks, and delivered a more intuitive, familiar interface ensuring it’s approachable to all. Advanced users will appreciate increased modularity, improving reusability and scale.

Splunk SOAR’s new, modern visual playbook editor delivers:

Effortless Automation Through a Simplified Interface

Scale Automation Efficiently and Quickly with Modular Playbooks

Advanced Yet Approachable

For those that are fans of the original experience, don’t worry, users still have the option to build and edit playbooks in the classic visual playbook editor pictured here.

To learn more about cloud-delivered Splunk SOAR, fill out this form and we’ll be in touch. Also, catch us at our SOAR virtual event where our SOAR experts will show you how to orchestrate and automate common use cases such as phishing, application vulnerability management, and cloud security management, all while using the new visual playbook editor.

----------------------------------------------------
Thanks!
Ian Forrest

Related Articles

Peeping Through Windows (Logs): Using Sysmon & Event Codes for Threat Hunting
Security
12 Minute Read

Peeping Through Windows (Logs): Using Sysmon & Event Codes for Threat Hunting

Windows and endpoints go together like threat hunting and Splunk. Let's look at the most valuable Sysmon event codes for threat hunting in Splunk.
Splunk BOTS 4.0: A New Hope
Security
3 Minute Read

Splunk BOTS 4.0: A New Hope

From the basics, to new data, to registration information, discover all you need to know about Splunk BOTS 4.0 at .conf19.
Accelerate Rare Event Model Computation by Customizing Cardinality Constraints
Security
5 Minute Read

Accelerate Rare Event Model Computation by Customizing Cardinality Constraints

Splunker Xiao Lin explores how 'cardinalitySizeLimit' works, its impact on UBA performance, and how to leverage this feature to enhance threat detection.