0% found this document useful (0 votes)
159 views4 pages

Splunk For Advanced Analytics and Threat Detection Tech Brief

Splunk for Advanced Analytics and Threat Detection Tech Brief

Uploaded by

Pdro Ramirz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
159 views4 pages

Splunk For Advanced Analytics and Threat Detection Tech Brief

Splunk for Advanced Analytics and Threat Detection Tech Brief

Uploaded by

Pdro Ramirz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

TECH BRIEF

SPLUNK FOR ADVANCED ANALYTICS AND THREAT DETECTION


Powered by Splunk Enterprise Security and Splunk User Behavior Analytics

The security threat landscape continues to evolve in


both scale and sophistication. Detecting unknown, REAP THE BENEFITS OF MACHINE
hidden and insider threats early to stay ahead of LEARNING IN YOUR SOC
advanced adversaries is ever more challenging. The benefits of machine learning in security
Traditional security tools built on known and speak for themselves. It can help you better
identified rulesets and signatures are adept in analyze and respond to security incidents, better
detecting known threats, but cannot scale to fully prepare for threats and minimize overall risk—
address the complexity of advanced security threats, all while reducing costs and stress on limited
such as insider threats, zero-day attacks, laterally resources.
moving malware and compromised accounts.
Additionally, SOCs are constantly flooded with alerts, Machine learning is the perfect fit for security
many of which are false positives. In an evolving use cases like advanced threat detection and
threat landscape, security teams need to respond by stopping insider threats, which require a more
adding new analytic capabilities, giving them more nuanced monitoring and response system.
eyes to see potential threats. Advanced attacks involving lateral movement
within a network, compromised privileged users
Accelerate Investigation of Advanced Threats and accidental access to sensitive information
Through Automated Early Attack Detection by unwitting users, can all be addressed by
Splunk Enterprise Security (ES) delivers an analytics- automated, machine learning-powered anomaly
driven, market-leading SIEM solution that enables detection.
organizations to discover, monitor, investigate,
With machine learning, analysts and SOC teams
respond and report on threats, attacks and other
can perform rapid investigations, find meaningful
abnormal activity found across the enterprise. It is
insights, determine the root cause of an incident,
built on a big data platform that provides superior
draw on historical trends and share findings
scale and visibility into all security-relevant data,
without being bogged down by thousands of
and is augmented with business context to provide
alerts and false alarms. Put simply, organizations
for powerful, actionable insights. Splunk User
can improve detection speed, analyze impact
Behavior Analytics (UBA) is a machine learning-
and respond quickly to any security incident.
powered solution that finds unknown threats and
anomalous behavior across users, endpoint devices
and applications.

Together, Splunk ES and Splunk UBA rapidly address


the most sophisticated threats. By sharing anomalies
and threats and correlating them as part of the
workflow, organizations can prioritize and accelerate
investigations with risk scores added to a centralized
incident view. Splunk UBA automatically pushes threat
information into Splunk ES, which becomes a notable
event. Threats detected by Splunk UBA are factored
TECH BRIEF

into the risk scoring algorithms within Splunk ES


so you can continue to leverage the Splunk ES Risk
Scoring framework and Incident Review workflow
for threat management. Augmenting human-driven
correlation rules and searches within Splunk ES
THREAT RELATIONS

paired with unsupervised machine learning-based


threat correlations to detect unknown threats within
Splunk UBA delivers faster threat detection.

Increase SOC Efficiency and Work Smarter by Expanding Splunk ES to ingest behavioral anomalies
Leveraging the Power of Machine Learning to detected by Splunk UBA provides additional context
Augment SIEM of known and unknown threats to Splunk ES notables
and increases the accuracy and fidelity of threats. The
The powerful combination of human and machine-
powerful machine learning algorithms of Splunk UBA
driven threat detection techniques in Splunk ES
can automatically stitch dozens of anomalies into a
and Splunk UBA saves analysts’ time by leveraging
single threat; filtering alerts before they come up to
machine learning to find threats that can’t be
the SOC team, giving them time to focus on urgent
detected through rules-driven correlation. Splunk
and complex threats, while not requiring an army of
UBA increases SOC efficiency by running a two-
highly skilled security and data science professionals.
layer machine learning system over the collection
of anomalies to surface only the threats that are the
most important.

Network logs Suspicious Data


Lateral Movement
Movement

Unusual Machine
Identity logs Suspicious Behavior
Access

Compromised
Endpoint logs Flight Risk User
Account
Machine Machine
Server logs Learning Unusual Network Learning Data Exfiltration
Activity

Application Machine Generated


Malware Activity
logs Beacon
65+ ANOMALY 25+ THREAT
CLASSIFICATIONS CLASSIFICATIONS
TECH BRIEF

Optimize Insider Threat Detection and Uncover Unknown Threats


by Combining Threat Intel From SIEM and UBA
Tomorrow’s attacks won’t look like today’s and that’s why Splunk UBA automatically finds hidden or unknown
threats using data science and unsupervised machine learning that enhance insider threat defense and advanced
threat detection. By adding Splunk UBA multi-entity, behavior-based anomaly and threat information into Splunk
ES, you can leverage the power of both products to gain deeper context about anomalies relative to users, devices
and applications to better detect and respond to threats. The threat detection capabilities in Splunk UBA extend the
search, pattern, and rule-based approaches in Splunk ES for detecting threats. Additionally, Splunk UBA’s unique
correlation and pattern detection using machine learning, graph analysis, along with behavior analytics augments
Splunk ES to deliver automated detection of advanced threats spanning insider threats, account compromise,
privileged account abuse, lateral movement, data exfiltration, and more.
TECH BRIEF

Furthermore, Splunk ES and Splunk UBA delivers can leverage the power of data science with event-
dynamic and recurring security content updates that based correlation and ad-hoc searching to gain
empowers security teams to proactively stay current insight across the entire enterprise.
with the latest threat detection techniques. Together,
When combined, Splunk ES and Splunk UBA provides
Splunk ES and Splunk UBA help uncover hidden
a strong union of machine learning, anomalous user
potential incidents to stay ahead of–and more quickly
behavior detection, context-enhanced correlation
respond to--advanced threats.
and rapid investigation capabilities. The integrated
Proven, Analytics-Driven SIEM Supercharged solution provides a centralized view for incident
With Machine Learning and Behavior Analytics investigation and management to help SOC
Splunk ES goes miles beyond traditional SIEM teams quickly respond to prioritized, high-fidelity
technology by arming you with detailed investigative threats. The entire lifecycle of security operations–
and rapid-response capabilities as well as security detection, investigation, prevention and, response,
frameworks such as Notable Event, Risk Scoring, and to the ongoing feedback loop, must be unified by
Threat Intelligence to help make informed decisions. continuous monitoring and advanced analytics to
These frameworks accelerate detection and response provide context-aware intelligence. The combined
by contextualizing data, giving analysts the insight solution of Splunk ES and Splunk UBA delivers on
they need to move quickly through an investigation. this vision.
By enhancing Splunk ES with Splunk UBA, customers

Interested in elevating your security maturity with Splunk ES and Splunk UBA capabilities that are already part of
your existing investment? Then connect with us and talk with our security experts .

Learn more: www.splunk.com/asksales www.splunk.com

© 2018 Splunk Inc. All rights reserved. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light
and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,
product names, or trademarks belong to their respective owners. TB-Splunk-UBA-Analytics and Threat Detection-105

You might also like