Site Search

Splunk

Splunk

Splunk Phantom is a SOAR * product that enables efficient and accurate operations by automating tasks in security operations and integrating with other products.

Correlation analysis alerts from installed security devices and SIEM products are used as triggers to automatically execute incident response tasks, accelerating operator decision-making and response.

*SOAR (Security Orchestration and Automated Response) is a new category that achieves operational efficiency through security product integration and task automation.

Challenges in Corporate Security Operations

In recent years, the intensification of cyber attacks has led to increasing issues in organizational security measures, such as operational complexity, rising costs, and a lack of skills and manpower. Splunk Phantom provides the following value to SOCs and CSIRTs, which are facing increasing burdens:

Resources
Security
Shortage of human resources
Proucts
Multiple Vendor
Use the product
Alert
A large number of alerts
Static
Between products
Independent and uncoordinated
Speed
Detect, assess, and respond
Time it takes
Costs
Ever-increasing costs
What value can Splunk Phantom provide?
  1. Automating repetitive tasks reduces workload and focuses resources
  2. Automated detection, investigation, and response for faster incident response and reduced time
  3. Integrating security infrastructure to streamline operations

Splunk Phantom 6 Features

Splunk Phantom helps organizations with their security operations with six features:

1) Automation

インシデント対応手順をプログラム化(Playbook化)、反復的なタスクを自動処理する事で工数を削減します。

Moreover, automated actions are executed within seconds, providing automated intelligence for decision making.

② Orchestration (product integration)

Use APIs provided by other products and tools to obtain information and change settings.
APIs are templated in the form of Apps. Splunk Phantom has over 200 Apps and can execute over 1,000 APIs. In addition, even if there are no existing Apps, you can create new ones with Python code.

Example of integration: Automatically query and obtain IP reputation information from VirusTotal; if malicious, register the IP in the FW blacklist

  • Splunk Phantom Apps list screen
  • Apps Template Overview
    (Symantec Endpoint Protection)

Example Scenario

③ Collaboration

By centralizing security operations tools in Splunk Phantom and providing a common screen and chat function, it becomes possible for all involved parties to share the history and situation of an incident.

By using Splunk Phantom to carry out consultations and exchanges of opinions between staff members, and even explanations from the SOC department to network administrators, barriers between teams and roles are removed, enabling more efficient operations.

④ Event Management

Manage security events as they occur.

You can efficiently manage events by viewing the occurrence date, status, urgency, etc.

⑤ Case management

Events that qualify as incidents are elevated to cases and managed accordingly.

Cases manage the incident response status, assigned personnel, next response steps, and more, helping to ensure a rapid response without any omissions.

The actions and playbooks set in the template are listed as tasks.

Case Management Page

⑥ Reporting

It provides not only operators but also administrators with an incident response summary, the benefits (ROI) gained from Phantom, etc. It is also possible to output the executive summary report to PDF.

Report Summary Screen

Inquiry/Document request

In charge of Macnica Splunk Co., Ltd.

Weekdays: 9:00-17:00