+
+

Related Products

  • SpamTitan
    814 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,343 Ratings
    Visit Website
  • Guardz
    96 Ratings
    Visit Website
  • ThreatLocker
    491 Ratings
    Visit Website
  • ConnectWise SIEM
    191 Ratings
    Visit Website
  • Criminal IP
    13 Ratings
    Visit Website
  • ManageEngine Log360
    117 Ratings
    Visit Website
  • NINJIO
    393 Ratings
    Visit Website
  • EasyDMARC
    155 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    388 Ratings
    Visit Website

About

Automate threat analysis of suspected malware and credential phishing threats. Identify and extract associated forensics for accurate and timely detections. Automatic analysis of active threats for contextual insights to accelerate investigations and achieve rapid resolution. Splunk Attack Analyzer automatically performs the actions required to fully execute an attack chain, including clicking and following links, extracting attachments and embedded files, dealing with archives, and much more. The proprietary technology safely executes the intended threat, while providing analysts a consistent, comprehensive view showing the technical details of an attack. When paired together, Splunk Attack Analyzer and Splunk SOAR provide unique, world-class analysis and response capabilities, making the SOC more effective and efficient in responding to current and future threats. Leverage multiple layers of detection techniques across both credential phishing and malware.

About

Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies in search of a tool to detect malicious content and view detailed threat forensics

Audience

Companies and enterprises interested in a software solution to secure their data against unknown threats through entity behavior analytics

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cisco
Founded: 1984
United States
www.splunk.com/en_us/products/attack-analyzer.html

Company Information

Cisco
Founded: 1984
United States
www.splunk.com/en_us/products/user-behavior-analytics.html

Alternatives

Alternatives

FortiInsight

FortiInsight

Fortinet
Securonix UEBA

Securonix UEBA

Securonix
Interset

Interset

OpenText Cybersecurity

Categories

Categories

Integrations

Splunk Cloud Platform
Splunk Enterprise
Splunk SOAR
Accenture Cloud Retail Execution
Amazon S3
Amazon S3 Glacier
Amazon SageMaker
Booz Allen MDR
Cisco Adaptive Security Appliance (ASA)
Cisco Evolved Programmable Network (EPN) Manager
Cisco Secure Email Threat Defense
Cisco Spaces
Deloitte Vaccine Management System
Infigo
Magellan Rx
SAP Ariba Contract Management
SAP Ariba Supply Chain Collaboration
SAP Cloud Platform

Integrations

Splunk Cloud Platform
Splunk Enterprise
Splunk SOAR
Accenture Cloud Retail Execution
Amazon S3
Amazon S3 Glacier
Amazon SageMaker
Booz Allen MDR
Cisco Adaptive Security Appliance (ASA)
Cisco Evolved Programmable Network (EPN) Manager
Cisco Secure Email Threat Defense
Cisco Spaces
Deloitte Vaccine Management System
Infigo
Magellan Rx
SAP Ariba Contract Management
SAP Ariba Supply Chain Collaboration
SAP Cloud Platform
Claim Splunk Attack Analyzer and update features and information
Claim Splunk Attack Analyzer and update features and information
Claim Splunk User Behavior Analytics and update features and information
Claim Splunk User Behavior Analytics and update features and information