Splunk
flow-image

A Beginner's Guide to SOAR - How to Automate 5 Security Processes in Under 30 Minutes

Published by Splunk

In a world where security analysts are drowning in security alerts, and overwhelmed by monotonous, repetitive security tasks — it’s time for a lifeline. Fortunately, your security team can go from overwhelmed to in-control with security automation from Splunk SOAR. You can reduce analyst grunt work, streamline your security operations, and triage, investigate, and respond to security incidents faster than ever using orchestration and automation. Watch this webinar to learn how to build the following five automation playbooks, and get started on your journey with security orchestration and automation: Investigate a URL. Investigate a domain. Enrich phishing alerts. Create a ticket, quarantine a host, and block a domain. Perform an end-to-end investigation from a risk notable received from Splunk Enterprise Security (SIEM)

Download Now

box-icon-download

Required fields*

Please agree to the conditions

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@headleymedia.com.

Related Categories Identity Management, Network Security, Biometric Authentication, Cloud Directory, Customer Identity and Access Management (CIAM), Decentralized Identity, Identity and Access Management (IAM), Multi-Factor Authentication (MFA), Passwordless Authentication, Password Manager, Password Policy Enforcement, Privileged Access Management (PAM), Risk-Based Authentication, Self-Service Password Reset (SSPR), Single Sign-On (SSO), User Provisioning and Governance, DNS Security, Firewall, Intrusion Detesction and Prevention Systems (IDPS), Microsegmentation, Network Access Control, Network Detection and Response (NDR), Network Sandboxing, Network Security Policy Management (NSPM), Network Traffic Analysis (NTA), Software-Defined Perimeter (SDP), Unified Threat Management, Virtual Private Network (VPN), Zero Trust Networking