Splunk Attack AnalyzerSplunk
|
||||||
Related Products
|
||||||
About
Automate threat analysis of suspected malware and credential phishing threats. Identify and extract associated forensics for accurate and timely detections. Automatic analysis of active threats for contextual insights to accelerate investigations and achieve rapid resolution. Splunk Attack Analyzer automatically performs the actions required to fully execute an attack chain, including clicking and following links, extracting attachments and embedded files, dealing with archives, and much more. The proprietary technology safely executes the intended threat, while providing analysts a consistent, comprehensive view showing the technical details of an attack. When paired together, Splunk Attack Analyzer and Splunk SOAR provide unique, world-class analysis and response capabilities, making the SOC more effective and efficient in responding to current and future threats. Leverage multiple layers of detection techniques across both credential phishing and malware.
|
About
Get the information advantage needed to beat the next threat. 24/ 7 investigation of alerts that remain unknown to other solutions. Immediately know that an unknown suspect’s code is a variant of malware quantifiably with 70-100% similarity. Immediately know all the suspect’s matched malware families, the type of malware, and IOCs. Act automatically and block perfect malware matches. Escalate suspects after obtaining an information advantage that arrives with the code of interest already identified. Automatically employ newly extracted IOCs and all matched IOCs to harden. Hunt and monitor with automatically created highly accurate bytecode-based YARA created from the suspect just convicted, our collection of matched code, or from specifically selected malware samples. Customizable API lets you automate action to save expert time by automatically deobfuscating and reversing exploit code to individual functions.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies in search of a tool to detect malicious content and view detailed threat forensics
|
Audience
Enterprises wanting a solution to detect and attribute unknown variants and threats in minutes
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationSplunk
Founded: 2005
United States
www.splunk.com/en_us/products/attack-analyzer.html
|
Company InformationUnkown Cyber
unknowncyber.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|||||
|
|
|||||
|
|
|||||
Categories |
Categories |
|||||
Integrations
Splunk Cloud Platform
Splunk Enterprise
Splunk SOAR
|
||||||
|
|