Splunk Enterprise Security Features
Response (5)
Resolution Automation
Diagnose and resolve incidents without the need for human interaction.
Resolution Guidance
Guide users through the resolution process and give specific instructions to remedy individual occurrences.
System Isolation
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Threat Intelligence
Gathers information related to threats in order to gain further information on remedies.
Incident Investigation
Analyzes incidents, correlates related events, and determines the scope and impact of attacks.
Records (2)
Incident Logs
Information on each incident is stored in databases for user reference and analytics.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Management (3)
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Incident Case Management
Ability to track incidents, tasks, evidence, and investigation progress within a structured case.
Workflow Management
Administrators can organize workflows to guide remedies to specific situations incident types.
Network Management (3)
-
Activity Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
-
Asset Management
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
-
Log Management
Provides security information and stores the data in a secure repository for reference.
Incident Management (3)
-
Event Management
Alerts users of incidents and allows users to intervene manually or triggers an automated response.
-
Automated Response
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
-
Incident Reporting
Documents cases of abnormal activity and compromised systems.
Security Intelligence (4)
-
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
-
Vulnerability Assessment
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
-
Advanced Analytics
Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.
-
Data Examination
Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.
Generative AI (2)
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
Agentic AI - Security Information and Event Management (SIEM) (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Threat Detection & Triage - AI SOC Agents (3)
Anomaly Detection & Correlation
Detect and link suspicious activities across systems in real time.
False‑Positive Suppression
Identify and dismiss non‑threats through intelligent pattern recognition.
AI‑Driven Alert Triage
Reduce noise by automatically evaluating and prioritizing alerts based on risk and context.
Investigation & Enrichment - AI SOC Agents (3)
Autonomous Case Investigation
Investigate alerts end‑to‑end, gathering evidence and building incident timelines.
Contextual Enrichment from Multiple Sources
Enrich cases with data from SIEM, EDR, cloud, identity, and threat‑intel feeds.
Attack Path Mapping
Create visual maps of threat propagation and lateral movement through networks.
InfoSec Experience & Governance - AI SOC Agents (3)
Conversational Analyst Interface
Allow SOC teams to query agents via natural language about ongoing cases.
Manual Feedback Learning Loop
Improve agent performance through adaptive learning from security team corrections.
Explainability & Audit Trail
Provide human‑readable reasoning trails and decision justifications.
Response & Remediation - AI SOC Agents (3)
Mean Time Reduction Metrics
Track and lower MTTD/MTTR/MTTC through autonomous reactions.
Playbook‑Free Dynamic Workflows
Adapt remediation actions without requiring static SOAR playbooks.
Automated Response Execution
Execute predefined or adaptive responses (e.g., isolate endpoints, revoke credentials).




