Strengthen analytics-driven security

Splunk has introduced Splunk® Enterprise Security 4.1 (ES) and Splunk User Behavior Analytics 2.2 (UBA).

Together, Splunk ES and Splunk UBA provide customers with better machine learning, anomaly detection, context-enhanced correlation and rapid investigation capabilities. By extending user behavior analytics functionality into SIEM, Splunk continues to advance analytics-driven security solutions. Contact Splunk to purchase Splunk ES and Splunk UBA.
 
“We’re excited about these advanced capabilities that optimize how organizations detect, investigate and respond to threats,” said Haiyan Song, senior vice president of security markets, Splunk. “Customers now gain insights across the entire enterprise and take action more quickly by leveraging the combined power of machine learning, anomaly detection, correlation and ad-hoc investigation in an integrated solution.”
 
Organizations Can Now Leverage Splunk UBA Machine Learning Throughout the SIEM Workflow
Splunk UBA anomaly, threat and user context data are now available in Splunk ES. This integration includes the ability to:
  • Enhance detection and visibility of malicious attackers and insiders’ activities by combining and correlating behavioral analytics with data from enterprise and security technologies, such as threat intelligence, IPS and DLP.
  • Gain deeper context about anomalies relative to users, devices and applications in Splunk Enterprise and Splunk ES.
 
Splunk UBA Enhances Insider Threat and Cyberattack Detection Capabilities
Splunk UBA uses unsupervised machine learning and data science to enhance insider threat defense and cyberattack detection. New features and benefits delivered in UBA 2.2 include the ability to:
  • Define how threats are triggered from detected anomalies using the new Threat Detection Framework.
  • Increase data access and physical data loss coverage.
  • Improve precision, prioritization and correlation of threats with new data sources.
 
Learn more about Splunk UBA on the Splunk website. Splunk UBA can be run standalone or integrated with Splunk ES.
 
Splunk ES Powers Rapid Investigation of Advanced Threats
Splunk ES uses all machine data generated from security technologies such as network, endpoint, access, malware, vulnerability and identity information to gain organization-wide visibility and security intelligence. New features and benefits of ES 4.1 include the ability to:
·       Ingest Splunk UBA anomaly data with context for correlation against other alerts, feeds and data for more in-depth investigations.
·       Prioritize and speed investigations with risk scores added to the centralized incident review view.
·       Expand threat intelligence through the addition of Splunk Add-on for Facebook ThreatExchange.
The new CIS Companion Guides provide security guidance for emerging AI environments, including LLMs...
UK firms shift from AI experimentation to operational integration, enhancing project efficiency and...
The RFU partners with Capgemini to enhance its digital services, leveraging technology and AI to...
ABB has announced the winners of its 2026 Startup Challenge, which focuses on AI-based solutions...
Qlik has introduced a new advisory service aimed at helping organisations move from AI ideas to...
Explore how AI trust barriers hinder progress and how transparency and security can turn hesitation...
euNetworks has been selected as a connectivity partner for the AWS European Sovereign Cloud, aiming...
Oracle is expanding its multicloud networking capabilities with a new connectivity offering between...