securityboulevard.com Open in urlscan Pro
2606:4700:10::6816:29c  Public Scan

URL: https://securityboulevard.com/2020/07/3-steps-to-improve-your-appsec-using-threatx-and-splunk-phantom/
Submission Tags: falconsandbox
Submission: On August 29 via api from US

Form analysis 2 forms found in the DOM

GET https://securityboulevard.com/

<form action="https://securityboulevard.com/" class="search-form searchform clearfix" method="get">
  <div class="search-wrap">
    <input type="text" placeholder="Search" class="s field" name="s">
    <button class="search-icon" type="submit"></button>
  </div>
</form>

POST /2020/07/3-steps-to-improve-your-appsec-using-threatx-and-splunk-phantom/

<form method="post" enctype="multipart/form-data" id="gform_10" action="/2020/07/3-steps-to-improve-your-appsec-using-threatx-and-splunk-phantom/">
  <input type="hidden" class="gforms-pum" value="{&quot;closepopup&quot;:false,&quot;closedelay&quot;:0,&quot;openpopup&quot;:false,&quot;openpopup_id&quot;:0}">
  <div class="gform_body gform-body">
    <ul id="gform_fields_10" class="gform_fields top_label form_sublabel_below description_below">
      <li id="field_10_1" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible"><label class="gfield_label" for="input_10_1">Email<span class="gfield_required"><span
              class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_email">
          <input name="input_1" id="input_10_1" type="text" value="" class="large" placeholder="Your Email" aria-required="true" aria-invalid="false">
        </div>
      </li>
      <li id="field_10_2" class="gfield gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below field_description_below gfield_visibility_visible">
        <div class="gsection_description"><a href="https://securityboulevard.com/privacy-policy/">View Security Boulevard <u>Privacy Policy</u></a></div>
      </li>
      <li id="field_10_3" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
        <div class="ginput_container ginput_container_text"><input name="input_3" id="input_10_3" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_10_4" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
        <div class="ginput_container ginput_container_text"><input name="input_4" id="input_10_4" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_10_5" class="gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_10_5">Comments</label>
        <div class="ginput_container"><input name="input_5" id="input_10_5" type="text" value=""></div>
        <div class="gfield_description" id="gfield_description_10_5">This field is for validation purposes and should be left unchanged.</div>
      </li>
    </ul>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_10" class="gform_button button" value="Subscribe Now"
      onclick="if (!window.__cfRLUnblockHandlers) return false; if(window[&quot;gf_submitting_10&quot;]){return false;}  window[&quot;gf_submitting_10&quot;]=true;  "
      onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_10&quot;]){return false;} window[&quot;gf_submitting_10&quot;]=true;  jQuery(&quot;#gform_10&quot;).trigger(&quot;submit&quot;,[true]); }">
    <input type="hidden" class="gform_hidden" name="is_submit_10" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="10">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_10" value="WyJbXSIsImExN2ZmNzMxNzRmOWUyZjU4NDM0NzI5MzVhYzMzZjI2Il0=">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_10" id="gform_target_page_number_10" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_10" id="gform_source_page_number_10" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
</form>

Text Content

Sunday, August 29, 2021
 * DEF CON 29 Main Stage – Austin Allshouse’s ‘The Mechanics Of Compromising Low
   Entropy RSA Keys’
 * The Joy of Tech® ‘A Statement By The Beam Of Light From The Dark Side Of
   (The) Moon Album Cover’
 * Why Microsoft’s Hardware Baseline for Windows 11 Is Important
 * DEF CON 29 Main Stage – Barak Sternberg’s ‘Extension Land: Exploits And
   Rootkits In Your Browser Extensions’
 * SIM Swapping Is a Growing Cyber Threat — Here’s Help

 * 
 * 
 * 
 * 
 * 
 * 
 * 


SECURITY BOULEVARD

The Home of the Security Bloggers Network


Community Chats Webinars Library


 * Home
   * Cybersecurity News
   * Features
   * Industry Spotlight
   * News Releases
 * Security Bloggers Network
   * Latest Posts
   * Contributors
   * Syndicate Your Blog
   * Write for Security Boulevard
 * Events
   * Upcoming Events
   * Upcoming Webinars
   * On-Demand Events
   * On-Demand Webinars
 * Chat
   * Security Boulevard Chat
   * Marketing InSecurity Podcast
 * Library
 * Related Sites
   * MediaOps Inc.
   * DevOps.com
   * Container Journal
   * Digital Anarchist
   * SweetCode.io
 * Media Kit



 * Analytics
 * AppSec
 * CISO
 * Cloud
 * DevOps
 * GRC
 * Identity
 * Incident Response
 * IoT / ICS
 * Threats / Breaches
 * More
   * Blockchain / Digital Currencies
   * Careers
   * Cyberlaw
   * Mobile
   * Social Engineering
 * Humor


TwitterLinkedInFacebookRedditEmailShare
Security Bloggers Network 

HOME » SECURITY BLOGGERS NETWORK » 3 STEPS TO IMPROVE YOUR APPSEC USING THREATX
AND SPLUNK PHANTOM

3 STEPS TO IMPROVE YOUR APPSEC USING THREATX AND SPLUNK PHANTOM

by Tom Hickman on July 15, 2020

Modern AppSec and security teams face enormous challenges of scale when it comes
to their daily workload. Organizations need to secure more applications and APIs
than ever before, and those apps and APIs are under constant attack from
increasingly sophisticated methods. Security staff has to parse and analyze an
avalanche of alerts and data to stay ahead of bad actors and continuously
improve the security posture of their organization. Collectively, this is a
perfect storm that can put even the best security teams under intense strain.



That strain is starting to show! A recent survey found that 83% of cybersecurity
works felt overworked, and 82% of their teams were understaffed. And with the
shortfall in cybersecurity talent expected to hit 3.5 million in 2021, we as an
industry aren’t going to solve this problem by throwing people at it.

The combination of ThreatX and leading Security Orchestration and Automation
(SOAR) tools such as Splunk Phantom gives AppSec teams the force-multiplier they
need to vastly improve their security posture while also reducing their
operational workload.

We’ve teamed up with Splunk to break it down for you:

STEP 1:
BETTER SECURITY AND REDUCED SPRAWL WITH THREATX

As the security landscape has evolved, many organizations have acquired a wide
variety of specialized security tools that require their own configuration and
maintenance and generate their own alerts and logs. Even many supposedly
integrated solutions rely on multiple independent modules that behave like
separate products. This increases the management overhead on staff and creates
the tedious problem of correlating and analyzing logs and alerts from multiple
sources of truth, all to get a complete view of risk. 

ThreatX brings an Easy Button to this problem. Our WAAP++ platform is a truly
unified approach to AppSec that covers all types of threats. Instead of separate
solutions for WAF, behavioral analysis, anti-bot protection, DDoS mitigation,
and API protection, ThreatX provides a single platform. Just as importantly,
ThreatX brings together a wide variety of analytical and detection techniques to
deliver a continuously updated view of risk. This means that application
profiling, attacker profiling, fingerprinting, active interrogation, and
deception techniques all work as a unified detection engine. We track suspicious
and malicious activity in real-time and deliver a single verdict on a potential
threat, resulting in fewer tools to manage. With ThreatX, the endless monotony
of manually correlating alerts can finally become a lost art!

STEP 2:
ENRICHED INTELLIGENCE WITH THREATX AND SPLUNK PHANTOM

Information within ThreatX can also be invaluable for use in investigation and
response workflows. Through our integration with Splunk Phantom, security
analysts and staff can automatically leverage the unique intelligence and
context in the ThreatX platform.

For example, ThreatX discovers and maintains extensive information on each
entity that interacts with a protected application, including a variety of
low-level traits and behaviors that uniquely identify the entity. Using the
Splunk integration, this entity profile can be shared with other systems to
inform both defensive and forensic actions. The ThreatX/Splunk Phantom
integration delivers a unified, up-to-date view of an entity’s total risk to the
organization. And this can all be integrated into custom or pre-built
investigation playbooks for malware, command-and-control, ransomware, and more.

STEP 3:
AUTOMATICALLY ADAPT AND DEFEND WITH THREATX AND SPLUNK PHANTOM

In addition to investigations, security teams can use the combination of ThreatX
and Splunk Phantom to take automated and proactive action when threats are
detected. ThreatX provides the inherent ability to take action against hosts.
The Splunk Phantom integration allows security teams to extend ThreatX
enforcement decisions to other tools in their defense arsenal.

For example, the integration can allow any system such as a network firewall to
block or unblock an IP address based on information from ThreatX. Likewise,
specific hosts can be dynamically added to blacklists or whitelists. These
designations can also be triggered to adapt based on ThreatX’s internal risk
score. This means that as risk rises for a particular entity, it can be blocked,
and it can likewise be automatically unblocked once the threat has passed. This
saves staff the often-manual work of cleaning up after a blocking incident.

Two great products, three easy steps, one massively improved security posture!

What I covered above represents some of the most common examples of how security
teams automate and integrate via ThreatX and Splunk Phantom. The advantage for
organizations is two-fold:

 * a unified view of risk, and
 * an overall better security posture!

If you’d like to learn more about ThreatX and our integration with Splunk
Phantom, schedule a ThreatX demo and let us know you how it works.


Recent Articles By Author
 * Winning the battle  against blended threats
 * Five Reasons Agentless AppSec is the Right Choice
 * This Way to WAAP++

More from Tom Hickman


*** This is a Security Bloggers Network syndicated blog from ThreatX Blog
authored by Tom Hickman. Read the original post at:
https://blog.threatxlabs.com/3-steps-to-improve-your-appsec-using-threatx-and-splunk-phantom

July 15, 2020July 16, 2020 Tom Hickman Company | Product Updates

 * ← Build vs Buy: Securing Customer Identity with Loginradius
 * Strong Things Have Deep Roots: Capitalizing On Half a Century Of Positive
   Action In The Cybersecurity Sector   →




TECHSTRONG TV – LIVE


Watch latest episodes and shows


SUBSCRIBE TO OUR NEWSLETTERS

Get breaking news, free eBooks and upcoming events delivered to your inbox.
 * Email*
   
 * View Security Boulevard Privacy Policy
 * 
 * 
 * Comments
   
   This field is for validation purposes and should be left unchanged.




MOST READ ON THE BOULEVARD

HYCU Tool Assesses Ransomware Recovery Ability
Banking’s Digital Future Raises Security Concerns
Your ISP is Selling your Data—Despite Swearing Not To
Cameyo Adds Secure Cloud Tunneling Capability
Linux Attackers Take Advantage of Unpatched Vulnerabilities
Rain Washes Away Arizona Border Wall… AGAIN
Data Loss Prevention: What Is DLP and Why Is It Important?
API Security 101: Injection
What is Zero-Day Attack Identification?
The 4 most common bad bot attack methods targeting financial services


UPCOMING WEBINARS

Mon 30


API SECURITY

August 30 @ 1:00 pm - 2:00 pm
Sep 01


HOW TO DISCOVER DATA EXFILTRATION IN MINUTES, NOT MONTHS

September 1 @ 11:00 am - 12:00 pm
Sep 02


KUBERNETES LIFE CYCLE SECURITY: RED HAT OPENSHIFT LIVE HACK

September 2 @ 1:00 pm - 2:00 pm
Sep 07


THE DO’S AND DON’TS OF APPSEC FOR MODERN SOFTWARE DEVELOPMENT

September 7 @ 11:00 am - 12:00 pm
Sep 07


[EXECUTIVE BRIEFING] AVOIDING A CLOUD SECURITY COLLISION WITH POLICY-BASED
AUTOMATION

September 7 @ 3:00 pm - 4:00 pm
Sep 08


KEYS OR CERTS FOR SSH ACCESS? WHY SHOULD I CARE?

September 8 @ 11:00 am - 12:00 pm
Sep 09


SCALING GOVERNANCE, COMPLIANCE AND SECURITY THROUGH PIPELINE AUTOMATION

September 9 @ 11:00 am - 12:00 pm
Sep 09


THE PERFECT STORM: RESHAPING MDR

September 9 @ 1:00 pm - 2:00 pm
Sep 14


AUTOMATING SECURITY POLICY TO ACCELERATE CI/CD

September 14 @ 11:00 am - 12:00 pm
Sep 14


SECURING YOUR SOFTWARE SUPPLY CHAIN: LEVERAGING DARK WEB THREAT INTELLIGENCE TO
FORTIFY YOUR DEFENSES

September 14 @ 1:00 pm - 2:00 pm

More Webinars


DOWNLOAD FREE EBOOK




RECENT SECURITY BOULEVARD CHATS

 * Cloud, DevSecOps and Network Security, All Together?
 * Security-as-Code with Tim Jefferson, Barracuda Networks
 * ASRTM with Rohit Sethi, Security Compass
 * Deception: Art or Science, Ofer Israeli, Illusive Networks
 * Tips to Secure IoT and Connected Systems w/ DigiCert




INDUSTRY SPOTLIGHT

Cybersecurity Data Security Endpoint Identity & Access Industry Spotlight Mobile
Security Network Security Security Awareness Security Boulevard
(Original) Threat Intelligence Vulnerabilities 


FIRMWARE: BEYOND SECURING THE SOFTWARE STACK

August 24, 2021 Maggie Jauregui | Aug 24 0
Analytics & Intelligence CISO Suite Cybersecurity Governance, Risk &
Compliance Industry Spotlight Security Awareness Security Boulevard (Original) 


3 METRICS TO GAUGE CYBERSECURITY PROGRAM HEALTH

August 12, 2021 Colin O'Connor | Aug 12 0
Application Security Cybersecurity Data Security Identity & Access Industry
Spotlight Mobile Security Security Boulevard (Original) 


SOLVING THE PUZZLE OF GLOBAL IDENTITY VERIFICATION

August 10, 2021 Alain Meier | Aug 10 0


TOP STORIES

Analytics & Intelligence Cloud Security Cyberlaw Cybersecurity Data
Security Featured Governance, Risk & Compliance IoT & ICS Security Mobile
Security Network Security News Security Awareness Security Boulevard
(Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 


YOUR ISP IS SELLING YOUR DATA—DESPITE SWEARING NOT TO

August 26, 2021 Richi Jennings | 2 days ago 0
Analytics & Intelligence Application
Security Cybersecurity Endpoint Featured Identity & Access Incident Response IoT
& ICS Security News Security Awareness Security Boulevard (Original) Social
Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 


THIS MOUSE GIVES YOU ADMIN ON WINDOWS

August 23, 2021 Richi Jennings | Aug 23 0
Analytics & Intelligence Application Security Cloud
Security Cyberlaw Cybersecurity Endpoint Featured Governance, Risk &
Compliance IoT & ICS Security Malware Network Security News Security
Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats &
Breaches Vulnerabilities 


GREAT FIREWALL READY TO UNLEASH ‘GIGANTIC’ DDOS—SO ARE OTHER MIDDLEBOXES

August 19, 2021 Richi Jennings | Aug 19 0


SECURITY HUMOR

THE JOY OF TECH® ‘A STATEMENT BY THE BEAM OF LIGHT FROM THE DARK SIDE OF (THE)
MOON ALBUM COVER’






JOIN THE COMMUNITY

 * Add your blog to Security Bloggers Network
 * Write for Security Boulevard
 * Bloggers Meetup and Awards
 * Ask a Question
 * Email: info@securityboulevard.com


USEFUL LINKS

 * About
 * Media Kit
 * Sponsors Info
 * Copyright
 * TOS
 * Privacy Policy
 * DMCA Compliance Statement


OTHER MEDIAOPS SITES

 * Container Journal
 * DevOps.com
 * DevOps Connect
 * DevOps Institute

 * 
 * 
 * 
 * 
 * 
 * 
 * 


Copyright © 2021 MediaOps Inc. All rights reserved.
✓
Thanks for sharing!
AddToAny
More…


Our website uses cookies. By continuing to browse the website you are agreeing
to our use of cookies. For more information on how we use cookies and how you
can disable them, please read our Privacy Policy.I Accept.

Notifications





previousnextslideshow