Cloud Security

Splunk and JupiterOne partner to improve cloud asset visibility and threat detection

JupiterOne
JupiterOne, the industry's leading cyber asset attack surface management (CAASM) platform, announced a new integration partnership with Splunk, the security and observability data platform leader, making it easier for organizations to connect and analyze security insights across their cyber asset landscape. Now, security teams may access data from both the JupiterOne platform and the Splunk Security Cloud to boost the value of user data among mutual customers.

The volume of data and cyber assets grows quickly as firms speed digital transformations through cloud-native and API-first frameworks. To achieve better results, teams must have a better awareness of and visibility into all of their cyber assets. Users can leverage the JupiterOne and Splunk interface to dynamically assess the context of their cyber assets and automate incident response without having to construct or bring in additional infrastructure.

"Security buyers today value integration across threat intelligence, vulnerability management, and security operations tools, while demanding cloud-based security technologies that are easy-to-buy and use. By working with Splunk, JupiterOne meets these requirements, while making it easier for business and security teams to manage actionable data and mitigate cyber-risks," said Jon Oltsik, Senior Principal Analyst and Fellow at Enterprise Strategy Group

Users will be able to acquire context from a single source of truth across their complete security operations, as well as execute compliance assessments throughout their cyber assets and environment, thanks to this innovative cooperation between JupiterOne and Splunk. This can be done when analyzing Splunk alerts or looking into JupiterOne asset discoveries. Splunk's products aid in collecting and indexing real-time machine data so that situational insights can be generated. The JupiterOne CAASM platform's graph-based architecture, as well as its ability to query data, provides customers with complete contextual analysis, allowing a variety of use cases. Incident response, vulnerability prioritization, access management, security engineering and automation, application and product security, DevOps, and cloud and SaaS security are just a few topics covered.

"Context is essential for sound security decision making. By adding context from JupiterOne about an organization's complex cyber assets relationships to the situational awareness they get from Splunk, users can take action on incidents and meaningfully reduce risk. We believe that connecting Splunk's event data with JupiterOne's structural data in this way will become the future of real-time and contextual security, and this unique combination will provide a powerful market differentiator,"

Erkang Zheng, Founder and CEO at JupiterOne

 

Spotlight

Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More