Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Splunk to Acquire Threat Intelligence Platform Provider TruSTAR

Machine data solutions firm Splunk (NASDAQ: SPLK) announced Tuesday that it has agreed to acquire TruSTAR, a San Francisco-based company that provides a threat intelligence platform designed to integrate various threat data sources and improve detection and response times.

Machine data solutions firm Splunk (NASDAQ: SPLK) announced Tuesday that it has agreed to acquire TruSTAR, a San Francisco-based company that provides a threat intelligence platform designed to integrate various threat data sources and improve detection and response times.

Terms of the acquisition were not disclosed.

Founded in 2014, TruSTAR’s platform collects and enriches internal and external data sources to automate the dissemination of intelligence to various tools and teams.

Splunk says the acquisition will help extend its security analytics capabilities and give customers the ability to drive highly effective detection and respond to threats faster.

“In today’s data age, integrated and automated intelligence is critical to accelerate detection, streamline response and increase cyber resilience. TruSTAR’s cloud-native solution centralizes threat data from a wide array of sources so it can be seamlessly integrated into Security Analytics and SOAR workflows to provide more autonomous, higher efficacy security operations,” said Sendur Sellakumar, Senior Vice President, Cloud and Chief Product Officer, Splunk. 

Splunk says that TruSTAR customers will be able to utilize community and freemium feeds from several of Splunk’s commercial threat intelligence integration partners including Intel471, Recorded Future and Mandiant.

Related: Splunk to Acquire DevOps Alert Firm VictorOps for $120 Million

Related: Splunk to Acquire Security Orchestration Firm Phantom for $350 Million

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.