Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Splunk for FireEye Correlates Analytics on Cyber Attacks

Threat prevention provider FireEye, and Splunk, the recently gone public provider of software that helps organizations gather and make use of machine data from multiple sources, today announced the availability of Splunk for FireEye, an application that makes information on inbound and outbound events from

Threat prevention provider FireEye, and Splunk, the recently gone public provider of software that helps organizations gather and make use of machine data from multiple sources, today announced the availability of Splunk for FireEye, an application that makes information on inbound and outbound events from FireEye appliances available within the Splunk console.

FireEye for SplunkUsing the new application, Splunk Enterprise is able to provide real-time continuous monitoring and trending of data being generated by FireEye’s appliances.

Splunk Logo

With the ability to generate real-time alerts, customers can visualize long-term trends that could help with the prioritization of incident response activities, as well as set and monitor key performance metrics, the company said.

“There is an incredible amount of security data generated by FireEye’s products that companies can use to improve their security posture,” said Bill Gaylord, senior vice president of business development at Splunk.

Splunk for FireEye provides reports for monitoring malware distribution and callbacks, infection types over time, and the number of infected systems. Included in the reports are dashboards that show the number of inbound infections by host IP over time and the number of callbacks over time by malware name.

Customers are able to look at a discovered piece of malware in a number of ways, including:

• Type of Malware: provides an overview of a specific piece of malware including its name, number of callbacks, source and destination, and port and protocol used.

• Transactions: provides a view of each of the callbacks as a transaction, identifying the source and destination, the severity, and the infection source port.

• C2 (callback information): includes HTTP (layer-7) information along with the URI, HTTP version, user agent (browser version), and the action (GET or POST).

Advertisement. Scroll to continue reading.

• Trends: provides an “over-time” graphical view of communication (ports and IPs) between the malware and its C2 destination.

• Correlation: passes the time of a particular malware activity to Splunk, which launches a search for other activities happening at that same time.

“With our next-generation threat protection, critical information gleaned from our appliance is crucial for security professionals to make informed decisions,” said Ashar Aziz, FireEye founder and CEO. “This application is a win for our joint customers by saving them time and increasing their visibility into their security operations.”

In related news, earlier this week Splunk announced a new reporting module for PCI compliance requirements to its real-time big data analysis tool. The Splunk App for PCI Compliance 2.0 provides basic reporting and data analysis capabilities that is sufficient to meet Payment Card Industry Data Security Standard (PCI DSS) requirements. In late August Splunk launched Splunk Storm, a cloud service based on its flagship Splunk software. 

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...