Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

8/19/2019
01:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Deloitte and Splunk Provide Automated Security Monitoring and Response Capabilities to Organizations Worldwide

Capability is designed to enable clients to more effectively detect, defend and respond to critical cyber threats

NEW YORK, Aug. 15, 2019 /PRNewswire/ -- Recognizing how valuable time is in responding to cyber threats, Deloitte's cyber practice and Splunk Inc. (NASDAQ: SPLK) today announced that together they are providing automated security monitoring and response capabilities to help drive greater consistency and higher fidelity into security workflows and outputs for organizations worldwide.

Deloitte's Fusion Managed Services offerings with Splunk® Phantom® help enable organizations to more quickly and consistently detect and respond to a rapidly evolving threat landscape.

"The strength of the Deloitte/Splunk alliance is a real benefit to clients in helping them achieve their security monitoring and response objectives in a highly efficient, cost-effective manner," said Kent Cinquegrana, managing director in Deloitte Risk & Financial Advisory's cyber practice at Deloitte & Touche LLP. "The combination of Deloitte's Fusion Managed Services and Splunk Phantom can enable a more rapid response to cyber adversaries and the challenges they present to organizations every day."

As the world becomes smaller and more connected, Deloitte's Fusion Managed Services provides the next-generation capabilities that can help clients address evolving cyber threats. Fusion Managed Services combine threat intelligence, threat monitoring, attack surface identification and reduction and incident response information to help organizations proactively detect and respond to unauthorized activity before it can adversely affect networks.  

Effectively operationalizing mission essential security technology is an important part of the success of any organization, and orchestration and automation are important components to that process. Splunk Phantom helps customers work smarter, respond faster and strengthen their defenses by combining security infrastructure orchestration, playbook automation and case management capabilities to integrate processes and tools together. Using the security orchestration, automation and response (SOAR) capabilities of Splunk Phantom, Deloitte's highly skilled cyber analyst teams are empowered to help clients repurpose valuable time to other mission-essential tasks.

"Our alliance with Deloitte Risk & Financial Advisory's cyber practice and Deloitte's Fusion Managed Services team helps customers build customized, vertical-based use cases and associated automated playbooks," said Aziz Benmalek, vice president, Worldwide Partners at Splunk. "These new offerings from Splunk and Deloitte can help customers establish a proactive cybersecurity practice that can enable organizations to reduce operating expenses and more efficiently address security issues to better allow organizations to focus on other priorities."

CEO of Deloitte Risk & Financial Advisory John Peirson added this about the importance of teaming to help clients solve for the business challenges and opportunities on the horizon, "Managing the future of cyber means collaborating to accelerate innovation and growth in strategic, creative, agile, and adaptive new ways. Deloitte Risk & Financial Advisory curates an expansive yet specialized ecosystem of alliance relationships with leading providers, like Splunk, to match the specific challenges and opportunities organizations worldwide are requiring to scale exponentially and tap into the potential of new technologies."

About Splunk Inc. 
Splunk Inc. (NASDAQ: SPLK) helps organizations ask questions, get answers, take actions and achieve business outcomes from their data. Organizations use market-leading Splunk solutions with machine learning to monitor, investigate and act on all forms of business, IT, security, and Internet of Things data. Join millions of passionate users and try Splunk for free today.

About Deloitte
Deloitte provides industry-leading audit, consulting, tax and advisory services to many of the world's most admired brands, including nearly 90% of the Fortune 500® and more than 5,000 private and middle market companies. Our people work across the industry sectors that drive and shape today's marketplace — delivering measurable and lasting results that help reinforce public trust in our capital markets, inspire clients to see challenges as opportunities to transform and thrive, and help lead the way toward a stronger economy and a healthy society. Deloitte is proud to be part of the largest global professional services network serving our clients in the markets that are most important to them. Our network of member firms in more than 150 countries and territories serves four out of five Fortune Global 500® companies. Learn how Deloitte's approximately 286,000 people make an impact that matters at www.deloitte.com.

Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2019 Splunk Inc. All rights reserved.

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
arron_755
50%
50%
arron_755,
User Rank: Apprentice
8/27/2019 | 7:48:50 AM
Splunk Cloud
Really it is ture. Splunk providing the latest technology for security point of view. Which secure your data with the hacker. For other information you can visit: https://aliadosolutions.com/
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16863
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
CVE-2019-18949
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
CVE-2011-1930
PUBLISHED: 2019-11-14
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
CVE-2011-1145
PUBLISHED: 2019-11-14
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
CVE-2011-1488
PUBLISHED: 2019-11-14
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...