COLLECTION

Detection and Response

Collect data across multiple security layers and manage threats quickly. Provide comprehensive protection for your organization.

Endpoint

Pull in endpoint detections to jump start your detection and response workflows.

ServiceNow Security Operations Addon app icon
ServiceNow Security Operations Addon
By ServiceNow SecOps Applications
The ServiceNow Security Operations add-on allows Splunk to create security related incidents and events in ServiceNow. It features: On demand single ServiceNow event or incident creation from Splunk Event Scheduled Alert to create single and multiple ServiceNow events and incidents
platform
Splunk Enterprise
rating
(9)
ServiceNow Security Operations Addon support icon
developer supported addon
Cybereason For Splunk app icon
Cybereason For Splunk
By Cybereason
The Cybereason App for Splunk enables you to gain deep insight & visibility into your endpoints, detect advanced attacks based on AI hunting, and take response actions within Splunk. The Cybereason AI Hunting Engine automatically asks a complex set of questions of data collected from all of your endpoints at a rate of 8 million calculations per second, 24 hours a day, 7 days a week. This means the solution is continuously hunting on your behalf by asking the same sorts of questions advanced security analysts would ask as they hunt for threats inside an environment. The difference, however, is that the Cybereason malicious activity models run constantly, and continually adapt and evolve according to the data the solution receives and analyzes.
platform
Splunk Enterprise, Splunk Cloud
rating
(5)
Cybereason For Splunk support icon
developer supported app
CrowdStrike App app icon
CrowdStrike App
By CrowdStrike
The CrowdStrike App leverages Splunk's ability to provide rich visualizations and drill-downs to enable customers to visualize the data that the CrowdStrike OAuth2 based Technical Add-Ons provide. Details about detections, detection events, incidents, policy and group creations/modifications/deletions and Intelligence Indicator information (for intel customers)
platform
Splunk Enterprise, Splunk Cloud
rating
(3)
CrowdStrike App support icon
developer supported app
CarbonBlack app icon
CarbonBlack
By Anas Faruqui
The Splunk App for CarbonBlack and Bit9 Security Platform enables users to take advantage of the powerful visualization and analysis capabilities within Splunk to enhance actionable intelligence faster during investigations and audits
platform
Splunk Enterprise
rating
(0)
archived app
Network

Track lateral movement or monitor agentless endpoints, like internet of things or operational technology devices.

Palo Alto Networks App for Splunk app icon
Palo Alto Networks App for Splunk
By Palo Alto Networks
The Palo Alto Networks Add-on for Splunk has been deprecated and will soon be archived. View Details page for more information.
platform
Splunk Enterprise
rating
(55)
archived app
Darktrace App for Splunk app icon
Darktrace App for Splunk
By Darktrace PLC
Darktrace is a global leader in cyber security artificial intelligence, delivers complete AI-powered solutions in its mission to free the world of cyber disruption. Its technology continuously learns and updates its knowledge of 'you' for an organization and applies that understanding to achieve an optimal state of cyber security. Breakthrough innovations from its R&D Centers have resulted in over 145 patent applications filed. Darktrace employs over 2,200 people around the world and protects c.8,800 organizations globally from advanced cyber-threats.
platform
Splunk Enterprise, Splunk Cloud
rating
(8)
Darktrace App for Splunk support icon
developer supported app
Cisco StealthWatch Add-On app icon
Cisco StealthWatch Add-On
By Nadhem AlFardan
If you have Cisco StealthWatch and Splunk, then a CIM-compatible add-on would be required to properly parse the data. The Intrusion_Detection data model is used.
platform
Splunk Enterprise
rating
(3)
archived addon
ExtraHop Add-On for Splunk app icon
ExtraHop Add-On for Splunk
By ExtraHop Networks
The ExtraHop Add-On for Splunk enables you to export ExtraHop Reveal(x) network detection and response metrics and detections as Splunk events. You can export metrics about any devices, device groups, applications, and networks from from Reveal(x).
platform
Splunk Enterprise, Splunk Cloud
rating
(5)
ExtraHop Add-On for Splunk support icon
developer supported addon
Server/Cloud Workload Monitoring

Keep an eye on containers and serverless functions in your cloud infrastructure.

Splunk App for AWS app icon
Splunk App for AWS
By Splunk LLC
To provide the best experience for Splunk users who want to monitor their infrastructure, Splunk is refocusing engineering efforts on our IT Essentials Work and IT Service Intelligence (ITSI) offerings. As a result, on April 30, 2021, we announced plans to stop selling the Splunk App for AWS . We also announced an End of Life plan for Splunk App for AWS at that time. To provide complete functional equivalence and to make sure that our IT Essentials Work and ITSI users have enough time to plan a migration to the new Splunk App for Content Packs, including the Content Pack for Amazon Web Services Dashboards and Reports, we have decided to extend the End of Life date for Splunk App for AWS to 15th July 2022. You should use the Content Pack for Amazon Web Services Dashboards and Reports for IT monitoring use cases. If you use the Splunk App for AWS for security dashboards, please plan for migrating to the Splunk App for AWS Security Dashboards (https://splunkbase.splunk.com/app/6311/). Read this article for more information: https://community.splunk.com/t5/Product-News-Announcements/Splunk-App-for-AWS-Extending-the-End-of-Life-EOL-and-End-of/ba-p/574671
platform
Splunk Enterprise
rating
(42)
archived app
Splunk Add-on for Google Cloud Platform app icon
Splunk Add-on for Google Cloud Platform
By Splunk LLC
The Splunk Add-on for Google Cloud Platform allows a Splunk software administrator to collect google cloud platform events, logs, performance metrics and billing data using Google Cloud Platform API. After the Splunk platform indexes the events, you can analyze the data using the prebuilt panels included with the add-on. You can then directly analyze the data or use it as a contextual data feed to correlate with other Google Cloud-related data in the Splunk platform.
platform
Splunk Enterprise, Splunk Cloud
rating
(10)
Splunk Add-on for Google Cloud Platform support icon
splunk supported addon
Microsoft Azure App for Splunk app icon
Microsoft Azure App for Splunk
By Splunk Works
The Microsoft Azure App for Splunk contains dashboards for data collected from:
platform
Splunk Enterprise, Splunk Cloud
rating
(5)
Microsoft Azure App for Splunk support icon
not supported
AWS EC2 app icon
AWS EC2
By Splunk LLC
This app integrates with AWS Elastic Compute Cloud (EC2) to perform virtualization actions
platform
SOAR On-Prem, SOAR Cloud
rating
(0)
AWS EC2 support icon
splunk supported connector
Identity

Link attacks to users and proactively block attacks from potentially compromised accounts.

PingFederate App for Splunk app icon
PingFederate App for Splunk
By Ping Identity
Developed by Ping Identity, the PingFederate App for Splunk gathers and presents transaction metrics from PingFederate via a series of customized reports and graphical illustrations. The application enables identity and access management (IAM) administrators, architects, and security managers to easily obtain custom reporting for all PingFederate log data, view each authentication event per app and authentication source, and analyze that event data over time. The customized reports display key events across account management, Identity Provider, Service Provider and OAuth Authorization Server transactions.
platform
Splunk Enterprise
rating
(7)
PingFederate App for Splunk support icon
developer supported app
Splunk Supporting Add-on for Active Directory app icon
Splunk Supporting Add-on for Active Directory
By Splunk LLC
This app (also known as SA-ldapsearch) provides support functions to the Content Pack for Windows Dashboards and Reports (https://docs.splunk.com/Documentation/CPWindowsDash/latest/CP/About), Content Pack for Microsoft Exchange (https://docs.splunk.com/Documentation/CPExchange/latest/CP/About) that enable you to extract information from an Active Directory database. For instance, you can search Active Directory for records, presenting the records as events, or augment existing events with information from Active Directory based on information within the events.
platform
Splunk Enterprise
rating
(45)
Splunk Supporting Add-on for Active Directory support icon
splunk supported addon
Okta Identity Cloud Add-on for Splunk app icon
Okta Identity Cloud Add-on for Splunk
By Okta Inc
Using Okta Identity Cloud REST APIs the Okta Identity Cloud Add-on for splunk allows a Splunk® administrator to collect data from the Okta Identity Cloud. The Add-on collects data related to: • Event log information • User information • Group and Group Membership Information • Application and Application Assignment information
platform
Splunk Enterprise
rating
(14)
archived addon
AWS IAM app icon
AWS IAM
By Splunk LLC
This app integrates with Amazon Web Services Identity Access Management (AWS IAM) to support various containment, corrective and investigate actions
platform
SOAR On-Prem, SOAR Cloud
rating
(0)
AWS IAM support icon
splunk supported connector