AI Buyer Insights:

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Michelin, an e2open customer evaluated Oracle Transportation Management

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Michelin, an e2open customer evaluated Oracle Transportation Management

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

List of Splunk Attack Analyzer Customers

Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Johnson Matthey Oil, Gas and Chemicals 11685 $16.7B United Kingdom Splunk Splunk Attack Analyzer Phishing Protection 2023 n/a
In 2023, Johnson Matthey deployed Splunk Attack Analyzer alongside Splunk Enterprise Security and Splunk SOAR to improve phishing detection and SOC efficiency. The deployment targeted Phishing Protection capabilities within the security operations center of this U.K. manufacturing and technology company, aligning detection, triage and automated response workflows. Johnson Matthey implemented Splunk Attack Analyzer for Phishing Protection to strengthen SOC incident handling and automated response orchestration. Splunk Attack Analyzer was configured to analyze phishing indicators and email telemetry, feeding correlated alerts into Splunk Enterprise Security for analytics and into Splunk SOAR for orchestration. Functional capabilities implemented included automated triage playbooks, indicator enrichment and alert correlation, with SOAR-driven playbooks executing remediation and automated case closure logic. The deployment centralized phishing detection workflows and instrumented machine-assisted decisioning for faster investigation. Operational coverage focused on the SOC and incident response teams in the United Kingdom, with processes restructured to route suspected phishing through SOAR playbooks for enrichment, triage and closure. The implementation increased phishing detection accuracy to approximately 80%, closed approximately 61% of phishing cases via automation, and a case study reports an 83% reduction in case management time, reflecting tightened governance around phishing case lifecycle and automated remediation.
Southern Farm Bureau Life Insurance Co Insurance 600 $1.7B United States Splunk Splunk Attack Analyzer Phishing Protection 2023 n/a
In 2023 Southern Farm Bureau Life Insurance Co deployed Splunk Attack Analyzer under the Phishing Protection category to analyze files uploaded to an external facing web portal, targeting a reduction in scan time and alert fatigue across its U.S. financial services operations. The implementation paired Splunk Attack Analyzer with Splunk SOAR to enable automated triage of submitted files and to accelerate security orchestration workflows. Splunk Attack Analyzer was configured to inspect file submissions from the portal and to surface prioritized alerts for the security team, using automated analysis and threat scoring to reduce manual review. The deployment emphasized end to end file processing workflows and alert consolidation to address the volume of externally submitted content. Integration scope included the external facing web portal and Splunk SOAR, establishing a pipeline from file intake through automated analysis and playbook driven response. Operational coverage was focused on Security Operations and portal intake processing within the companys U.S. financial services footprint, reducing the burden on analysts and improving case prioritization. Within six months the rollout produced a roughly 70% decrease in file scan time and near zero false positives, shortening end to end processing from about 20 minutes to about 5 minutes and materially reducing alert fatigue for the security team.
Splunk Professional Services 8000 $3.8B United States Splunk Splunk Attack Analyzer Phishing Protection 2024 n/a
In 2024, Splunk implemented Splunk Attack Analyzer as a Phishing Protection solution within its U.S. internal security operations center. The deployment was paired with Splunk SOAR to automate investigation of reported phishing emails and enable rapid triage and orchestration. Splunk Attack Analyzer was configured to automate evidence collection, indicator extraction, and threat scoring to accelerate analyst workflows, consistent with Phishing Protection functional patterns. Automation of investigation and triage was integrated with SOAR runbooks to orchestrate containment and response steps and to create analyst-facing cases. Integration scope explicitly included Splunk SOAR and the broader Splunk technology stack in the U.S. SOC, and operational coverage targeted security operations, incident response, and threat intelligence teams. The implementation supported automated handoffs between detection, enrichment, and remediation workflows to reduce manual case assembly. Governance shifted to SOAR driven playbooks that standardized triage, escalation, and evidence retention processes within the Phishing Protection architecture, and workflows were centralized to enforce consistent response sequencing. Process changes reduced manual analyst steps and embedded orchestration as the control plane for phishing investigations. The internal implementation reported approximately 90 percent faster phishing investigation and resolution and achieved a mean time to detect under seven minutes for critical use cases, outcomes observed by Splunk's SOC in the U.S. technology environment.
Showing 1 to 3 of 3 entries

Buyer Intent: Companies Evaluating Splunk Attack Analyzer

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating Splunk Attack Analyzer. Gain ongoing access to real-time prospects and uncover hidden opportunities.

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found
FAQ - APPS RUN THE WORLD Splunk Attack Analyzer Coverage

Splunk Attack Analyzer is a Phishing Protection solution from Splunk.

Companies worldwide use Splunk Attack Analyzer, from small firms to large enterprises across 21+ industries.

Organizations such as Johnson Matthey, Splunk and Southern Farm Bureau Life Insurance Co are recorded users of Splunk Attack Analyzer for Phishing Protection.

Companies using Splunk Attack Analyzer are most concentrated in Oil, Gas and Chemicals, Professional Services and Insurance, with adoption spanning over 21 industries.

Companies using Splunk Attack Analyzer are most concentrated in United Kingdom and United States, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of Splunk Attack Analyzer across Americas, EMEA, and APAC.

Companies using Splunk Attack Analyzer range from small businesses with 0-100 employees - 0%, to mid-sized firms with 101-1,000 employees - 33.33%, large organizations with 1,001-10,000 employees - 33.33%, and global enterprises with 10,000+ employees - 33.33%.

Customers of Splunk Attack Analyzer include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified Splunk Attack Analyzer customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Phishing Protection.