{"id":5445,"date":"2022-01-14T01:58:44","date_gmt":"2022-01-13T17:58:44","guid":{"rendered":"https:\/\/cybersecthreat.com\/?post_type=product&#038;p=5445"},"modified":"2024-04-21T01:26:02","modified_gmt":"2024-04-20T17:26:02","slug":"splunk-enhancement-add-on-pack","status":"publish","type":"product","link":"https:\/\/cybersecthreat.com\/zh\/product\/splunk-enhancement-add-on-pack\/","title":{"rendered":"Splunk \u589e\u5f37\u9644\u52a0\u5305"},"content":{"rendered":"<p>This Splunk enhancement add-on pack provides additional normalization and CIM mapping to the original apps. Those enhancements are based on best practices and therefore can enhance Splunk detection ratio and more effective investigation for SOC team.<\/p>\n<p><a href=\"https:\/\/apps.splunk.com\/app\/1845\/\">FireEye App for Splunk Enterprise v3<\/a> (FireEye_v3)<br \/>\nmobileiron_core<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/3434\/\">Add-on for Access Combined<\/a> (Splunk_TA_access_combined)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/3186\/\">Splunk Add-on for Apache Web Server<\/a> ( Splunk_TA_apache)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/1876\/\">Splunk Add-on for Amazon Web Services<\/a> (Splunk_TA_aws)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/3719\/\">Splunk Add-on for Amazon Kinesis Firehose<\/a> (Splunk_TA_aws-kinesis-firehose)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/3197\/\">Splunk Add-on for Check Point OPSEC LEA<\/a> (Splunk_TA_checkpoint-opseclea)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/1761\/\">Splunk Add-on for Cisco ESA<\/a> (Splunk_TA_cisco-esa)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/2770\/\">Splunk Add-on for Citrix NetScaler<\/a> (Splunk_TA_citrix-netscaler)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/2891\/\">Splunk Add-on for CyberArk<\/a> (Splunk_TA_cyberark)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/2846\/\">Fortinet FortiGate Add-On for Splunk<\/a> (Splunk_TA_fortinet_fortigate)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/2847\/\">Splunk Add-on for Juniper<\/a> (Splunk_TA_juniper)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/3110\/\">Splunk Add-on for Microsoft Cloud Services<\/a> (Splunk_TA_microsoft-cloudservices)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/833\/\">Splunk Add-on for Unix and Linux<\/a> (Splunk_TA_nix)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/4055\/\">Splunk Add-on for Microsoft Office 365<\/a> (splunk_ta_o365)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/1910\/\">Splunk Add-on for Oracle Database<\/a> (Splunk_TA_oracle)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/4055\/\">Splunk Add-on for Microsoft Office 365<\/a> (splunk_ta_o365)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/2966\/\">Splunk Add-on for Forcepoint Web Security<\/a> (Splunk_TA_websense-cg)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/2955\/\">Splunk Add-on for Websense DLP<\/a> (Splunk_TA_websense-dlp)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/742\/\">Splunk Add-on for Microsoft Windows<\/a> (Splunk_TA_windows)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/4310\/\">Akamai SIEM Integration<\/a> (TA-Akamai_SIEM)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/4714\/\">AWS Web Application Firewall Add-on<\/a> (TA-aws_waf)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/4293\/\">Check Point App for Splunk<\/a> (TA-check-point-app-for-splunk)<br \/>\nTA-cisco-esa-extras-master<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/3662\/\">Cisco Secure eStreamer Client (f.k.a Firepower eNcore) Add-On for Splunk<\/a> (TA-eStreamer)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/4564\/\">Microsoft Graph Security API Add-On for Splunk<\/a> (TA-microsoft-graph-security-add-on-for-splunk)<br \/>\n<a href=\"https:\/\/splunkbase.splunk.com\/app\/3757\/\">Microsoft Azure Add on for Splunk<\/a> (TA-MS-AAD)<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>1-year support is included.<\/li>\n<li>Full documentation is included.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>This Splunk enhancement add-on pack provides additional normalization and CIM mapping to the original apps. Those enhancements are based on best practices and therefore can enhance Splunk detection ratio and more effective investigation for SOC team.<\/p>","protected":false},"featured_media":11841,"template":"","meta":{"om_disable_all_campaigns":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_kad_post_transparent":"default","_kad_post_title":"","_kad_post_layout":"default","_kad_post_sidebar_id":"","_kad_post_content_style":"default","_kad_post_vertical_padding":"default","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":""},"product_brand":[],"product_cat":[209,222],"product_tag":[214,216,217,223],"class_list":{"0":"post-5445","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-cybersecthreat","7":"product_cat-splunk","8":"product_tag-cybersecurity","9":"product_tag-siem","10":"product_tag-soc","11":"product_tag-splunk","13":"first","14":"instock","15":"sale","16":"downloadable","17":"virtual","18":"taxable","19":"purchasable","20":"product-type-simple","21":"entry","22":"content-bg","23":"loop-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Splunk enhancement add-on pack - CyberSecThreat<\/title>\n<meta name=\"description\" content=\"This Splunk enhancement add-on pack provides additional normalization and CIM mapping to the original apps. Those enhancements are based on best practices and therefore can enhance Splunk detection ratio and more effective investigation for SOC team.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersecthreat.com\/zh\/\u7522\u54c1\/splunk-enhancement-add-on-pack\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Splunk enhancement add-on pack\" \/>\n<meta property=\"og:description\" content=\"This Splunk enhancement add-on pack provides additional normalization and CIM mapping to the original apps. Those enhancements are based on best practices and therefore can enhance Splunk detection ratio and more effective investigation for SOC team.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersecthreat.com\/zh\/\u7522\u54c1\/splunk-enhancement-add-on-pack\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSecThreat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybersecthreat\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-20T17:26:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_logo-for-website-328x328-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"328\" \/>\n\t<meta property=\"og:image:height\" content=\"328\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:label1\" content=\"Price\" \/>\n\t<meta name=\"twitter:data1\" content=\"&#078;&#084;&#036;50,000.00\" \/>\n\t<meta name=\"twitter:label2\" content=\"Availability\" \/>\n\t<meta name=\"twitter:data2\" content=\"In stock\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/\",\"name\":\"Splunk enhancement add-on pack - CyberSecThreat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_logo-for-website-328x328-min.png\",\"datePublished\":\"2022-01-13T17:58:44+00:00\",\"dateModified\":\"2024-04-20T17:26:02+00:00\",\"description\":\"This Splunk enhancement add-on pack provides additional normalization and CIM mapping to the original apps. Those enhancements are based on best practices and therefore can enhance Splunk detection ratio and more effective investigation for SOC team.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_logo-for-website-328x328-min.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_logo-for-website-328x328-min.png\",\"width\":328,\"height\":328,\"caption\":\"CyberSecThreat website logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"SHOP\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/shop\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/product-category\\\/products\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CyberSecThreat\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/product-category\\\/products\\\/cybersecthreat\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Splunk\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/product-category\\\/products\\\/cybersecthreat\\\/splunk\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Splunk enhancement add-on pack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"name\":\"CyberSecThreat\",\"description\":\"CyberSecurity Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybersecthreat.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\",\"name\":\"CyberSecThreat Corporation Limited.\",\"alternateName\":\"CyberSecThreat\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cybersecthreat\",\"https:\\\/\\\/x.com\\\/cybersecthreat\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybersecthreat-corporation-limited\"],\"description\":\"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\\\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\\\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.\",\"legalName\":\"CyberSecThreat Corporation Limited.\",\"foundingDate\":\"2021-01-23\",\"address\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"25.0600452\",\"longitude\":\"121.4594381\"},\"telephone\":[\"(+886) 02 - 77527628\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"18:00\"}],\"email\":\"info@cybersecthreat.com\",\"areaServed\":\"Taiwan\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/#local-main-place-address\",\"streetAddress\":\"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)\",\"addressLocality\":\"New Taipei City\",\"postalCode\":\"242032\",\"addressRegion\":\"Taiwan\",\"addressCountry\":\"TW\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/splunk-enhancement-add-on-pack\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"width\":164,\"height\":164,\"caption\":\"CyberSecThreat Corporation Limited.\"}]}<\/script>\n<meta property=\"product:price:amount\" content=\"50000.00\" \/>\n<meta property=\"product:price:currency\" content=\"TWD\" \/>\n<meta property=\"og:availability\" content=\"instock\" \/>\n<meta property=\"product:availability\" content=\"instock\" \/>\n<meta property=\"product:condition\" content=\"new\" \/>\n<meta name=\"geo.placename\" content=\"New Taipei City\" \/>\n<meta name=\"geo.position\" content=\"25.0600452;121.4594381\" \/>\n<meta name=\"geo.region\" content=\"Taiwan\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Splunk enhancement add-on pack - CyberSecThreat","description":"This Splunk enhancement add-on pack provides additional normalization and CIM mapping to the original apps. Those enhancements are based on best practices and therefore can enhance Splunk detection ratio and more effective investigation for SOC team.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersecthreat.com\/zh\/\u7522\u54c1\/splunk-enhancement-add-on-pack\/","og_locale":"zh_TW","og_type":"article","og_title":"Splunk enhancement add-on pack","og_description":"This Splunk enhancement add-on pack provides additional normalization and CIM mapping to the original apps. Those enhancements are based on best practices and therefore can enhance Splunk detection ratio and more effective investigation for SOC team.","og_url":"https:\/\/cybersecthreat.com\/zh\/\u7522\u54c1\/splunk-enhancement-add-on-pack\/","og_site_name":"CyberSecThreat","article_publisher":"https:\/\/www.facebook.com\/cybersecthreat","article_modified_time":"2024-04-20T17:26:02+00:00","og_image":[{"width":328,"height":328,"url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_logo-for-website-328x328-min.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@cybersecthreat","twitter_misc":{"Price":"&#78;&#84;&#36;50,000.00","Availability":"In stock"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["WebPage","ItemPage"],"@id":"https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/","url":"https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/","name":"Splunk enhancement add-on pack - CyberSecThreat","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/#primaryimage"},"image":{"@id":"https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_logo-for-website-328x328-min.png","datePublished":"2022-01-13T17:58:44+00:00","dateModified":"2024-04-20T17:26:02+00:00","description":"This Splunk enhancement add-on pack provides additional normalization and CIM mapping to the original apps. Those enhancements are based on best practices and therefore can enhance Splunk detection ratio and more effective investigation for SOC team.","breadcrumb":{"@id":"https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/#primaryimage","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_logo-for-website-328x328-min.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_logo-for-website-328x328-min.png","width":328,"height":328,"caption":"CyberSecThreat website logo"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"SHOP","item":"https:\/\/cybersecthreat.com\/shop\/"},{"@type":"ListItem","position":2,"name":"Products","item":"https:\/\/cybersecthreat.com\/product-category\/products\/"},{"@type":"ListItem","position":3,"name":"CyberSecThreat","item":"https:\/\/cybersecthreat.com\/product-category\/products\/cybersecthreat\/"},{"@type":"ListItem","position":4,"name":"Splunk","item":"https:\/\/cybersecthreat.com\/product-category\/products\/cybersecthreat\/splunk\/"},{"@type":"ListItem","position":5,"name":"Splunk enhancement add-on pack"}]},{"@type":"WebSite","@id":"https:\/\/cybersecthreat.com\/#website","url":"https:\/\/cybersecthreat.com\/","name":"\u5947\u8cc7\u5b89","description":"\u7db2\u8def\u5b89\u5168\u65b9\u6848","publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersecthreat.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":["Organization","Place"],"@id":"https:\/\/cybersecthreat.com\/#organization","name":"\u5947\u8cc7\u8a0a\u4fdd\u5b89\u53ca\u7db2\u7d61\u6709\u9650\u516c\u53f8","alternateName":"CyberSecThreat","url":"https:\/\/cybersecthreat.com\/","logo":{"@id":"https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/#local-main-organization-logo"},"image":{"@id":"https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/cybersecthreat","https:\/\/x.com\/cybersecthreat","https:\/\/www.linkedin.com\/company\/cybersecthreat-corporation-limited"],"description":"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.","legalName":"CyberSecThreat Corporation Limited.","foundingDate":"2021-01-23","address":{"@id":"https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"25.0600452","longitude":"121.4594381"},"telephone":["(+886) 02 - 77527628"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"18:00"}],"email":"info@cybersecthreat.com","areaServed":"Taiwan"},{"@type":"PostalAddress","@id":"https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/#local-main-place-address","streetAddress":"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)","addressLocality":"New Taipei City","postalCode":"242032","addressRegion":"Taiwan","addressCountry":"TW"},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/product\/splunk-enhancement-add-on-pack\/#local-main-organization-logo","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","width":164,"height":164,"caption":"CyberSecThreat Corporation Limited."}]},"product_price_amount":"50000.00","product_price_currency":"TWD","og_availability":"instock","product_availability":"instock","product_condition":"new","geo.placename":"New Taipei City","geo.position":{"lat":"25.0600452","long":"121.4594381"},"geo.region":"Taiwan"},"taxonomy_info":{"product_cat":[{"value":209,"label":"CyberSecThreat"},{"value":222,"label":"Splunk"}],"product_tag":[{"value":214,"label":"CyberSecurity"},{"value":216,"label":"SIEM"},{"value":217,"label":"SOC"},{"value":223,"label":"Splunk"}]},"featured_image_src_large":["https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_logo-for-website-328x328-min.png",328,328,false],"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/product\/5445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media\/11841"}],"wp:attachment":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media?parent=5445"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/product_brand?post=5445"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/product_cat?post=5445"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/product_tag?post=5445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}