Prevoty, Inc., a leader in runtime application security monitoring and protection, today announced the availability of the Prevoty Application Monitoring and Protection (AMP) App for Splunk. Prevoty AMP gives enterprises visibility into attacks on their production applications and the ability for the applications to automatically protect themselves. Users of Splunk Enterprise can now search, analyze and visualize this new layer of application data with the context of all other security-relevant data to help detect, respond to and prevent attacks.

Prevoty AMP App for Splunk surfaces attack data from applications into a custom Splunk dashboard, so Splunk Enterprise customers can correlate, visualize and understand valuable security intelligence about which of their production applications are being targeted by hackers, including the “who, what, where and when” of the attacks. This security intelligence can then be used to selectively enable Prevoty AMP’s automatic application protection capabilities, reducing the cost of remediating vulnerabilities and providing valuable data for forensic and root cause analysis.

“Most enterprises today have zero visibility into their production applications from a security perspective,” said Julien Bellanger, co-founder and CEO of Prevoty. “The combination of Prevoty and Splunk means that enterprises can better identify specific application vulnerabilities that are being exploited.”

“Enterprises need to take a holistic view to security intelligence that encompasses more than just network events,” said Mackenzie Kosut, head of technical operations at Oscar Healthcare. “Prevoty’s ability to deliver real-time application security analytics to Splunk solutions allows dramatically improved insight into what attacks are actually hitting our applications in production.”

“The Prevoty AMP App for Splunk is an exciting addition for customers using Splunk security analytics,” said Haiyan Song, senior vice president of security markets of Splunk. “Prevoty AMP for Splunk delivers to customers yet another layer of context through additional application data, which can help organizations build a more complete picture of security intelligence across the enterprise and a stronger security posture.”