Splunk Named a Leader in Gartner SIEM Magic Quadrant for the Third Straight Year

The Splunk security portfolio, including Splunk® Enterprise and the Splunk App for Enterprise Security, solves Security Information and Event Management (SIEM) requirements to dramatically improve the detection, response and recovery from advanced threats by providing broad security intelligence from data that is collected across IT, the business, and the cloud. Based on the need to protect against advanced threats, a growing number of organizations are using Splunk security analytics to augment, replace and go beyond their legacy SIEM deployments.

gartner-2015-blog-img-470x246

This week, Gartner published the 2015 version of its annual Magic Quadrant for Security Information and Event Management. In the report, Splunk was named a leader for the third straight year.

The results of the 2015 Gartner SIEM Magic …

» Continue reading

Splunk wins “Big Data Innovation” at Computing’s Vendor Excellence Awards

ExcellenceIt is always nice to end a working week on a high and last Friday gave the Splunk EMEA team a great start to the weekend. We were nominated and won Computing’s Vendor Excellence Award for “Big Data Innovation”. The judges commented specifically on Splunk’s ability to democratize big data so that everyone can use it.

 

It was a nice way to spend a Friday afternoon and there was a lot of nervous anticipation over lunch as to who was going to win the various awards.

Awards22

The ceremony started with something I’d never seen before. The pre-award entertainment was 25 year old rapper comedian, Chris Turner (@ChrisPJTurner). Dressed in a very dapper suit he explained how he was going …

» Continue reading

Masters Of Machines 2015 Part 4: Meeting the increasing security threat head-on with Operational Intelligence

Matrix FightIn the fourth and final part of this blog series to accompany the “Masters of Machines II” research from Splunk and industry analyst Quocirca, we discuss the rising security threats faced by organisations today and how Operational Intelligence has a key part to play in defending yourself.

 

 

 

 

If you want to catch up with previous posts:

Part 1 – Discusses the high level findings from the research

Part 2 – The increase in IT complexity and managing it with OI

Part 3 – How to improve customer experience by harnessing machine data

 

The fastest growing IT management concern from 2013 to 2015 was increased security threats through the compromise of IT systems.

Report-Fig-09

The …

» Continue reading

Building Splunk Solutions

Building Splunk Solutions coverSplunk is delighted to announce the publication of the new developer guide: Building Splunk Solutions.

This authoritative guidance is built by developers for developers.
Splunk Enterprise is a highly-efficient platform for searching, analyzing, and monitoring all of your machine data from any source. While being very powerful out of the box, there is a lot of additional value that Splunk can offer through the apps and solutions that extend and enrich the capabilities of the Splunk core.

This guide follows a Splunk software engineering team on a journey to build a solution, focusing on the real world partner use cases showcasing various capabilities of the Splunk Developer Platform. Like a documentary, it captures our story from envisioning and user …

» Continue reading

Splunk Acquires Caspida: The Future in Advanced Breach Detection is Here

logo-dark

Today, we welcome Caspida to the Splunk family. This acquisition enables Splunk to bring critical analytical capabilities to our customers and extends Splunk’s security analytics leadership. Caspida adds data science-driven Behavioral Analytics to the industry’s most powerful analytics-enabled SIEM solution.

In the last year, I have had several conversations with peers and customers about attack patterns and enterprise compromises. We see three big categories of attackers:

  • Advanced or nation state attackers: they compromise, persist, and run campaigns – not just one off opportunistic attacks.
  • Insiders: trusted parties that abuse their privileges.
  • Fraudsters or cyber criminals: stealing money, credit cards, estore wallets, and conduct fraudulent transactions like wire transfers, and reimbursement or benefits fraud.

All recent high-profile …

» Continue reading

Introducing the Splunk App for Stream 6.3 Release!

We just improved our popular and free Splunk App for Stream! In the new Splunk App for Stream 6.3 release we’ve introduced Distributed Forwarder Management (DFM), a functionality that simplifies configuration while increasing administration flexibility. The new 6.3 release is available now on Splunkbase.

As a flexible software solution, you can deploy the Splunk App for Stream anywhere in the network—on-prem or cloud environments. Your implementation can be simple—collecting data from only a handful of SPAN ports, or very complex—with hundreds of different globally distributed Stream forwarders gathering data from endpoints. If your monitoring needs are more complex, you can target and customize how and where to deploy Stream to collect wire data to meet those needs more precisely.…

» Continue reading

Master of Machines 2015 Part 1: Operational Intelligence helps conquer complexity

Quocirca_Fastest_Growing

We’ve been very busy the last few months working on a piece of research with industry analyst Quocirca and I’m very pleased to announce 2015’s Masters of Machines report and a new Operational Intelligence benchmarking tool. We conducted this research last year and it gave the market some great insight into the value machine data can deliver and the maturity of Operational Intelligence in Europe, so we’ve repeated it for 2015 and the findings are fascinating. The research analysed around 400 senior business and IT decision makers from the UK, Germany, France, Sweden and the Netherlands to look again at the maturity of Operational Intelligence. The key findings from the research are that the fastest growing concerns for IT …

» Continue reading

Independence Day and the Cloud

SelfServiceOrdering[1]As I’m standing in line waiting to pick up my lunch from Speciality’s Café and Bakery – the one I’ve ordered and customized exactly to my liking using the tablets stationed at the entrance – I’m reminded about how far we’ve come as a self-service society. I love that fact that I can take control over my buying experience, from the toppings on my sandwich, to the movies I watch when and where, to the pre-check security line and check-in kiosks at the airport.

We’ve become very independent as buyers. I watch the other customers easily and quickly ordering their lunches as I wait to pay for mine, and I think about the three main drivers I believe are at …

» Continue reading

A Bank, the Cloud, and Real-time Data Insight

OrrstownWhat really inspires me about this business is being entrenched in the ingenuity and innovation – witnessing the amazing human propensity to create a better, safer world with technology. Take cyber security for example. For years, security software companies have been focused on developing preventative measures to defend businesses and consumers from online threats. It didn’t take long, however, for the bad guys to find ways around these defenses and into the network – making organizations question whether it was simply a matter of when (no longer if) they would be breached. But, as always, there was a solution: the concept of integrating more sophisticated upfront detection.

Today, organizations recognize that the best cybersecurity boils down to a combination of …

» Continue reading

All aboard with Infrastructure 4.0 — Splunk wins Deutsche Bahn Internet of Things Hackathon

Deutsche Bahn (DB) describes itself as the second largest transport company in the world and is the largest railway and infrastructure operator in Europe. With the popularity of Industry 4.0 and IoT in Germany, DB recently ran a “Deutsche Bahn goes 4.0” Hackathon over the weekend of May 8-9 2015. The concept was “We provide the data, you innovate with it”. Splunk participated with a crack team of two people, a copy of Splunk Enterprise running on a laptop and got their hands dirty digging into a labyrinth of infrastructure data. The challenge was tough: starting at 5pm we had 24 hours straight to analyze the data and demonstrate the value from it. After the final presentation of …

» Continue reading