Threat Intelligence

4/24/2018
08:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Splunk Customers Accelerate Business Value through Artificial Intelligence

New Versions of Splunk Enterprise, Splunk Cloud, Splunk ITSI, Splunk UBA and the Splunk Machine Learning Toolkit Now Available.

SAN FRANCISCO – April 24, 2018 – Splunk Inc. (NASDAQ: SPLK), first in delivering “aha” moments from machine data, today announced new and expanded artificial intelligence (AI) capabilities across its product portfolio. With the power of AI, Splunk customers can boost their profitability, performance and security. Splunk also expanded integration capabilities with open source software and cloud-native technologies as part of its ongoing commitment to provide a true, open machine data platform for customers. To learn more and experience Splunk (R) Cloud and Splunk Enterprise to turn your machine data into answers, visit the Splunk website.

“Organizations frequently consume high amounts of staff time and resources to monitor, analyze and respond to IT operational alerts. Splunk’s new AI enhancements, including the ability to correlate metrics and activity data, enable customers to get answers from their machine data more efficiently,” said Tim Tully, chief technology officer, Splunk. “Our latest wave of innovation is intended to arm customers with the tools needed to translate AI into actual intelligence. While AI and machine learning often seem like unattainable and expensive pipe dreams, Splunk Cloud and Splunk Enterprise now make it easier and more affordable to prepare and analyze machine data in real time.”

Splunk Platform Accelerates Customers’ Digital Transformation through AI and an Expansive and Open Ecosystem

Splunk Cloud and Splunk Enterprise 7.1 deliver AI through machine learning to help customers monitor, search and alert on the critical information organizations need to accelerate business. These latest releases include an updated metrics engine to power customers’ ability to monitor and alert on numeric data points - from CPU speeds and available hard disk space in a complex IT environment, to temperature readings in IoT devices and sensors. The latest versions are also the only enterprise-class data analytics solutions that can ingest petabytes of data per day, as well as search, monitor and alert on that data in real-time. With these enhancements, users are better positioned to make sense of their machine data to predict future IT, security and business outcomes. 

Splunk Cloud offers customers maximum control and real-time access to their data. This Splunk Cloud release features Dynamic Data: Self-Storage, arming customers with the flexibility to move data from Splunk to their own Amazon S3 storage environment.

“At T-Mobile we’re all about putting customers first, and with Splunk Enterprise we can ensure our customers get the best experience possible when they’re activating a phone, making a call or paying a bill,” said Jonathan Silberlicht, Senior Director, Network Service Management, T-Mobile. “For example, with the new Splunk Connector for Apache Kafka, we are expanding our real-time analytics capabilities, in turn empowering our front line to make better informed decisions when serving customers.  We plan to continue to rely on Splunk Enterprise, Splunk ITSI, and Splunk Machine Learning to help us scale at Un-carrier speed.”

To expand its open technology ecosystem, Splunk introduced new data integrations with open source software initiatives and cloud-native technologies including:

●        Splunk Connect for Kafka integrates the Splunk Platform with Apache Kafka, a highly scalable and reliable method for handling real-time streaming data.

●        Splunk Connect for Kubernetes and Splunk Connect for Docker unify the Splunk Platform with the leading solutions for automating deployment, scaling, and management of containerized applications.

"Splunk Connect for Kafka will improve our investigation of web activity, performance, and security use cases," said John Swanson, Security Incident Response Manager at GitHub. "We're now able to ingest large, near-real-time data streams and are consuming terabytes of logs from our Kafka cluster into Splunk Enterprise every day."

Machine Learning Toolkit Adds Experiment Management Interface and New Algorithms for Pattern Prediction

Splunk is also announcing a new Experiment Management Interface for its Machine Learning Toolkit (MLTK). This interface makes it easier to view, control, evaluate and monitor the status of machine learning experiments. The latest MLTK also includes new algorithms for identifying patterns and determining the best predictors for training machine learning models.

“Hyatt uses machine learning in Splunk Enterprise to predict when and where we should act fast or plan differently to best serve our customers,” said Cesar Mendoza, Application Development Manager, Strategic Systems and Innovation, Hyatt. “We used the free Splunk Machine Learning Toolkit to benchmark typical Wi-Fi usage from customers across hotel sites, and used that baseline to spot low traffic. We immediately contacted our wireless service provider to correct connection issues before our customers had to call us. We’re using artificial intelligence through Splunk to more proactively serve our customers in this way every day.”

Splunk IT Service Intelligence Predicts Outages and Service Health and Splunk User Behavior Analytics Accelerates Threat Identification via Machine Learning

In the latest release of monitoring and analytics solution Splunk ITSI, customers can leverage AI to predict imminent outages and how their service health could be impacted by these outages before they occur, so the end-customer experience and revenue are not impacted. ITSI also applies machine learning to reduce event noise and automatically identify the events that are most business critical, so that customers can resolve those first. Similarly, the Splunk UBA updates include new machine learning models and enhancements to existing models for customers to identify and address time-sensitive security problems and insider threats more quickly.

Prescriptive Solutions Help Customers Solve Unique Challenges

New solutions focused on the Internet of Things and other use cases are helping Splunk customers solve defined challenges, fast. Splunk recently announced the limited availability release of Splunk Industrial Asset Intelligence, which helps manufacturers monitor and analyze industrial IoT data in real time.

Continuing this approach, the Splunk Essentials series are free, easy-to-install applications that show users exactly how to use Splunk Enterprise and Splunk Cloud to address specific mission critical use cases. Splunk Security Essentials covers use cases such as brute force detection, malware and General Data Protection Regulation (GDPR) compliance while Splunk Security Essentials for Fraud Detection covers use cases such as healthcare insurance billing and wire transfer fraud. Both applications as well as forthcoming Splunk Essentials covering Application Monitoring and Release Analytics are available for free at https://splunkbase.splunk.com/.

About Splunk Inc.

Splunk Inc. (NASDAQ: SPLK) turns machine data into answers. Organizations use market-leading Splunk solutions with machine learning to solve their toughest IT, Internet of Things and security challenges. Join millions of passionate users and discover your “aha” moment with Splunk today: http://www.splunk.com.

Social Media: Twitter | LinkedIn | YouTube | Facebook

Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2018 Splunk Inc. All rights reserved.

For more information, please contact:

Media Contact

Melanie Duzyj

Splunk Inc.

415.510.7808

[email protected]

 

Investor Contact

Ken Tinsley

Splunk Inc.

415.848.8476

[email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.