“Whilemore and more organizations are embracing the power of big data, many are ignoring the security threats that lurk within that information. Customers who use Splunk Enterprise to monitor and analyze machine data to gain insights into their operations in real-time can use the Splunk App for Enterprise Security to monitor, identify, investigate and respond to critical known and unknown security threats,” said Christina Noren, senior vice president of solutions for Splunk.
Splunk Enterprise provides visibility into a broad range of IT events, including those that are beyond the purview of traditional security solutions but are increasingly security-relevant. Splunk’s big-data engine enables security professionals to quickly understand unknown threats hidden as patterns in terabytes of normal user-credentialed activities, indicating the presence of advanced malware or a malicious insider. The Splunk App for Enterprise Security provides the out-of-the-box security content that, combined with the core Splunk engine, delivers a next-generation security solution that provides monitoring of known threats, support for forensic investigations, big data analytics to help identify advanced persistent threats, and dashboards for security posture and investigation workflows.
“Big data and securityanalytics have become joined at the hip as of late," said Andrew Hay, senior analyst for 451 Research's Enterprise Security Practice (ESP). “The ‘out-of-the-box’ security content of the new Splunk App for Enterprise Security, combined with the big data analytics capabilities of the Splunk platform, delivers users a SIEM-like experience for massive data sets.”
The new Splunk App for Enterprise Security 2.0 builds upon the innovation of previous product releases , and leverages the Splunk Enterprise software, adding many benefits for security teams and support for risk management:
Real-time Event Correlation: Searches and alerts drive continuous monitoring of critical assets using dashboards and communications to members of the security team Dashboards: Visualizations of security data support more than 100 security metrics and over 160 reports Drill-down and drill-across: In a single click, users can access raw data quickly for analysis and pivot across the raw data-types to follow an investigation wherever it leads Federated Identity Monitoring: Correlation of multiple user identities to identify and investigate user activities across the IT infrastructure Enhanced incident management: The ability to reprioritize, reassign and journal security events for quick resolution and incident response Operationalization of findings: Once a forensic investigation is complete, users can click the ‘save’ button to continuously monitor and alert for the same condition.
“The Splunk App for Enterprise Security, together with core Splunk and other community-supported apps available through SplunkBase, continue to provide a flexible solution of security metrics and dashboards that support views of our total enterprise risk,” said Dan Frye, associate vice president, Corporate Security CedarCrestone, Inc.
Splunk App for Enterprise Security 2.0 is available to current customers for immediate download. New users can contact Splunk sales at [email protected] More information about Splunk Enterprise Security Intelligence Solution can be found here.
About Splunk Inc.
Splunk' Inc. provides the engine for machine data™. Splunk software collects, indexes and harnesses the massive machine data continuously generated by the websites, applications, servers, networks andmobile devices that power business. Splunk software enables organizations tomonitor, search, analyze, visualize and act on massive streams of real-time and historical machine data. More than 3,300 enterprises, universities, government agencies and service providers in more than 75 countries use Splunk Enterprise to gain operational intelligence that deepens business understanding, improves service and uptime, reduces cost and mitigates cybersecurity risk. To learnmore, please visit www.splunk.com/company.