Splunk As A Siem
Splunk As A Siem
Adopting Splunk’s
Analytics-Driven Security
Platform as Your SIEM
The activities of these advanced threats are often only Automated Anomaly and Outlier
in the “non-security” data, such as operating system
Detection
logs, directory systems, such as LDAP/AD, badge data,
DNS, and email and web servers. To detect advanced threats, all non-security and
security data must reside in a single repository. This
Machine data often needs to be supplemented with
represents a massive amount of data and will provide
internal and external threat context, such as threat
a repository to baseline normal user and traffic activity.
intelligence feeds and other contextual information to
Using this baseline, analytics can detect the anomalies
aid during incident response and breach detection.
and outliers that may be advanced threats. Statistics
Keeping Pace With the Volume can help with this detection by looking for events that
are standard deviations of the norm. Correlations can
and Scale of Data also help by detecting combinations of events that are
The amount and types of data needed for making the rarely seen and are suspicious.
most effective data-driven security decisions requires
a solution that will scale to index hundreds of terabytes
of data per day without normalization at collection
time and applies a schema to this data only at search
(query) time.
Single platform One product to install and manage, which simplifies operations
Index any data using variety of Fast time-to-value. Customers should realize value from their SIEM in
mechanisms hours or days
Large number of pre-defined data A rich partner ecosystem reduces reliance on SIEM vendor and custom
sources collectors
All values and fields from all data sources can be searched, reported
Flat file data store providing access to on, and correlated as predefined alerts or for ad hoc investigation.
all data values and data fields with no All the original data is retained and can be searched, as compared to
schema or normalization legacy SIEMs that requires transforming different log formats into single
“taxonomy” to facilitate.
Operate on-premises, in the cloud Operate a single logical solution that allows users to search, report and
and in hybrid environments operate when data is stored in either on-premises or the cloud
Hybrid deployment with on-premises Optimize your business needs using SaaS or on-premises deployments—
and cloud options without sacrificing visibility
Ad hoc searching over extended Identify breaches and conduct detailed breach analysis by drilling down
periods of time into machine data to get deep, precise insight
The flexibility and architecture of the platform plays event context, so they can gather information or take
a key role in determining if the SIEM can scale to meet action such as “block,” “unblock,” “open” or “close” to
the needs of an organization. It’s important that the remediate an incident.
SIEM software can scale and is able to quickly index Splunk offers several options for enterprises looking
all the original, raw data at massive volumes – from to deploy their first SIEM solution or to migrate
several hundreds of terabytes to petabytes of data from their legacy SIEM, and offers the choice of
indexed per day. on-premises, cloud or hybrid deployment options.
Scaling horizontally, using commodity hardware, Customers can solve their basic SIEM use cases using
provides the flexibility and compute scalability that Splunk Enterprise and Splunk Cloud, which are core
expensive physical appliances are unable to meet. Splunk platforms, providing collection, indexing, search,
The use of distributed index and search technology and reporting capabilities. Many Splunk security
with fast searches, reporting and analytics enables customers use Splunk Enterprise or Splunk Cloud
the quick transformation of results into a wide range to build their own real-time correlation searches
of interactive reports and visualizations. and dashboards for a basic SIEM experience.
Splunk offers a premium solution, Splunk ES, which
Splunk as Your SIEM supports advanced SIEM use cases with ready-to-use
The Splunk security platform meets the criteria for dashboards, correlated searches and reports. Splunk
a modern SIEM solution but it also delivers security ES runs on Splunk Enterprise, Splunk Cloud or both. In
analytics capabilities, providing the valuable context addition to pre-built correlation rules and alerts.
and visual insights that help security teams to make
Splunk ES also improves visibility and responsiveness
faster and smarter security decisions.
for security analysts with focused threat detection to
better accelerate incident investigation. It also reduces
risk by enabling faster detection and incident response
to newly discovered and ongoing threats. And Splunk
ES also includes a feature called the Investigation
Workbench that helps analysts better understand the
full scope of incidents and make real-time decisions
to get ahead of threats.
For security teams of all sizes and maturity levels, the
Splunk Use Case Library makes it possible for security
analysts to proactively stay current with the changing
threat landscape by leveraging additional knowledge
from the Splunk Security Research team. Within Use
Adaptive Response actions provide provides the Case Library, subscribers get regular updates to help
ability to register and configure response actions, security practitioners of all skill levels stay current with
enabling customers and partners to use their existing the latest cyberthreat trends and defense tactics in
capabilities with Splunk Enterprise Security (ES) as an order to quickly address those threats.
analytics-driven SIEM solution. The visibility into the Additionally, there are over 800 other security-related
capabilities and actions of each Adaptive Response apps on Splunkbase with pre-built searches, reports
entity helps customers view the list of actions available, and visualizations for specific third-party security
select appropriate actions, and deploy and manage the vendors. These ready-to-use apps and add-ons provide
entities and their actions in ways best suited to their capabilities ranging from monitoring security, next
environment, deployment and security operations. generation firewall, advanced threat management
Analysts can take suggested response actions to and more. These increase the security coverage and
quickly gather more context or take action when are provided by Splunk, Splunk partners and other
reviewing notables in the Incident Review dashboard. third-party providers.
Analysts can also execute any action from a notable
Adopting Splunk’s Analytics-Driven Security Platform as Your SIEM 4
WHITE PAPER
Download Splunk for free or explore the Splunk Enterprise Security online sandbox. Whether cloud, on-premises, or for large or
small teams, Splunk has a deployment model that will fit your needs. Learn more.
Splunk, Splunk>, Data-to-Everything, D2E and Turn Data Into Doing are trademarks and registered trademarks of Splunk Inc. in the United States and
other countries. All other brand names, product names or trademarks belong to their respective owners. © 2020 Splunk Inc. All rights reserved. 2020-SEC-Adopting Splunks Analytics-Driven SIEM-110-WP