Splunk Enterprise Security Primary Use Case

Sameep Agarwal. - PeerSpot reviewer
Group manager at HCM Technologies

We deploy Splunk for law enforcement agencies facing attacks from threat actors in China, Iran, and Pakistan. It helps plug the gaps because Splunk can easily identify malicious traffic.

In this instance, Splunk was only deployed for a specific department, not the entire ministry. However, this department has multiple cloud clusters for their operations, storage, and computing. Splunk is monitoring all of these clusters. It started as an on-premise solution, but then the department decided to go for cloud-based services that require a connector. Now, it's more of a hybrid solution.

View full review »
Avinash Gopu. - PeerSpot reviewer
Associate VP & Cyber Security Specialist at US Bank

Through Splunk Enterprise Security, we have implemented extensive login integration. This allows us to monitor and restrict access for sensitive accounts, such as superuser and master accounts when password rotations occur. If a login attempt is made for such an account, Splunk triggers a real-time workflow that automatically generates a P1 ticket for the Help Desk and IAM Operations teams to investigate and take necessary action.

Beyond real-time monitoring, we have established additional security measures. We utilize locks within JBOS to control manual account check-ins and user server activity, such as password verifications. Splunk ingests logs from any configured PAM solutions, enabling auditors and our technical team to readily access and analyze all privileged activities. We can also generate reports for session management, session logs, and audit logs.

View full review »
Viney Bhardwaj - PeerSpot reviewer
Sr Manager at Ernst & Young

We mainly use the Splunk Enterprise Security app to use Splunk as a SIEM. I have worked with Splunk on-premises, which is Splunk Enterprise, and I have worked with Splunk Cloud as well. 

We mostly use Splunk for the SOC environment. We use Splunk for security incident monitoring.

View full review »
Buyer's Guide
Splunk Enterprise Security
March 2024
Learn what your peers think about Splunk Enterprise Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,246 professionals have used our research since 2012.
Praveen-Kadali - PeerSpot reviewer
Senior Consultant at Ernst & Young

We provide services to our clients as a security operations center and we utilize Splunk Enterprise Security for enterprise security purposes, encompassing various use cases based on client requirements. These include network attacks, malware-related attacks, inbound traffic-related attacks, recurrent activities, web-related detections, internal detections related to root flows, and service account-related use cases.

We are working to secure the enterprise's networks, devices, and infrastructure, as well as enhance overall security. Our goal is to monitor and protect against all types of external cyber-attacks. We will diligently monitor the systems and address any issues at the earliest stage possible.

Splunk Enterprise Security can be deployed both on-premises and in the cloud. We have primarily deployed the solution on Splunk Cloud.

View full review »
MR
Manager, Security Engineering at a computer software company with 1,001-5,000 employees

I've been building SOCs for multinational banks across Asia and Australia, the Middle East, and right now in the United States.

It's the tool that we use to build SIEMs to meet logging requirements and to identify security issues across larger states of data sets.

View full review »
Sathish Suluguri - PeerSpot reviewer
Splunk SOAR/Phantom at PricewaterhouseCoopers

There are many use cases. Most of the use cases are related to security, data integration, and data sources. 

View full review »
SAURABHYADAV4 - PeerSpot reviewer
Technical Specialist at HCL Technologies Limited

I work in security and use Splunk for endpoint and application security, use case development reports, etc. I haven't used Splunk much for threat intelligence. We have a threat intel feed configured, and we create use cases based on those and the recommendations by the threat intel team. If something isn't covered, we create a use case for it. For example, if an application has an authentication interface enabled, we check all their authentication mechanisms and all the login policies. 

View full review »
TB
Sr Cybersecurity Engineer at a energy/utilities company with 10,001+ employees

We essentially use Splunk for our Security Operations Center (SOC). All of the notables that we create for the SOC are done in Splunk Enterprise Security. It is our SIEM.

View full review »
SC
CSO at a manufacturing company with 1,001-5,000 employees

We use Splunk Enterprise Security as the main SIEM system for our operation center. We use it for monitoring detection, and alert management.

We implemented Splunk Enterprise Security to help detect attacks on our network.

View full review »
Maaz  Khalid - PeerSpot reviewer
Cyber Security Analyst at Rewterz

We typically suggest Splunk IT builds for customers with significant EPS requirements and large-scale data environments. While other solutions like Foundry and IBM QRadar may be popular, they often have limitations in handling big data effectively.

View full review »
RK
Splunk Enginer at UnitedHealth Group

We use Splunk daily to find the root cause of attacks and analyze users attempting to access our system. We create incidents and address 5 to 7 simultaneously. Once we analyze and record the activity, we can delete the incident. Our admin team will verify whether it originated externally or internally. 

We use Splunk to respond to security incidents and for data analytics. We conduct custom correlations for the customer and write reports on any attacks. We set alerts for user behavior to discover threats, like if someone is constantly attempting to access our internal domain. The admin will identify that threat and block it. 

View full review »
MANISH CHOUDHARY. - PeerSpot reviewer
SOC manager at a tech vendor with 10,001+ employees

We use Splunk Enterprise Security to analyze log data for log monitoring, creating use cases, onboarding, and incident response.

We wanted a single security tool that could immediately identify notable events that could be reported as security breaches, and then enable us to take intelligent action without having to purchase additional security tools.

We have two customers with hybrid cloud solutions. Neither customer is fully cloud-based. Our implementation is based on the customer's requirements, such as compliance, data ownership, and administration. We plan the implementation of Splunk cloud or hybrid models based on these requirements. We discuss the benefits and solutions with the customer to ensure that we are not breaching any compliance policies and that we are selecting the right model for their needs. Because we have multiple customers, we must also consider how to manage this process effectively.

View full review »
Jeremiah Anderson - PeerSpot reviewer
Sr. Cybersecurity Engineer Splunk Architect at Coalfire Federal

Being in an air-gapped environment, we pretty much look for insider threats and other notables related to improper configurations and against security best practices.

We are 100% on-prem and in an air-gapped environment, so there is no Internet connection.

View full review »
DS
Security Analytics innovation lead at a pharma/biotech company with 10,001+ employees

We primarily use Splunk Enterprise Security for security incidents and event management. The solution is deployed in one department, but it covers multiple locations worldwide. 

View full review »
Niranjan N - PeerSpot reviewer
Sr Analyst at ATOS

We use Splunk for monitoring and investigation and recently integrated it with ServiceNow. It's a SOC tool, and any malicious activities on the client's side trigger an alert here. 

View full review »
LC
Security Engineer at a recreational facilities/services company with 10,001+ employees

We are using Splunk in the standard information security use case. We're also using it for various application use cases around identity management, windows active directory, and those types of use cases.

View full review »
Balamurali Vellalath - PeerSpot reviewer
Practice Head-CyberSecurity at ALTEN calsoft Labs

Since we have an IT services company, we have been using Splunk for the deployment to the customer locations as well. Sometimes the customer will come back to us and say that we need to have a SIEM tool, and when we do the benchmarking, we'll do a couple of deployments on the Splunk side and at the customer's locations as well.

As an example use case, we deployed Splunk to a banking institution a few years ago. There the use case was basically this: the customer wanted to set up a security operation center, and they wanted to have a pretty large deployment in terms of the number of endpoints and number of switches and routers. There were many regional branch offices and they have data centers and therefore, many assets in terms of endpoints. They had 30% of their assets are running on the cloud and they needed a complete solution from an incident monitoring and management perspective. That's why we deployed Splunk. 

They wanted to reduce the MTTR, and meantime resolution, and maintain detection. They didn't want to add more SOC analysts into their SOC as the organization scaled up. They have a plan to scale from 5,000 endpoints into 15-20,000 endpoints. They're very particular about deploying the SOC operation center.

Splunk has since acquired Phantom as a SOAR platform. Therefore, we have tried to manage the security automation using Phantom with the help of Splunk deployments. It helps us meet the customer's requirements.

View full review »
JG
IT Director at Administrative Office U.S. Courts

We gather all the security logs from all the endpoints, network appliances, and the security filter. We have set up automatic alerts that are sent to system administrators, so we have pretty much real-time alerts about anything that happens. 

View full review »
YT
Regional Sales Manager at Redington (India) Ltd

The use cases are mainly around monitoring for our clients' security operation centers and correlation of events and analytics for incidents that have been identified.

View full review »
Sagar Shubham - PeerSpot reviewer
Senior Software Engineer at Wipro Limited

We use Splunk Enterprise Security for threat detection on our network devices.

View full review »
OO
Owner at Py Concepts

We use the solution for tracking successful and unsuccessful logins. We track privileged account activities and also a variety of other things, like developing use cases for data exfiltration or integration with ETRs and other security tools for data analysis. 

View full review »
KC
IS Engineer at a hospitality company with 10,001+ employees

Our SOC uses the solution to monitor our corporate and franchise environments.

View full review »
BC
IT Specialist at a government with 10,001+ employees

I am the branch chief. I use Splunk Enterprise Security depending on how swamped the team is. I use it for anything from basic searches to DDoS attacks, which is a big thing right now. So, DDoS attacks and phishing emails are a lot of what I am using it for.

View full review »
Sneha Golhar - PeerSpot reviewer
Senior Engineer at Wipro Limited

Splunk Enterprise Security provides us with both log monitoring and alerting capabilities from a centralized interface.

View full review »
Kiran Kumar. - PeerSpot reviewer
Lead Administrator at Wipro Limited

We provide comprehensive infrastructure support and ingest mine data in three ways. The first is Agent-based where the information is sent from client machines to an agent. The second is TCP port forwarding where data is sent to Splunk through an open port. The third is the HEC token. We then use the Splunk DB Connect app to ingest data as per the client's requirements.

View full review »
SK
Senior Engineering Manager at Happiest Minds Technologies

We have many use cases for firewall logs in our system. We collect logs from these firewalls and customize our use cases.

View full review »
ST
Information Security Analyst at Apcfss

We have integrated different tools to get files from various types of endpoints. We also have Check Point. There are a few Windows use cases for brute force and code block attacks, and we use Splunk to detect when a user is logging in from another country where we don't do business. Splunk is integrated with our AWS environment, so we ingest logs from Amazon CloudTrail, GuardDuty, and other solutions. 

View full review »
Hari Haran. - PeerSpot reviewer
Technical Associate at Positka

We use it to provide both operational and security dashboards based on our clients' equipment. We use it for infra monitoring and threat analysis.

We have multiple rules for analyzing malicious activities and detecting breaches. We get the notable events from the logs and from there we drill down into the cause. We correlate that with the framework and get a score. Based on that, we proceed to the investigation.

View full review »
PW
Director of Security Engineering and Operations at a legal firm with 1,001-5,000 employees

We use Splunk Enterprise Security as our primary security event manager. We collect data from various log sources into our Splunk SIEM to build context around what is happening in our environment. We then use the capabilities of Splunk Enterprise Security and other tools to enrich this data and help us manage the data, events, and detections.

View full review »
Vikas Dusa - PeerSpot reviewer
Cyber Security Trainer and Programmer at Freelancer

We use Splunk Enterprise Security to teach our students about security awareness in a more positive way. We can show them how these tools work and the benefits they bring. This will help them understand the importance of using Splunk Enterprise Security, not just for our clients, but for ourselves as well.

View full review »
Nagendra Nekkala. - PeerSpot reviewer
Senior Manager ICT & Innovations at Bangalore International Airport Limited

We use Splunk Enterprise Security to enhance our overall security posture by proactively managing our threat profile across the enterprise. This enables us to see valuable insights and effectively monitor all OEM devices.

View full review »
MA
System Administrator at Nournet communications

We use Splunk Enterprise Security to identify and resolve critical issues and errors within our environment.

View full review »
JB
Security Engineer at State of Nevada

We primarily use the solution for SOC purposes.

View full review »
HC
Insider Thread Consultant at a manufacturing company with 10,001+ employees

My use cases are very limited. I use the product mostly to detect internal threats like data exfiltration.

View full review »
SN
Senior Analyst at a computer software company with 11-50 employees

We implement Splunk Enterprise Security for our clients. It's a security tool that centralizes data in one location, so we can gain some insights from it. We can also use it to create alerts. For example, let's say we want to find an incident in real-time, but we can't sit in a single place and stare at the screen. We can create alerts that send us an email notification or automate a response. 

View full review »
Riaz Ahmmed - PeerSpot reviewer
Team Lead at ATSS

We use Splunk Enterprise Security for continuous monitoring, ensuring compliance, and advanced threat protection.

View full review »
Chetankumar Savalagimath - PeerSpot reviewer
Delivery Manager at a tech services company with 1,001-5,000 employees

The primary use case is security and data analytics. In general, we manage and maintain it for our customers.

View full review »
SaravanaKumar1 - PeerSpot reviewer
Principal Consulting - Cloud & Infrastructure Services at Fourth Dimension Technologies

Our technical teams are demoing various enterprise tools to develop experience and knowledge so we can better serve our clients. In addition to Splunk, we are evaluating IBM QRadar and one other solution. One of our customers is asking about the Splunk MSP model.

View full review »
Alex Adamovici - PeerSpot reviewer
Head of Knowledge Capture Cloud at Integritie

We primarily use the solution for monitoring, intrusion detection, and prevention. It is mostly a lot of security and network and server monitoring.

View full review »
Kutay KOCA - PeerSpot reviewer
Cyber Security Analyst at Clarusway

We use Splunk Enterprise Security to monitor our network environment for abnormal activities and threats.

View full review »
RV
CEO at a retailer with 51-200 employees

I use Splunk Enterprise Security for monitoring, threat hunting, and quick response. By implementing Splunk Enterprise Security I aimed to address security challenges and threats for both myself and my clients.

View full review »
PP
Senior Security Engineer at a tech services company with 201-500 employees

I utilize Splunk Enterprise Security to create alerts within various use cases, including data onboarding, gap analysis, and business testing. I ensure that the use cases adhere to the defined criteria and address any changes or requirements raised by the client. Additionally, I handle any necessary backend modifications in Splunk by deploying code to appropriate environments, including the production environment.

We implemented Splunk Enterprise Security to capture more effective alerts. We create alerts to utilize advanced filtering capabilities. Additionally, we employ Sentinel as our endpoint security application. I have created all instances of the query as intended and have mapped them to Splunk. However, the corresponding alert is not being generated. These are the areas that require attention.

My expertise lies in Splunk Cloud and Azure. While I have worked with AWS in the past for a short period, my current focus is on GCP and Splunk Cloud. My responsibilities involve troubleshooting, alert verification, and key generation. Based on specific requirements, I employ my self-generated queries to identify the relevant fields, such as email or location. Next, I implement lookup conditions and pinpoint the table containing the desired field type. This process allows me to determine the specific requirement of the use case and define the search parameters accordingly. Finally, I conduct a time-bound search to identify any defects.

I deploy to Splunk Cloud, GCP, and on-premises environments. I have experience working with both platforms. When working on the cloud, we don't have the same level of visibility as we do on-premises. For example, we cannot directly access the fraud department systems. In the cloud, we must make all changes and deployments through the Splunk UI. This is relatively straightforward, as there is no backend to manage. However, it requires a thorough understanding of the configuration files and the data fields we need to modify.

View full review »
Yash-Gupta - PeerSpot reviewer
Analyst, TSG Information Security Cyber Operations at a consultancy with 5,001-10,000 employees

We use the product mostly just to pull out the reports, medical investigations, et cetera. As a security analyst, we can look at and pull data. You can make a central hub for a lot of different sources, including servers and endpoints. It makes it easy to check logs for every device connected.

View full review »
AD
IT Manager at a aerospace/defense firm with 10,001+ employees

We use Splunk for log analytics, blocking dangerous files, etc. It helps to shape our security policies. Splunk is managed by our service provider, but we regularly get security insights from them.

View full review »
SoheylNorozi - PeerSpot reviewer
IT Consultant at a tech services company with 51-200 employees

Our customers utilize Splunk Enterprise Security for either their cybersecurity program or their data warehouse program.

View full review »
Kenny Corbett - PeerSpot reviewer
Associate Director of IT at Rigel Pharmaceuticals Inc

Splunk Enterprise Security provides more visibility into endpoints in our environment.

View full review »
SO
Manager at a consultancy with 1-10 employees

We use Splunk Enterprise Security for security correlation and event management.

Splunk Enterprise Security is deployed as a hybrid model where the core component is on the cloud and is integrated with an on-premises solution.

View full review »
VK
Security Analyst at a tech services company with 1-10 employees

I have worked in a couple of areas of Splunk. Initially, I was part of a monitoring team that used it for security information. I used to monitor security alerts which we used to get on Splunk, which was based on the use cases and we set up specific rules for it. Currently, I am part of the administration of Splunk. Now I onboard different log sources to Splunk. We pass over the logs so that it can be used for the security team.

View full review »
KI
Staff application Security Analyst at a media company with 5,001-10,000 employees

We use the product to analyze security anomalies and research specific threats that we get on our network.

View full review »
VA
Tech Director at a government with 10,001+ employees

Our primary use case is SOC operations. However, we do have a lot of people sprinkled around that deal specifically with data analytics.

View full review »
SH
Cyber Security Engineer at a university with 5,001-10,000 employees

Splunk Enterprise Security is a SIEM solution we use for security compliance and threat detection. 

View full review »
VN
Owner at a computer software company with 1-10 employees

The primary focus of our work with Splunk is on security incident monitoring and security log monitoring. This involves utilizing it to analyze and respond to security events effectively. Additionally, compliance with regulatory requirements is another crucial aspect of your role. We also extend Splunk's functionality to custom applications by writing custom parsers and handling logs specific to those applications. This includes the development of unique dashboards tailored to the needs of each application.

View full review »
DB
Project Manager at a construction company with 1,001-5,000 employees

I utilize Splunk Enterprise Security to gather logs, and subsequently, I provide the team with access to the servers through a change management ticket or incident. I wasn't involved in the installation process during my tenure as a Windows server lead. I also verify whether all our actions adhere to the compliance framework.

Our deployment of Splunk Enterprise Security was all on-premises.

View full review »
AZ
System Engineer at Tara

We are using the solution for security. We can use it to track what has happened in our network. We can check via dashboards and alerts. We can use it for load balancing and high-performance tasks. We use it to analyze data and logs. It normalizes logs and we can detect attacks, such as brute-force attacks. We can receive information from our firewall, our Fortigate. Since we receive a lot of traffic, we have to investigate events using the solution. It provides updates on attacks. The solution helps us report on what happens in our network.

View full review »
RB
Engineer at a government with 10,001+ employees

We use it for a lot of compliance work and incident reviews. We are also using it for remediation and tracking assets.

View full review »
JC
Cyber Security at a financial services firm with 5,001-10,000 employees

At a high level, its use cases are related to security monitoring, log aggregation, and a little bit of analysis related to incidents or fraud.

View full review »
OF
SOAR Developer at a media company with 10,001+ employees

We use it mostly to generate notables, and then we can use other tools, such as ticketing systems or other SOAR platforms, to investigate.

View full review »
MM
SOC Analyst at a tech services company with 10,001+ employees

Our primary use case is for cyber security, tracking logs, and incident response.

View full review »
TG
Sr. Cyber Security and Solutions Architect at a government with 10,001+ employees

It's the mainstay of our monitoring solutions that we have for auto-logging, et cetera, for our enterprise solution.

View full review »
CF
Lead Solutions Architect at a government with 10,001+ employees

Our primary use case is for security audit log collection correlation. We wanted something that the security team could focus on versus going directly into our enterprise. We had some initial use cases to supplement our IT ops security into one product. We had a SIEM but not one that was as customizable as Splunk Enterprise Security.

View full review »
reviewer1331706 - PeerSpot reviewer
I&T Design & Execution Reliability Engineering Leader at a financial services firm with 10,001+ employees

We use Splunk to monitor our private cloud, data center, and other applications.

View full review »
CD
project manager at ManTech International Corporation

We are using it for information assurance, system alerting, and compliance. We are using its latest version.

View full review »
Santhosh Kandadi - PeerSpot reviewer
Assistant Vice President at Synchrony

We primarily use the solution for monitoring our infrastructure.

View full review »
OS
Information Security Advisor, CISO & CIO, Docutek Services at Docutek Services

I work in the HIPAA industry. I work at a healthcare company in Puerto Rico. HIPAA requires us to go over security risks. Our use case right now is to be compliant.

In our hierarchy, we have 1000 servers and 16,000 endpoints. We also have 100 entry points and 3000 VPN connections. It's huge.

View full review »
RA
Security Operation Centre (SOC) Analyst at Nera Philippines Inc.

We use Splunk Enterprise Security for monitoring. We've been using it for monitoring our network. We've created some rules and use cases and we get alerts based on rules. 

View full review »
VJ
Splunk Developer at a tech vendor with 11-50 employees

Our primary use case is for security but we also use it as a soft tool. It gives us an advantage over traditional SOC or security tools. We get to use the existing data in Splunk to make use of the security. 

View full review »
AS
Senior Network Engineer at a government with 5,001-10,000 employees

I work for a government agency and we use Splunk to monitor our Cisco equipment. I'm a senior network engineer and we are customers of Splunk

View full review »
AG
Information Technology Specialist at a healthcare company with 10,001+ employees

I went to a cybersecurity boot camp through Penn University, and we went over this topic for a decent amount of time. It was more of a testing environment where they gave us different file formats that we had to go through. We would upload those files to Splunk, and it would give us good examples of what it would look like under different circumstances, such as when an organization is getting hacked, when there is a DDOS attack, and so on.

View full review »
AB
Risk Manager at Samapartners

As a software analyst, I utilize Splunk Enterprise Security for security purposes, including threat hunting on developed and customized applications for vulnerability management. I also use it to display dashboards, analyze data, and address alerts.

We implemented Splunk Enterprise Security to consolidate all our security data into a single platform. This has enhanced our visibility into our security posture and the potential threats we face.

View full review »
DL
Head of Cybersecurity at a computer software company with 51-200 employees

We mainly use the solution as a reseller. We give our users the latest version of the product. 

View full review »
NS
Security Engineer

I used Splunk ES when I worked for a retail company. I worked mainly in the security operations center. I have also worked in healthcare and federal spaces.

View full review »
RC
Security Compliance Program Manager at a educational organization with 5,001-10,000 employees

Splunk helps us to be proactive and it integrates with many devices. It offers visibility from many different levels, areas, zones, and devices rather than from a single system. We can use this intelligence to create correlations, system solutions, etc. Splunk reduces the risk factors and helps us in many ways beyond just collecting logs. Though Splunk is costly, it has many features like threat intelligence which is very useful. It helps us be proactive about reducing risks.

View full review »
Robert Cheruiyot - PeerSpot reviewer
IT Security Consultant at Microlan Kenya Limited

I have some experience with the solution, since I am working with customers who are interested in part time help monitoring their network and have been helping them fine-tune the rules in the solution's platform. The way the primary task works is to watch for and then respond to the threat. Should there be a need, I usually work with a team in fine-tuning the rules on this platform. We are providing the products.

I recently started working primarily on the Playbooks of the Splunk Phantom, so I've been creating some of these to help the customer automate the process of responding to the threats.

View full review »
AA
Project manager at a computer software company with 10,001+ employees

We employed Splunk Enterprise Security for one of our projects. Integrating it into our environment involved opening network ports and making necessary connections.

View full review »
John Yuko - PeerSpot reviewer
Assistant Manager ICT - Projects at I&M Bank Ltd

We are currently using it with SIEM, and SOAR which is Security Orchestration, Automation, and Response.

Splunk is primarily used for security, incident response, and security analytics.

View full review »
SD
Technical Project Manager at Altran

Our primary use case was really as a client organization, like the government and the IT industries, we are in the telecoms sector. We analyze security reports. We use Splunk to order them and put them in a system and we use the various kinds of integration with Oracle Cloud which is helpful.

View full review »
RB
Engineering Manager at Cengage Learning

We use it for logging, essentially for auditing and troubleshooting errors in production and finding out what happened.

I have used the product personally for five years and at my current company for a year and a half.

View full review »
GG
Security Engineer at By Light Professional IT Services

There is a lot that we monitor with it. We monitor outbound URLs. We monitor unusual traffic, unusual user logins, and excessive user logins. We monitor whether or not users are logging in from VPN or not, what IPs they are accessing, or whether a user is signing in from multiple IP addresses minus the VPN. 

View full review »
SP
CHRO at a computer software company with 5,001-10,000 employees

As there is no SIEM solution here at present, we are building it up through the assistance of a vendor. In the past I worked in the Splunk Cloud, which was seven-point something. With QRadar I worked on version 7.3. 

We use Splunk Cloud as a SIEM solution and to monitor traffic and the network for detection purposes. We can create use cases so that if the solution picks up on anything entering our organization, the malicious IP can be blocked. 

In respect of ones which are suspicious, based on the logs we pull from the data source, we can build the use cases accordingly and have our analysts work on these. 

View full review »
JJ
Lead Solution Architect at a tech vendor with 5,001-10,000 employees

We currently use Splunk Enterprise Security for security monitoring. Previously, we relied on AWS native monitoring tools. In that setup, logs were forwarded to a Splunk dashboard which was also used by our L1 and L2 support teams to evaluate incoming support cases.

View full review »
MK
Technical Account Manager at Trustaira

We primarily use the solution for monitoring and security.

We can use the solution to try to find some correlational data. For example, in banks, there is usually a protocol whereby users cannot withdraw more than a certain amount of money from an ATM. However, we find that, when people are on holiday, they are trying to withdraw more than the allowed amount. It's a use case we can deploy in our country. You can set certain rules and watch the data in order to gain insights.

View full review »
CM
Incident Manager at CyberCore Technologies

We started using Splunk to serve as a SIEM. In addition to correlating security information, we have begun to use it as a developer and customer advocate by analyzing user behaviors and system response times. 

View full review »
RE
Cyber Security Consultant at a tech services company with 10,001+ employees

I use Splunk for testing purposes. It is used for school research and to learn how to use Splunk. 

Splunk is mainly used for collecting logs and dashboards.

View full review »
MS
Senior security consultant at a comms service provider with 51-200 employees

Our initial use case was for security investigation, with the intention of creating some use cases. We ended up adding operational aspects, monitoring certain operational activities, such as high CPU utilization or any other applicational basis. 

This is obviously a cloud solution, but it does have some presence on-premises as well, so it's hybrid. 

View full review »
KB
DevOps Engineer at Amplify Education, Inc.

We use it for application log monitoring.

It is a logging product. Our application generates log files, then we upload them to Splunk. We run their agent on our EC2 instances in AWS, then we view the logs through their product, and it is all stored on their infrastructure.

View full review »
RU
Senior Solutions Architect at a manufacturing company with 51-200 employees

We are a solution provider and Splunk is something that we provide as a service to our customers.

View full review »
SD
Assistant Manager System at a financial services firm with 10,001+ employees

We are using Splunk as a SIEM tool. We're using it for monitoring.

View full review »
RB
Automation Specialist, Analytics at a computer software company with 10,001+ employees

I use Splunk on-and-off — I started with in-house projects, then moved up to commercial projects. 

View full review »
it_user340983 - PeerSpot reviewer
Infrastructure Engineer at Zirous, Inc.

Our primary use case of Splunk has been on the implementation side for clients. Splunk has proven, on multiple occasions, to be extremely useful in the proactive monitoring of clients' hardware, networking, and security operations. Some use cases that we have implemented include, but are not limited to, proactive account lockouts based on machine learning of a typical person's average number of failed login attempts, aggregation of a servers logs in order to predict downtime/maintenance/hardware failures quite accurately, as well as helping administrators of all sorts to gain a full picture of their environments under a single screen.

View full review »
KB
CTA\Owner at UCSolutions

I need the product for SIEM, Security Identity Event Management. I also need it for security operations, automated response, as well as mapping adjusting of security components as well. It helps us with how best to look at various events, and orchestrate between various different hyper-scalers.

View full review »
PB
Principal Systems Engineer at Aricent

We are a software development company and Splunk is one of the products that we have implemented for our clients. It is used for log analytics as well as the mobile SDK for checking the stability of mobile applications.

View full review »
PB
Principal Systems Engineer at Aricent

We are using the mobile SDK to check the stability of mobile applications.

View full review »
MK
Senior Consultant at Securian Financial Group

Security analysis to identify issues and for use in incident handling. Correlating logs across over 1000 servers with different operating systems and applications logs to provide security insights. 

View full review »
KK
IT Analyst at a energy/utilities company with 1,001-5,000 employees

In the beginning, we just wanted to collect the logs from the different devices, like the nano storage, Linux, Windows, and VMware. We tried to get the uniform solution to collect and analyze all of the system logs.

View full review »
TF
CTO at IHS Markit

We use it for logging and troubleshooting.

View full review »
GS
Principal Engineer at Publix Super Markets

Security and incident management, which is helpful when organizing the data from different systems and running analysis on all the data together.

View full review »
CJ
Information Security Engineer/Architect at The Church of Jesus Christ of Latter-day Saints

We use Splunk for operations, application monitoring, and security. We are both cloud and on-premise based, so it has been very versatile for us. 

View full review »
RW
Regional Head at a tech services company with 51-200 employees

The solution is primarily a SIEM tool and it basically helps companies with security.

View full review »
CS
Data Center Architect at a outsourcing company with 201-500 employees

We typically use it for centralized log management and SIEM functionality.

I am using the most recent version of it.

View full review »
EG
Information Security Officer at a financial services firm with 501-1,000 employees

We primarily use the solution for log management and security purposes.

View full review »
JO
General Manager at Intersoft S.A.

We use Splunk for security and also PCI compliance.

We have installed and implemented this solution for several clients in Bolivia with our team. We have received training from Splunk directly, and we have also provided training to our clients.

We deploy two versions: one for on-premise and one for the cloud.

Most of our customers purchase Splunk because they required a tool for gathering and collecting all of the logs from the infrastructure in order to make a correlation between data and to spot patterns surrounding security incidents.

View full review »
SM
Engineering Manager at a manufacturing company with 10,001+ employees

It is mostly centralized logging, a whole bunch of BI metrics, and an aggregation point, which we have adulterated for some PCI data.

It does meet our use case for the most part.

View full review »
it_user865026 - PeerSpot reviewer
Lead Systems Architect at a energy/utilities company with 10,001+ employees

Splunk provided me a platform to analyze both infrastructure loads and application performance for quick troubleshooting saving a load of time. Versatile apps at Splunkbase helped me to better configure and enhance visualization of the KPIs in my application.

View full review »
Sontas Jiamsripong - PeerSpot reviewer
Account Presale at a tech services company with 1,001-5,000 employees

The project we are working on with Splunk is short as the customer has given us two months to implement. My company is a Splunk partner.

View full review »
AM
Senior Cyber Security Expert at a security firm with 11-50 employees

Typically, we use the solution for critical infrastructure companies. 

View full review »
it_user859668 - PeerSpot reviewer
Splunk Administrator at Arizona State University

We use Splunk primarily to provide our security and ops groups with important insights to more efficiently make decisions and take action.

View full review »
it_user860487 - PeerSpot reviewer
Business Intelligence Developer at Arizona State University
  • Monitoring IT and other processes for a large university.
  • Leveraging alerts and dashboards to detect and predict security breaches and other events.
View full review »
it_user859650 - PeerSpot reviewer
Systems Analyst Staff - SW Eng Compute Analytics Lead at Qualcomm

IT service analytics: 

  • Server machine data
  • Monitoring data
  • Alerting data
  • ITSI KPIs
  • Real-time reporting
  • Month-over-month reporting.
View full review »
it_user859446 - PeerSpot reviewer
Splunk Architect at The Johns Hopkins University Applied Physics Laboratory

Central repository for log collection and analysis in a complex environment. We have used it for a variety of use cases involving SIEM and operational support.

View full review »
Donald Baldwin - PeerSpot reviewer
Principal Enterprise Architect at Aurenav Sweden AB

In our organization, Splunk is used in our data centers.

We have integration services and other types of systems in our new IoT architecture. We're using it to capture information.

We use Splunk as an aggregator for monitoring information from different sources, however, for our protection suite, we're using Comodo.

It's designed to collect data from different points. It has a lot of integrations built into it and that's why we're using it.

We use it for our enterprise more - such as for messaging. There's a lot of stuff we do on our integration services layer that we use Splunk for. For security purposes, we're using Comodo. Therefore we're not using Splunk for security purposes. We're using it for monitoring what's happening at our integration services layer.

View full review »
SS
Consultant at a financial services firm with 5,001-10,000 employees

We are using Splunk for cybersecurity operations.

View full review »
JD
Enterprise Architect at a tech services company with 10,001+ employees

We use it for log aggregation. 

If you have a large number of devices, you need to aggregate log data to make more sense of it for parsing, troubleshooting, and metrics. This is all we use it for.

If I need to track logs for certain application, I will push all of those logs to Splunk so I can run reports on those logs. It is more about what you are trying to do with it and what you need from it.

View full review »
RM
Splunker at freelancer

The primary use case is to analyse and monitor big data, creating various dashboards, alerts, etc.

View full review »
AT
Managing Director at Hayyan Horizons

We primarily use the solution for security and operations monitoring.

View full review »
SO
Founder at a marketing services firm with 11-50 employees

We're using the solution to try to build a virtual network and put Splunk inside it and do some kind of transcentralization with a log server. Our aim is to track connections, network traffic and some personal databases. I'm the founder of the company and we are customers of Splunk.

View full review »
JB
Sr. IT Manager at a government with 10,001+ employees

We are using Splunk to look at the logs, and see what is happening.

View full review »
JB
Sr. IT Manager at a government with 10,001+ employees

We use Splunk for log analysis and security monitoring.

View full review »
PN
Director at a tech services company with 10,001+ employees
  • Log mining
  • Log analysis
View full review »
Yosef Tavin - PeerSpot reviewer
DevOps Engineer at BigPanda

We use Splunk for a few different use cases:

  1. We package it as part of one of our on-premise software offerings which includes our in-house customized dashboards.
  2. We use it for Application Monitoring of many of our back-end systems. Monitoring is done completely through Splunk by forwarding application and other logs to Splunk and many configured customized alerts and dashboards for the Ops, Dev, product, and management teams.
  3. We created a custom anomaly detection data model to monitor the activity of our back-end services on an hourly basis relative to the past three months of activity.
View full review »
Mick - PeerSpot reviewer
Sr. Production Support Analyst at Electric Reliability Council of Texas

Operational intelligence monitoring for several different systems. We collect logs from applications and performance data from hardware, as well as information pulled from databases.

View full review »
RP
Director of IT at BLUE LAKE RANCHERIA

We primary use Splunk for log aggregation and search across multiple systems with Splunk Enterprise Security layered on top. 

View full review »
ST
Junior SAP Security Engineer at Sagesse Tech

We use Splunk Enterprise Security for our enterprise security.

View full review »
VA
Security Architect at a tech services company with 51-200 employees

Splunk just acts as an extra presentation layer, and we tried it because of the plugins they have to try and get more logs into the environment.

View full review »
ID
Senior Network Engineer at a tech services company with 51-200 employees

We typically use Splunk to collect and check all the logs and events around the diverse network environment which includes, firewall, switches, and routers. For example, we have traffic that needs to go from one part of the network to another and if we think there is a firewall blocking it along the path, rather than log in to all the firewalls to see what is happening, we simply go into Splunk and the check traffic going across the parts of the network to see where it is being dropped and what is the likely reason it has been dropped.

View full review »
GW
Consultant at Splunxter, Inc.

Security. We have built SIEM solutions three times from the ground up (not ES) using Splunk for some of the largest companies in the world.

View full review »
AV
IT System Developer/Admin at a manufacturing company with 10,001+ employees

The primary use case of this solution is to monitor Cyber Mission databases.

I create the diagrams to create an architecture that is then implemented. However, creating these diagrams are for my own learnings since these implementations are usually already available in the cloud office logs.

View full review »
AK
Senior Informatica Administrator at a computer software company with 10,001+ employees

We use Splunk on-premise. We mostly use it for log analysis and fraud detection. We are also testing using it in machine learning and other solutions. We have 10 people managing Splunk and we have approximately 150 people using the product in total.

View full review »
SJ
Engineer at a financial services firm with 201-500 employees

It's the primary place where I'd go to do an investigation if I want to see what's going on within an endpoint, or on a network, or with a user.

View full review »
MT
Project Manager at Idemitsu Oil & Gas

We need something to collect all our logs in a centralized solution. We have several servers but we don't have any log collection system.

View full review »
GM
Application Engineer at Expedia

The primary use case is for log analytics. Although, we have been using it as a hammer which hits all the nails. We have sort of overused it in some areas where it doesn't need to be used.

View full review »
AP
Presales Manager at a tech services company with 11-50 employees

We use it for security incident event management and for IT service intermediates.

View full review »
HT
System Administrator and DevOps Engineer at a tech services company with 10,001+ employees

Our primary use case of Splunk is for log monitoring and infrastructure monitoring. If we want to diagnose any issue in our application, we just push our application logs. This is on any client server using the universal forwarder logs on the Splunk server. After indexing, we can create a base log, and create attractive dashboards that are simple to understand and use. I'm a system administrator and we are customers of Splunk. 

View full review »
it_user867936 - PeerSpot reviewer
Works at a financial services firm with 10,001+ employees

With the use of Splunk, we were able to identify a brute force attack against a "switch" network device. An external attacker attempted to connect multiple times using multiple usernames. Splunk was able to detect these attempts and immediately blocked these attempts.

View full review »
it_user867087 - PeerSpot reviewer
Security Engineer at Information Innovators Inc. (Triple-i)

We primarily use it to correlate logs throughout the enterprise for both searching and use in investigations.

View full review »
CM
Business Intelligence Engineer at SONIFI Solutions, Inc.

Primary use is business intelligence. 

View full review »
AD
Director General de España at a cloud provider with 51-200 employees

We work with Splunk. We use it for our own services, and we also integrate and resell Splunk. It is used for cyber security. 

Different clients have different versions. They have Splunk Cloud and Splunk on-premises with different versions.

View full review »
ST
IT & Cloud Architect at AiM Services SA

Our primary use case is reporting from the Windows administration. We have SCCM that configures the manager to update every PC workstation and server in the company. We have a lot of PCs and servers in our environment and we use Splunk for the gathering of the PCs and Windows service. We also use it to collect information from the security tools, for example, to provide the management information about how the everyday connection is. 

View full review »
it_user782697 - PeerSpot reviewer
Security Operation Center Analyst at Sadad

Splunk is a SIEM, a Security Information and Event Management solution. It is used, for example, for monitoring security logs and security information in companies and organizations. It is also used for correlation, meaning making policies, for detecting/monitoring attacks, and the like; for monitoring security logs, security events, preventing hackers from attacking. It's really for business continuity.

View full review »
MA
System Administrator at Abdullah Al-Othaim Markets
  • Searches the logs for all network devices and server. 
  • Monitors clients' hardware, networking, and security operations. 
  • It is good for the administrator to use it when maintaining the whole IT Infrastructure.
View full review »
VS
Splunk BDM in UA at a manufacturing company with 51-200 employees

We are a solution provider and Splunk is one of the products that we distribute.

The primary use case is for SIEM and we have approximately 35 customers.

View full review »
MM
CEO at a tech services company with 11-50 employees

We are resellers. We provide solutions to our clients.

Splunk is primarily used for developing CM solutions that are based on the Splunk platform for future security operation center development.

We are concentrating on assisting in the development of a security monitor as well as analysis.

If I am not mistaken, it's a standard CM system for identification, security verification, and event monitoring.

View full review »
JS
Product Manager, FX Solutions at a tech services company with 10,001+ employees

I use this solution for data visualization.

View full review »
DG
CSSP Manager at a tech services company with 51-200 employees

I'm the CSSP manager and we are customers of Splunk. 

View full review »
MS
Sr. Manager Information Security at Tapal Tea (Private) Limited

Log collection and search.

View full review »
TJ
QA Lead at a financial services firm with 11-50 employees

We use it mostly for log monitoring, and also for trying to raise alarms.

View full review »
JC
Chief Architect at PathMaker Group

We primarily use it for SIEM.

View full review »
it_user861630 - PeerSpot reviewer
Senior Network Security Engineer at Starz Entertainment

Although my company uses Splunk extensively, my use case is primarily the Enterprise Security add-on.

View full review »
AR
Senior Manager, Analytics & Insights at a consultancy with 10,001+ employees

We are using Splunk for querying data from different sources.

View full review »
MK
Technical manager at a tech services company with 11-50 employees

My primary use case is for log management. It's mostly deployed on-premises, but it can be cloud-based as well. 

View full review »
RK
SOC Analyst at a wholesaler/distributor with 10,001+ employees

We have multiple use cases, almost 200 plus use cases. An example, travel activities where you log in.

View full review »
it_user1415322 - PeerSpot reviewer
Senior Consultant at sectecs

My reason for implementing it was just to learn more about the product. I wanted to learn about the Splunk programming language, how to pipe searches, add logs, verify the logs, create fields, extract data into fields, build dashboards, and to get hands-on experience with the product.

View full review »
it_user870792 - PeerSpot reviewer
Senior Security Engineer
  • IT Ops
  • Security
  • Compliance

Many IT groups and non-IT groups use the product to gain insights into their environments.

View full review »
it_user865365 - PeerSpot reviewer
Data Scientist Intern at Splunxter, Inc.

I work with Splunk, as a contractor, so I use it in many different areas. Most often it is used to get performance insights on applications or servers. Recently, I have used it in more of an endpoint security mindset. 

View full review »
it_user859770 - PeerSpot reviewer
consultant at a non-profit with 1,001-5,000 employees

We use Splunk for both monitoring and SIEM. Our security operations group uses Splunk to track user accounts which may have been compromised as well as follow those accounts through the organization.

View full review »
AK
System Engineer at NetScout Systems

There are many use cases for Splunk, we commonly use it for log management and analytics.

View full review »
SO
Software Engineer at Tableau Software

We use it for searching logs in a production environment.

View full review »
GA
Security Architect at a comms service provider with 10,001+ employees

We use it for log analysis and alerting, and our stock analysts use it.

I have used the product for more than five years. Then, in the cloud, I have used it for probably a year. It scales better in the cloud than on-premise.

View full review »
RM
Audit Remideation/Financial Manager at a tech services company with 1,001-5,000 employees

The solution is primarily used to monitor the operating system for threats, specifically related to login threats. If someone trying to log-in, or somebody trying to break into the system, the idea is it will check that and catch things. It's mainly for external threats to the operating system.

View full review »
Emad Ul Haq - PeerSpot reviewer
Network & Telco Lead at a energy/utilities company with 501-1,000 employees
  • Log collection and analysis
  • Reporting for the whole enterprise environment.
View full review »
RS
Tech Lead Security at a comms service provider with 51-200 employees

I used it in the SOC environment to get logs, create dashboards, and filter out data.

View full review »
HK
President at a non-profit with self employed

We use Splunk for analyzing data.

View full review »
RW
Architecture and Security Team Leader at CV Akbar Panjaya

We were using Splunk for our networking to know exactly what kind of the traffic was going from one network to another network because we had a lot of the connections on other sites.

View full review »
it_user762567 - PeerSpot reviewer
Director of Information Security with 201-500 employees
  • SIEM
  • Security information 
  • Event management
View full review »
BW
Senior Network & Security Architect at a insurance company with 501-1,000 employees

Splunk is our central locale for cybersecurity and protection.

View full review »
it_user872772 - PeerSpot reviewer
Technical Lead at Wipro Technologies

We use Splunk for infrastructure monitoring, application monitoring and in the security space for our organization as well as for our customers.

View full review »
MC
Presales IT at a tech services company with 201-500 employees

Our company is an IT service provider. We are resellers of Splunk. One of our clients that we monitor is a laboratory that uses this solution.

Splunk is a change management solution. We use the solution as a log collector, and to analyze and provide alerts from the IT instructor.

View full review »
VW
Security Professional at a tech services company with 51-200 employees

We are using it for security information and event management (SIEM). We have started to use Splunk recently, and we are in the implementation phase as of now.

View full review »
LF
Técnico Judiciário at a government with 1,001-5,000 employees

We use it to do SIEM. 

View full review »
AZ
Principal Consultant at a computer software company with 51-200 employees
  • Cybersecurity defense
  • Web app monitoring
  • VMware monitoring
View full review »
BS
Enterprise Client Executive at a tech services company with 11-50 employees

We use it for security operations and management.

View full review »
LK
Network Operations Center Engineer at a tech company with 51-200 employees

We use the solution for monitoring systems. We also use it with servers and CG routers from the data center, as well as for collecting the ADL from all networks which are located in our regions of the country.

View full review »
it_user859464 - PeerSpot reviewer
Senior Cloud Operations Analyst at a tech vendor with 1,001-5,000 employees

Splunk is our monitoring and investigating Swiss Army knife for key applications and systems. If we run it, we Splunk it.

View full review »
AZ
BS Systems Engineer at a tech services company with 501-1,000 employees

We used it to create a full security operations center (SOC) for our IT department by adding all network and security devices, the AD, and mail servers to it. Then Splunk started to receive their logs, it analyzed them, and provided useful reports.  

View full review »
DA
Engineer at a integrator with 11-50 employees

Our primary use case is for monitoring and cybersecurity.

View full review »
it_user1048674 - PeerSpot reviewer
Cyber Analyst with 501-1,000 employees

Testing for insider threat behavior.

View full review »
TS
Project Manager at a comms service provider with 10,001+ employees

My primary use case for Splunk is for log file visualization and monitoring alert management.

View full review »
MC
Net Sec at a tech services company with 11-50 employees

Our primary use case of this solution is as a centralized lab collection.

View full review »
MN
Data Scientist at a tech vendor with 201-500 employees

We use a lot of sales metrics. We use machine learning models to provide sales forecasting. We create database connections and run a query on the database. The next step is to place the data into Splunk. We create indexes to get the data into the Splunk dashboard.

View full review »
ED
Java Technical Lead at a insurance company
  • Log monitoring and alerts
  • Looking up information 
  • Dashboards for nice, fast information about various application servers.
View full review »
IS
Enterprise Architect and Business with 5,001-10,000 employees

It helps increase our productivity.

View full review »
Buyer's Guide
Splunk Enterprise Security
March 2024
Learn what your peers think about Splunk Enterprise Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,246 professionals have used our research since 2012.