11/19/2023 0 Comments Splunk itsi glass table![]() Most of our clients today that have a current Splunk installation in place have been introduced to ITSI one way or another, either through Splunk directly or through us providing regular check-ins with our customers. I was one of the few fortunate enough to be introduced and certified in the installation and customization of ITSI long before it was released to the public. Recently Splunk introduced another fantastic premium application into their arsenal of already world-class and robust offerings (including Enterprise Security) – Splunk Information Technology Service Intelligence (ITSI). Data from machines collected in Splunk is valid AND valuable for countless use cases stretching outside the bounds of network security. As such, it’s somewhat easy to forget what Splunk is truly intended to be viewed and deployed as - the Platform for Machine Data. Security is one of the major use cases for Splunk, and it is one of the major and continuous use cases we see here at GTRI with all our clients, from the smallest commercial entities, to the largest enterprises, and most so with our Federal Government customers. Heck, even the United States Department of Homeland Security has selected Splunk as one of the chosen tools for its multi-year government-wide Continuous Diagnostics and Mitigation (CDM) program. Hence, it becomes a no-brainer to use a platform like Splunk, with its Universal Machine Data mentality, to continuously monitor an organization’s network to detect breaches and attacks the moment they happen, not days (or months in some cases!) after the fact. Office of Personnel Management (OPM) data breach, Home Depot’s credit card breach…the list goes on and on. ![]() Protecting an organization’s data – and more importantly THEIR CUSTOMER’S data - is a critical concern from any entity’s perspective, and one that many organizations have failed recently to achieve. Why wouldn’t they? The Splunk Enterprise Security platform, as well as the newer User Behavior Analytics (UBA) engine, can drastically increase any organization’s overall security posture, whether security monitoring has been an overarching concern for that organization or is a relatively new topic. With all the focus and “hubbub” on network and data security, it becomes very easy for any organization to view a tool like Splunk as solely a security platform.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |