Overview

Splunk Inc. provides the leading software platform for real-time Operational Intelligence. Splunk® software and cloud services enable organizations to search, monitor, analyze, and visualize machine-generated big data coming from websites, applications, servers, networks, sensors, and mobile devices. More than 7,400 enterprises, government agencies, universities, and service providers in over 90 countries use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, prevent fraud, improve service performance, and reduce cost. Splunk products include Splunk® Enterprise, Splunk Cloud™, Splunk Storm®, Hunk™, and premium Splunk Apps. To learn more, please visit https://www.splunk.com/company.

Products

Adaptive Response

Provides a mechanism for running preconfigured actions within the Splunk platform or by integrating with external application. These actions can be automatically triggered by correlation search results or manually run on an ad hoc basis from the Incident Review dashboard.

This framework is one of five frameworks in Splunk Enterprise Security with which you can integrate.

Most adaptive response actions produce new events in the Splunk platform. Response events are linked to the action that produced them with orig_action_name or ig_sig, and orig_rid fields, allowing developers or ES admins to construct workflows of chained actions, ES admins and analysts can then customize and audit these workflows.

Compliance (RMF/FISMA)

Stay ahead of compliance mandates. Reduce time, errors, and costs with an analytics-driven approach.

Automate Data Collection Continuous Risk Assessment Painless Audit and Reporting


What do I
need to do to
be compliant?

Reach out to our Splunk team at Carahsoft for more information on compliance standards at splunk@carahsoft.com

Splunk Ecosystem

Splunk Technology Partners at Carahsoft

Carahsoft has partnered with several Splunk technology partners to provide a robust ecosystem of complementary solutions for Splunk’s operational intelligence platform.

These solutions address an expansive range of ready-to-use applications, including optimized data collection, security monitoring, IT management and more, and will continue to grow as Carahsoft’s Splunk Partner portfolio expands. A full list of Solution Providers and their specialties can be found below.

For more information contact:

Splunk Technology Alliance Partner Team
splunkTAP@carahsoft.com
855-377-5865
  • Corelight

    Corelight transforms raw network traffic into comprehensive, organized network logs with the use of open source Bro (now 'Zeek'). Founded and maintained by the creators of Bro, Corelight provides actionable insights into security events by assembling raw, disparate network data into over 400 protocol-based fields for correlation and analysis in a SIEM tool.

  • Expanse

    Expanse is a SaaS company that continuously discovers, tracks, and monitors the dynamic global Internet Edge for the world’s largest organizations. In addition, Expanse is the first company to deliver off-premise analysis of network edge communications to identify customer systems that are making risky connections to out-of-policy services on the public Internet

  • Gemini Data

    Gemini

    Gemini provides an analyst platform to rapidly deploy, manage and achieve true situational awareness across leading data and security solutions, simplifying the challenges analyst face due to an increasing rate of data and security threats.
  • Indegy

    Indegy, is a leader in industrial cyber security, protects industrial control system (ICS) networks from cyber threats, malicious insiders and human error. The Indegy Industrial Cyber Security Suite arms security and operations teams with full visibility, security and control of ICS activity and threats by combining hybrid, policy-based monitoring and network anomaly detection with unique device integrity checks.

  • Insight Engines

    Insight Engines

    Security operations teams are drowning in machine data and strapped for people who can make sense of the signals coming from it. In today’s rapidly evolving threat landscape, quickly drawing actionable insights from the data is the key to reducing risk. Cyber Security Investigator (CSI) for Splunk enables your analysts at any level to harness the power of natural language search, be significantly more productive, and think strategically, as they investigate complex data.

  • Qmulos

    Qmulos Apps, powered by Splunk, are the only compliance solutions architected to foster a continuous monitoring mindset to the compliance problem. Our security expertise led us to focus our solution on security-relevant machine state data, as well as other required audit evidence types. Our key execs have decades of proven compliance, cyber, and security research experience. Our company is a ISV (TAP) and Professional Services Partner of Splunk.

  • >Rapid Response by Optensity

    >rapid response is a new app built by Optensity for use with Splunk alerts. >rapid response lets you turn Splunk’s operational intelligence into direct action in real-time. Rely on >rapid response to ensure fast, repeatable execution of your critical IT operations, security, compliance and application delivery strategies.

  • SwiftStack

    SwiftStack provides cloud-native, software-defined storage for unstructured data in a single namespace, powered by policies to extend enterprise workflows across private and public cloud infrastructure. Verified by Splunk, and proven to be fully compatible with Splunk SmartStore, SwiftStack is the only storage option that can be built on the same server platform as Spunk indexers, helping to simplify operations and management of disparate data sets.

  • Syncsort Ironstream for Splunk

    • Streams mainframe machine data to Splunk for enterprise-wide operational intelligence.
    • Collects log data from SMF, RMF, SYSLOG and other IBM z/OS mainframe data sources (should we add Top Secret, etc. here?), and forwards that data in real time to the Splunk® Enterprise analytics platform ensuring visibility into your z/OS environment integrated with information from the rest of your IT infrastructure.
    • Features advanced filtering and data loss protection to minimize data loss during network or other external failures.
    • Integrates with Splunk Enterprise Security and Splunk IT Service Intelligence.


Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


Federal Contracts

ITES-SW

ITES-SW Contract # W52P1J-15-D-0008 Term: March 2015 - March 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

National Cooperative Purchasing Alliance (NCPA)

Term: through April 30, 2019

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2019 (with 2 option renewal years)

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2019 (with 2 option years)

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021


Events

Check out the Workshops tab to learn about our Splunk hands-on workshops around Splunk Enterprise, IT Service Intelligence, and Enterprise Security.

Upcoming Events

February 28, 2019 at 1:00 PM ET

Archived Events

News

Latest News

Splunk Inc. (NASDAQ: SPLK), delivering actions and outcomes from the world of data, today announced Partner+ Program innovations and enhancements to the expanding partner ecosystem.
READ MORE >
Syncsort, a global leader in data liberation, integrity and integration solutions for next-generation analytics, today announced a distribution agreement with Carahsoft, the Trusted Government IT ...
READ MORE >
Optensity, developer of AppSymphony, an award-winning app composition platform, and Carahsoft Technology Corp., the trusted government IT solution provider, today announced that Optensity’s new ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, today announced it has been recognized by the Splunk® Partner+ Program as the 2017 Global Distribution Partner of the Year as ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, today announced it has received the Global Award for Marketing Excellence and the Regional Award for Public Sector ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, today ...
READ MORE >
Splunk Inc. (NASDAQ: SPLK), the leading provider of software for real-time operational intelligence, and Carahsoft Technology Corp., the trusted government IT solution provider, today announced a ...
READ MORE >

Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

Datasheet

Today’s datacenter has evolved and IT environments are now more complex than ever – so don’t let your IT management and monitoring tools leave you behind. With Splunk for IT Operations, you get end-to-end visibility across IT infrastructure to fix problems faster.

Any government agency, whether it is a civilian, defense or intelligence agency, depends on information technology to help support data integrity, reduce mission risk and ensure the confidentiality and availability of information. In response to these needs, NIST published its Risk Management F...

The rapid pace of virtualization adoption in the datacenter creates challenges for virtualization administrators. IT professionals have limited operational visibility into their virtual infrastructure, inadequate control over performance and security of virtual machines, insufficient insights in...

Targeted attacks — including advanced persistent threats (APTs) — and the new generation of malware they employ are among the greatest security challenges facing today’s enterprises. Traditional security technologies are unable to reliably identify such threats in the first place, leading to h...

Industry Study

The cyberthreat landscape is rapidly changing. As attacks continue to increase in volume and sophistication, agency defenses must also evolve.In order to do so, many agencies are moving toward a more holistic, analytics-driven approach to security. By gaining an end-to-end view of what's happening i...

Product Brief

splunk_logo_white_2.jpg
Product Brief
Learn about the benefits of Splunk as a Service! Splunk Cloud is the easiest way to aggregate, analyze, and get the answers you need from your machine data.

A Security Operations Center (SOC) helps improve security and compliance by consolidating key security personnel and event data in a centralized location.

Analyzing all your data can uncover signs of advanced threats.

Resource

Security operations teams are drowning in machine data and strapped for people who can make sense of the signals coming from it. In today's rapidly evolving threat landscape, quickly drawing actionable insights from the data is the key to reducing risk.

Splunk User Behavior Analytics (Splunk UBA) helps organizations find known, unknown, and hidden threats using machine learning, behavior baselines, peer group analytics, and advanced correlation to find lurking APTs, malware infections, and insider threats. Splunk UBA addresses security analyst and ...