Overview

Splunk Inc. provides the leading software platform for real-time Operational Intelligence. Splunk® software and cloud services enable organizations to search, monitor, analyze, and visualize machine-generated big data coming from websites, applications, servers, networks, sensors, and mobile devices. More than 7,400 enterprises, government agencies, universities, and service providers in over 90 countries use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, prevent fraud, improve service performance, and reduce cost. Splunk products include Splunk® Enterprise, Splunk Cloud™, Splunk Storm®, Hunk™, and premium Splunk Apps. To learn more, please visit https://www.splunk.com/company.

Products

Splunk Enterprise

Turn Machine Data into answers for real-time insights to boost business results

Real-Time Visibility:

Data Source Agnostic:

AI & Machine Learning:


Automate the collection, indexing, and alerting of machine data that is critical to your operations Uncover the actionable insights from all your data - no matter the source of format Leveraging artificial intelligence and machine learning for predictive and proactive business decisions


Product Capabilities:

  • Get answers fast with metrics: react instantly to your data with visualized metrics. Convert logs into metrics and boost search and monitoring performance as well as alerting functions
  • Your data is everywhere: Your organization's digital evolution involves managing all the data - regardless of the data source or type. Full observability of your organization requires the ingestion of real-time streaming data from open source and proprietary solutions, including everything from containers to public data stores. It's critical to have the ability to access and control critical business data regardless of scale or location
  • Experience integration Machine Learning analytics: Leverage the strength of artificial intelligence and machine learning to improve IT, security, and business outcomes.
  • Don't react, predict, and prevent: Integrated tools and commands backed by open source algorithms, make these future-learning capabilities possible

Security

Thousands of organizations rely on Splunk as the single source of truth to help drive better, faster security decisions

Splunk Helps With:

  • Security monitoring
  • Advanced threat detection
  • Insider threat
  • Incident Investigation and Forensics
  • SOC automation
  • Incident response
  • Compliance
  • Fraud Detection

Splunk Enterprise Security App

The nerve center of the security ecosystem, giving teams the insight to quickly detect and respond to internal and external attacks, simplify threat management minimizing risks.

Compliance (RMF/FISMA)

Stay ahead of compliance mandates. Reduce time, errors, and costs with an analytics-driven approach.

Automate Data Collection Continuous Risk Assessment Painless Audit and Reporting

What do I need to do to be compliant?

Reach out to our Splunk team at Carahsoft for more information on compliance standards at splunk@carahsoft.com


Splunk for FISMA

Compliance auditing solution for NIST 800-53 guidelines

Splunk for RMF

Security monitoring to detect insiders or advanced attackers in your environment

HIPPA Privacy and Security Scout

HIPPA Privacy and Security for Splunk Enterprise is a dynamic solution for healthcare organizations to demonstrate compliance with various HIPPA Privacy and Security, HIPPA Omnibus Rule, and ATTA-HITECH requirements.

Splunk App for PCI Compliance

A Splunk developed and supported App designed to help organizations meet PCI DSS 3.2 requirements

Operational Intelligence


ITSI App

Monitoring and analytics solutions powered by artificial intelligence for IT Operations (AIOPs) that provides visibility into healthy and key performance indicators of critical IT and business services, and nits infrastructure.

Cisco Suite

Provides a single pane of glass interface into Cisco security services. It supports Cisco ASA and PIX firewall applications, the FWSM firewall services module, Cisco IPS, Cisco Web Security Appliance (WSA), Cisco Email Security Appliance (ESA), Cisco Identity Services Engine (ISE), pxGrid, and Cisco Advanced Malware Protection/Sourcefire.



Fraud Detection

Cisco Suite

From security monitoring to detecting insiders or advanced attackers in your environment, this app uses Splunk Enterprise and the power of Search Processing Language (SPL) to showcase many working examples.


Adaptive Response

Provides a mechanism for running preconfigured actions within the Splunk platform or by integrating with external application. These actions can be automatically triggered by correlation search results or manually run on an ad hoc basis from the Incident Review dashboard.

This framework is one of five frameworks in Splunk Enterprise Security with which you can integrate.

Most adaptive response actions produce new events in the Splunk platform. Response events are linked to the action that produced them with orig_action_name or ig_sig, and orig_rid fields, allowing developers or ES admins to construct workflows of chained actions, ES admins and analysts can then customize and audit these workflows.

Splunk Ecosystem

Splunk Technology Partners at Carahsoft

Carahsoft has partnered with several Splunk technology partners to provide a robust ecosystem of complementary solutions for Splunk’s operational intelligence platform.

These solutions address an expansive range of ready-to-use applications, including optimized data collection, security monitoring, IT management and more, and will continue to grow as Carahsoft’s Splunk Partner portfolio expands. A full list of Solution Providers and their specialties can be found below.

For more information contact:

Splunk Technology Alliance Partner Team
splunkTAP@carahsoft.com
855-377-5865
  • Corelight

    Corelight transforms raw network traffic into comprehensive, organized network logs with the use of open source Bro (now 'Zeek'). Founded and maintained by the creators of Bro, Corelight provides actionable insights into security events by assembling raw, disparate network data into over 400 protocol-based fields for correlation and analysis in a SIEM tool.

  • Expanse

    Expanse is a SaaS company that continuously discovers, tracks, and monitors the dynamic global Internet Edge for the world’s largest organizations. In addition, Expanse is the first company to deliver off-premise analysis of network edge communications to identify customer systems that are making risky connections to out-of-policy services on the public Internet

  • Gemini Data

    Gemini

    Gemini provides an analyst platform to rapidly deploy, manage and achieve true situational awareness across leading data and security solutions, simplifying the challenges analyst face due to an increasing rate of data and security threats.
  • Indegy

    Indegy, is a leader in industrial cyber security, protects industrial control system (ICS) networks from cyber threats, malicious insiders and human error. The Indegy Industrial Cyber Security Suite arms security and operations teams with full visibility, security and control of ICS activity and threats by combining hybrid, policy-based monitoring and network anomaly detection with unique device integrity checks.

  • Insight Engines

    Insight Engines

    Security operations teams are drowning in machine data and strapped for people who can make sense of the signals coming from it. In today’s rapidly evolving threat landscape, quickly drawing actionable insights from the data is the key to reducing risk. Cyber Security Investigator (CSI) for Splunk enables your analysts at any level to harness the power of natural language search, be significantly more productive, and think strategically, as they investigate complex data.

  • Qmulos

    Qmulos Apps, powered by Splunk, are the only compliance solutions architected to foster a continuous monitoring mindset to the compliance problem. Our security expertise led us to focus our solution on security-relevant machine state data, as well as other required audit evidence types. Our key execs have decades of proven compliance, cyber, and security research experience. Our company is a ISV (TAP) and Professional Services Partner of Splunk.

  • >Rapid Response by Optensity

    >rapid response is a new app built by Optensity for use with Splunk alerts. >rapid response lets you turn Splunk’s operational intelligence into direct action in real-time. Rely on >rapid response to ensure fast, repeatable execution of your critical IT operations, security, compliance and application delivery strategies.

  • SwiftStack

    SwiftStack provides cloud-native, software-defined storage for unstructured data in a single namespace, powered by policies to extend enterprise workflows across private and public cloud infrastructure. Verified by Splunk, and proven to be fully compatible with Splunk SmartStore, SwiftStack is the only storage option that can be built on the same server platform as Spunk indexers, helping to simplify operations and management of disparate data sets.

  • Syncsort Ironstream for Splunk

    • Streams mainframe machine data to Splunk for enterprise-wide operational intelligence.
    • Collects log data from SMF, RMF, SYSLOG and other IBM z/OS mainframe data sources (should we add Top Secret, etc. here?), and forwards that data in real time to the Splunk® Enterprise analytics platform ensuring visibility into your z/OS environment integrated with information from the rest of your IT infrastructure.
    • Features advanced filtering and data loss protection to minimize data loss during network or other external failures.
    • Integrates with Splunk Enterprise Security and Splunk IT Service Intelligence.


Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


Federal Contracts

ITES-SW

ITES-SW Contract # W52P1J-15-D-0008 Term: March 2015 - March 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

National Cooperative Purchasing Alliance (NCPA)

Term: through April 30, 2019

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2019 (with 2 option renewal years)

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2019 (with 2 option years)

Texas DIR-TSO-4288

Texas DIR Contract: DIR-TSO-4288 Contract Period: Through February 21, 2021 (with 2 option years)

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021


Events

Check out the Workshops tab to learn about our Splunk hands-on workshops around Splunk Enterprise, IT Service Intelligence, and Enterprise Security.

Upcoming Events

March 28, 2019 at 11:00 AM ET
April 03, 2019 at 11:00 AM ET

Archived Events

News

Latest News

Supported by Splunk, the HADES Program Captures, Monitors and Analyzes Threats by Taking Action on Data
READ MORE >
Splunk Inc. (NASDAQ: SPLK), delivering actions and outcomes from the world of data, today announced Partner+ Program innovations and enhancements to the expanding partner ecosystem.
READ MORE >
Syncsort, a global leader in data liberation, integrity and integration solutions for next-generation analytics, today announced a distribution agreement with Carahsoft, the Trusted Government IT ...
READ MORE >
Optensity, developer of AppSymphony, an award-winning app composition platform, and Carahsoft Technology Corp., the trusted government IT solution provider, today announced that Optensity’s new ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, today announced it has been recognized by the Splunk® Partner+ Program as the 2017 Global Distribution Partner of the Year as ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, today announced it has received the Global Award for Marketing Excellence and the Regional Award for Public Sector ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, today ...
READ MORE >
Splunk Inc. (NASDAQ: SPLK), the leading provider of software for real-time operational intelligence, and Carahsoft Technology Corp., the trusted government IT solution provider, today announced a ...
READ MORE >

Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

Datasheet

Today’s datacenter has evolved and IT environments are now more complex than ever – so don’t let your IT management and monitoring tools leave you behind. With Splunk for IT Operations, you get end-to-end visibility across IT infrastructure to fix problems faster.

Any government agency, whether it is a civilian, defense or intelligence agency, depends on information technology to help support data integrity, reduce mission risk and ensure the confidentiality and availability of information. In response to these needs, NIST published its Risk Management F...

The rapid pace of virtualization adoption in the datacenter creates challenges for virtualization administrators. IT professionals have limited operational visibility into their virtual infrastructure, inadequate control over performance and security of virtual machines, insufficient insights in...

Targeted attacks — including advanced persistent threats (APTs) — and the new generation of malware they employ are among the greatest security challenges facing today’s enterprises. Traditional security technologies are unable to reliably identify such threats in the first place, leading to h...

Industry Study

The cyberthreat landscape is rapidly changing. As attacks continue to increase in volume and sophistication, agency defenses must also evolve.In order to do so, many agencies are moving toward a more holistic, analytics-driven approach to security. By gaining an end-to-end view of what's happening i...

Product Brief

splunk_logo_white_2.jpg
Product Brief
Learn about the benefits of Splunk as a Service! Splunk Cloud is the easiest way to aggregate, analyze, and get the answers you need from your machine data.

A Security Operations Center (SOC) helps improve security and compliance by consolidating key security personnel and event data in a centralized location.

Analyzing all your data can uncover signs of advanced threats.

Resource

Security operations teams are drowning in machine data and strapped for people who can make sense of the signals coming from it. In today's rapidly evolving threat landscape, quickly drawing actionable insights from the data is the key to reducing risk.

Splunk User Behavior Analytics (Splunk UBA) helps organizations find known, unknown, and hidden threats using machine learning, behavior baselines, peer group analytics, and advanced correlation to find lurking APTs, malware infections, and insider threats. Splunk UBA addresses security analyst and ...