<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Inside Splunk, a New SIEM Solution for MSSPs

November 29, 2016

Splunk. The name is not very descriptive, but if you drop it in front of IT professional, they’ll know what you mean. This cloud-based platform for operational intelligence is a new and sophisticated big data tool, which gives even novice users the ability to process and analyze large reams of data on their own.

What does this mean, for the enterprise, exactly? Well, it means extracting precise intelligence from big data is now possible for an organization of any size, whether it has one server or thousands.

Here are 5 features that make Splunk so special:

1. Millions of Logfiles

Think of all the websites on the entire Internet. Actually, think of each individual page of content. Kind of unfathomable, right? That’s what it’s like for an IT professional to think about all of the log files for all of the servers in its data center. When something goes wrong, having a fast and smart search engine for these millions of log files is a crucial start to finding a solution. That’s what’s at the core of Splunk—log storing, searching, analyzing and processing.

2. The Sleekest SPL Yet

Splunk’s search processing language, or SPL, offers the ability to analyze mountains of data and turn up precise, contextually relevant insights in real-time.

3. Ease of Installation

Unlike other enterprise platform solutions that take an IT professional and a few days to properly install and deploy, Splunk can be installed by anyone and in about five minutes.

4. Ease of Scalability

You can start with a single Splunk server and simply add on as your organization (and therefore your data) grows. Speed increases with the number of Splunk servers holding data and the work is automatically and evenly distributed.

5. No Ageism Here

Most monitoring tools retain data for a certain period of time and/or give you fewer options for older data. For example, you might want to compare application start up speed between last year and today, but you can’t get that level of granularity with year-old data. Spunk doesn’t have any such limitations. It can index unlimited amounts of data per day and keep it all at your fingertips, forever.

 

New Call-to-action

 

These are just a handful of the features that contribute to actualizing Splunk’s mission of making machine data accessible to anyone. It does this by identifying data patterns, providing metrics, diagnosing problems, and providing intelligence for business operations. Although it’s not specifically designed for security, managed security service providers (MSSPs) have begun to use it as an integrated security information and event management (SIEM) tool. 

Splunk gives MSSPs access to a wider range of security and nonsecurity use cases than a traditional SIEM solution. In fact, Splunk delivers on the true promise of SIEM better than a traditional SIEM solution that lacks the scalability and flexibility of Splunk.

Splunk software can handle delivering these use cases as well as other key SIEM capabilities, including:

  • Real-time aggregation of security-relevant data
  • Ability to add context to security events
  • Incident investigations/forensics
  • Security reporting and visualizations
  • Real-time correlations and alerting for threat detection
  • Advanced/unknown threat detection
  • Compliance reporting

In short, Splunk, now with more than 10,000 customers around the globe, has fast become the new standard for SIEM used by MSSPs. 

In order for MSSPs and IT admins to fully unlock the potential of Splunk, they need to actually get the packets to process. A network TAP will replicate traffic and send it your analyzer, where Splunk can provide real time analysis.

 

For more information on how you can use Garland Network TAPS to see  every bit, byte, and packet® and analyze them for potential threats, check out our new white paper, Maintaining the Edge of the Network – A New Necessity for Security Architects.

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES