Splunk Inc. (NASDAQ: SPLK), provider of the leading software platform for real-time Operational Intelligence, today announced that it has been named a leader in Gartner's 2014 Magic Quadrant* for Security Information and Event Management (SIEM). Gartner evaluated Splunk® Enterprise and the Splunk App for Enterprise Security, award-winning products used for security by thousands of organizations around the world. To view the report, go to: www.splunk.com/goto/SIEM_MQ_2014.
As the report outlines, “We continue to see large companies that are re-evaluating SIEM vendors to replace SIEM technology associated with partial, marginal or failed deployments,” according to Gartner report authors Kelly Kavanagh, principal research analyst, Mark Nicolett, managing vice president, and Oliver Rochford, research director. “The greatest area of unmet need is effective targeted attack and breach detection. Organizations are failing at early breach detection, with more than 92% of breaches undetected by the breached organization. The situation can be improved with stronger threat intelligence, the addition of behavior profiling and better analytics. Most companies expand their initial SIEM deployments over a three-year period to include more event sources and greater use of real-time monitoring.”
“We believe Splunk’s position as a leader in the Magic Quadrant for SIEM reinforces the trend we are seeing that an analytics-enabled Security Operations Center (SOC) is essential and more effective at detecting and responding to today’s cyberthreats. Analytics provide the SOC and security team a holistic view by collecting, monitoring and analyzing all the data in an organization with rich enterprise and global threat context,” said Haiyan Song, vice president of security markets, Splunk. “Splunk customers are continuously transforming their operations by giving their SOC and security teams situational awareness and, more importantly, the ability to investigate and make determinations fast, which means more decisive and timely actions against attacks, advanced persistent threats, insider threats and other operational issues.”