Skip to main content

Help us improve the Digital Marketplace - send your feedback

Networkology Ltd

Splunk Data Platform

Splunk monitors and analyses data from any sources to optimise your IT, security and business performance through operational intelligence and insights. This offering includes Enterprise, Clouds, Enterprise Security (SIEM), SOAR (Orchestration), IT Service Intelligence (ITSI), Observability (APM), and Splunk's Edge Hub solution.

Features

  • Collects and indexes log and machine data from any source
  • Powerful search, analysis and visualization capabilities empower users
  • Fraud and cyber threat detection analysis
  • Real time analysis for operational intelligence and business reporting
  • Information governance, assurance and compliance analysis
  • Machine learning and AI features to enhance data understanding
  • Role-based access control to segregate data ownership and management
  • Big Data ingestion and analytics platform for large-scale enterprise
  • Reporting, dashboarding and intelligent visualisation capabilities
  • Scaleable, extensible architecture models endorsed by Splunk

Benefits

  • Monitor application, system, network and infrastructure performance against SLAs
  • Consolidate data into one centralised platform accessible to all stakeholders
  • Real-time analytics and intelligence to increase operational availability
  • Detect and reduce internal and external cyber threats/abuse
  • Detect and respond proactively to data-driven scenarios
  • Proactively monitor clients/users understand and anticipate their needs
  • Increase security and network management assets productivity
  • Consolidate capabilities, reduce platform and application specific tools
  • Data Strategists, Data Engineers and Splunk Accredited Consultants
  • Analyse machine data from systems with varying formats.

Pricing

£1,695.00 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@networkology.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 7 7 5 0 9 0 7 1 6 4 6 9 6 6

Contact

Networkology Ltd David Owen
Telephone: 01249700084
Email: tenders@networkology.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None
System requirements
  • Supported on Physical and Virtualised hardware
  • Linux and Windows Operating Systems
  • AWS, Azure, GCP and Oracle Cloud Service profiles supported
  • Splunk Cloud platform hosted in multiple Cloud providers
  • Minimum Server specifications found in Splunk Documentation

User support

Email or online ticketing support
Email or online ticketing
Support response times
2 hour first response Mon-Fri 9am-5:30pm excl Bank Holidays
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We support P1-P4 incidents remotely or on site at a further cost (varies depending on the time required to resolve an issue.)

A technical account manager is supplied FOC to any business or organisation acquiring Networkology's software or services.

You have access to a cloud support engineer Mon-Fri 9am-5:30pm (not dedicated.)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Splunk can provide free evaluation licences. We can provide Professional Services to help plan and execute your deployment and offer a full catalogue of training services to support the deployment.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
The Splunk tool provides analysis and visualisation of data from various sources. There are various options to enable extraction of data, or dual-feeding of data to another platform before contract ends.
End-of-contract process
If a licence is terminated we can provide Professional Services at extra cost to help the Buyer to migrate their analytics need to another supplier.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
If it is through a web browser the functionality is the same.
If it is through the Splunk Mobile App custom visualisations do not work.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
The Splunk Enterprise REST API provides methods for accessing every feature in our product. Your program talks to Splunk Enterprise using HTTP or HTTPS, the same protocols that your web browser uses to interact with web pages, and follows the principles of Representational State Transfer (REST).
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Splunk application sits within the buyers' own infrastructure or within the infrastructure of their chosen Cloud Provider. Splunk consumes data from sources within the buyer's environments and services. Users are able to configure the application to consume target data-sources, and produce dashboards to the visualise the business data. Configuration can be performed through Splunk Web, Splunk's Command Line Interface (CLI), Splunk's REST API and directly in configuration files.

Scaling

Independence of resources
Splunk either resides within the buyers own infrastructure or the infrastructure of their chosen cloud provider, and therefore resources are within the buyers control. We can assist with Professional Services to analyse user demands on the service.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Splunk

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Other
Other data at rest protection approach
Splunk's own cloud service uses logical data separation, authenticated user accounts, industry standard hardening and accredited to SOC2 Type II. Data in transit is encrypted with industry standard SSL and data at rest is encrypted with AES 256-bit encryption, complying government standards (e.g. HIPAA). This service is acccredited to ISO 270001 standards. We can help the buyer to enable a similar configuration suitable for their data at rest protection.
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
There are many ways that a user can export data. Splunk provides a REST API to export data. Data can be exported by the Splunk Web facility. Users can use the Command Line Interface, SDK's and data forwarding tools.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • JSON
  • Raw data
  • Any human readable log-source or format
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • JSON
  • Raw data
  • Any human readable log-source or format

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
Splunk sits within the Buyers network or the infrastructure of their chosen cloud provider. Data protection between networks is the responsibility of the buyer or their cloud provider.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network
Splunk sits within the Buyers network or the infrastructure of their chosen cloud provider. There is no connection between Splunks networks and those of the buyer. Data protection between networks is the responsibility of the buyer or their cloud provider.

Availability and resilience

Guaranteed availability
Splunk either resides with the buyer's infrastructure or the infrastructure of their chosen cloud provider. Availability is controlled by the buyer or their cloud provider.
Approach to resilience
Splunk either resides with the buyer's infrastructure or the infrastructure of their chosen cloud provider. Resilience is the responsibility of the buyer or their cloud provider.
Outage reporting
Splunk either resides with the buyer's infrastructure or the infrastructure of their chosen cloud provider. Outage reporting is the responsibility of the buyer or their cloud provider.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Splunk sits in the buyers infrastructures or their cloud service provider of choice. In both instances the Splunk user authentication system allows the assignment of roles which require custom permissions. Admin, Power and User are roles set by default. The buyer can define other roles using a list of capabilities. Splunk authentication is enabled by default in Splunk Enterprise.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
28/01/2020
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
This offering is for cloud capable software for the buyer to deploy how they chose either inside their network as a private or hybrid cloud or within the infrastructure of their cloud service provider. Therefore the information security policies and processes will remain the responsibility of the buyer or their service provider. However, we understand the requirements for security policies and processes. Our Cloud based service uses third-party validation of our processes and policies and efforts to safeguard customer data to industry standards worldwide. Working with our audit partners, ISO 27001 certification is completed for Splunk Cloud customer environments provisioned for data ingestion of over 20GB/day

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Splunk sits within the buyer's infrastructure or their chosen cloud provider, Configuration and change management is the responsibility of the buyer or their cloud service supplier.
Vulnerability management type
Undisclosed
Vulnerability management approach
Splunk sits within the buyer's infrastructure or their chosen cloud service provider and therefore they control their vulnerability management process. However we have a robust process for threats to the Splunk platform . We maintain a policy of evaluating all potential security vulnerabilities that are discovered internally or externally within two business days of discovery. We use the industry standard CVSSv2 to rate vulnerabilities. In the case of critical risk, high impact vulnerabilities, Splunk will make all reasonable effort to supply patches, assuming that patches are a viable stop-gap for customers who cannot otherwise upgrade Splunk.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Splunk sits within the buyer's infrastructure or their chosen cloud provider, therefore protective monitoring is the responsibility of the buyer or their cloud service supplier.
Incident management type
Supplier-defined controls
Incident management approach
Splunk sits within the buyer's infrastructure or their chosen cloud service provider and therefore incident management policy and approach is the responsibility of the buyer or their cloud service provider.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Networkology is a Carbon Negative company. Our contributions to the environment via Carbon Neutral Britain offset more than 100% of our impact to the environment. In addition to this Networkology is a virtual first company which results in significantly less impact to the environment than a standard office based company.

Networkology is accredited to ISO 14001, which provides us with a framework to protect the environment and respond to changing environmental conditions in balance with socio-economic needs.

Our G-Cloud service provisions allow us to continue to exceed our environmental goals through the use of distributed cloud-based technologies, which are much more environmentally friendly than traditional computing alternatives that rely heavily on on-premise infrastructure. Our service provisions also provide us with continuing real-world examples to help influence our supply chains and staff with regards to responsible stewardship of the environment.

Covid-19 recovery

As a company that has been operating virtually since April 2018 the pandemic had little impact to our service offerings and operations. We successfully managed to keep our staff safe and met all customer obligations and took our own experience of operating remotely to many of our customers that had not yet made the step to operating virtually, ensuring their services have continued to operate fully through positive collaboration. Networkology continues to follow all government advice and supplements this with professional guidance from a partner organisation, which has ensured all of our implemented measures keep both our staff and customers safe during the pandemic.

We have supported staff that have needed to recover from COVID-19 and that have needed to shield during the pandemic by offering flexible working arrangements and adapting working practices to meet their needs at the time. During the pandemic, Networkology has been actively recruiting staff from across the UK, particularly those impacted in some way by the pandemic. Our work with the Governments Kickstart team is an example of this, where we advertised multiple roles. We also ensured we developed our own supply chains so that we could navigate the impacts and shortages being experienced in some areas, whilst ensuring supply chain security was kept at the high standards we require and inline with our ISO 9001 accreditation.

Tackling economic inequality

Networkology is a Disability Confident and a Real Living Wage employer.

The Real Living Wage is based on the cost of living and is voluntarily paid by employers that believe we all need a wage that meets our everyday needs. Being a Real Living Wage employer means that we will always pay more than the National Wage and is the only wage rate based upon what people need to live.

The Disability Confident scheme supports employers to make the most of the talents disabled people can bring to your workplace. Being a Disability Confident employer means that we offer inclusive and accessible recruitment, we will offer an interview to disabled people and we will support our existing employees.

Both of these schemes allow us to engage and support those who face barriers to employment or are struggling with the cost of living.

Our G-Cloud service provisions allow us to maintain and grow our supply chains, which already consists of many small organisations (SMEs), which helps support economic growth and business creation. Our ISO9001 accredited processes ensure that our supply chain is fully collaborative and that we responsibly work with our suppliers to jointly deliver products and solutions.

Networkology are both ISO27001 and Cyber Essentials Plus certified which demonstrates our dedicated to identifying and managing Cyber security risks within our supply chain.

Equal opportunity

Networkology is an equal opportunities employer. We ensure that all workers are treated appropriately and fairly and that, all things being equal, no candidate is treated unfairly because of their age, gender, race, sexuality or any other protected characteristic. Networkology also operates a veteran recruitment programme, NetVets. We recognise and value the unique combination of skills and attributes that veterans and service leavers possess. Our strong focus on defence and the public sector, combined with our core values allows us to offer a working environment perfectly suited to those looking to leave the services and continue their career as civilians.

Networkology is a Disability Confident and a Real Living Wage employer.

The Real Living Wage is based on the cost of living and is voluntarily paid by employers that believe we all need a wage that meets our everyday needs. Being a Real Living Wage employer means that we will always pay more than the National Wage and is the only wage rate based upon what people need to live.

The Disability Confident scheme supports employers to make the most of the talents disabled people can bring to your workplace. Being a Disability Confident employer means that we offer inclusive and accessible recruitment, we will offer an interview to disabled people and we will support our existing employees.

Wellbeing

Networkology promotes home working and employee independence over traditional office-based inflexible practices. Whilst this is great, we do acknowledge that this approach, combined with the continuing challenging global situation can have an impact on mental health, the impact of which varies from person to person. Sometimes we all need human interaction, if only to offload about our weekend or subjects that are nothing to do with work. This is why we introduced the Oasis. Quite simply, it’s a weekly virtual session where people can gather and chat freely, with no agenda, rules or expectations.

We also offer a number of social events run throughout the year to give staff and their families an opportunity to meet up and enjoy time away from work in a relaxed, friendly environment.

To further support our staff in their day to day activities we provide a managed Knowledge Base library where the collective Networkology Knowledge is shared and regularly built upon, meaning that any of our staff working on-site with a client has near-instant access to the combined knowledge and support of the organisation.

We also operate internal mentoring programmes to help coach and train junior members of the company in their roles, thus ensuring that all staff have clear career opportunities and are adequately supported in achieving their goals.

Pricing

Price
£1,695.00 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full capability of a Splunk Enterprise license for 60 days allowing indexing up to 500MB/day. This can be converted to a perpetual Free license or the buyer can purchase an Enterprise license to continue using the expanded functionality designed for multi-user deployments.
Link to free trial
https://www.networkology.com/splunkfreetrial/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@networkology.com. Tell them what format you need. It will help if you say what assistive technology you use.