Splunk Data Platform
Splunk monitors and analyses data from any sources to optimise your IT, security and business performance through operational intelligence and insights. This offering includes Enterprise, Clouds, Enterprise Security (SIEM), SOAR (Orchestration), IT Service Intelligence (ITSI), Observability (APM), and Splunk's Edge Hub solution.
Features
- Collects and indexes log and machine data from any source
- Powerful search, analysis and visualization capabilities empower users
- Fraud and cyber threat detection analysis
- Real time analysis for operational intelligence and business reporting
- Information governance, assurance and compliance analysis
- Machine learning and AI features to enhance data understanding
- Role-based access control to segregate data ownership and management
- Big Data ingestion and analytics platform for large-scale enterprise
- Reporting, dashboarding and intelligent visualisation capabilities
- Scaleable, extensible architecture models endorsed by Splunk
Benefits
- Monitor application, system, network and infrastructure performance against SLAs
- Consolidate data into one centralised platform accessible to all stakeholders
- Real-time analytics and intelligence to increase operational availability
- Detect and reduce internal and external cyber threats/abuse
- Detect and respond proactively to data-driven scenarios
- Proactively monitor clients/users understand and anticipate their needs
- Increase security and network management assets productivity
- Consolidate capabilities, reduce platform and application specific tools
- Data Strategists, Data Engineers and Splunk Accredited Consultants
- Analyse machine data from systems with varying formats.
Pricing
£1,695.00 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 7 7 5 0 9 0 7 1 6 4 6 9 6 6
Contact
Networkology Ltd
David Owen
Telephone: 01249700084
Email: tenders@networkology.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- Supported on Physical and Virtualised hardware
- Linux and Windows Operating Systems
- AWS, Azure, GCP and Oracle Cloud Service profiles supported
- Splunk Cloud platform hosted in multiple Cloud providers
- Minimum Server specifications found in Splunk Documentation
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 2 hour first response Mon-Fri 9am-5:30pm excl Bank Holidays
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We support P1-P4 incidents remotely or on site at a further cost (varies depending on the time required to resolve an issue.)
A technical account manager is supplied FOC to any business or organisation acquiring Networkology's software or services.
You have access to a cloud support engineer Mon-Fri 9am-5:30pm (not dedicated.) - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Splunk can provide free evaluation licences. We can provide Professional Services to help plan and execute your deployment and offer a full catalogue of training services to support the deployment.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The Splunk tool provides analysis and visualisation of data from various sources. There are various options to enable extraction of data, or dual-feeding of data to another platform before contract ends.
- End-of-contract process
- If a licence is terminated we can provide Professional Services at extra cost to help the Buyer to migrate their analytics need to another supplier.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
If it is through a web browser the functionality is the same.
If it is through the Splunk Mobile App custom visualisations do not work. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- The Splunk Enterprise REST API provides methods for accessing every feature in our product. Your program talks to Splunk Enterprise using HTTP or HTTPS, the same protocols that your web browser uses to interact with web pages, and follows the principles of Representational State Transfer (REST).
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Splunk application sits within the buyers' own infrastructure or within the infrastructure of their chosen Cloud Provider. Splunk consumes data from sources within the buyer's environments and services. Users are able to configure the application to consume target data-sources, and produce dashboards to the visualise the business data. Configuration can be performed through Splunk Web, Splunk's Command Line Interface (CLI), Splunk's REST API and directly in configuration files.
Scaling
- Independence of resources
- Splunk either resides within the buyers own infrastructure or the infrastructure of their chosen cloud provider, and therefore resources are within the buyers control. We can assist with Professional Services to analyse user demands on the service.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Splunk
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Other
- Other data at rest protection approach
- Splunk's own cloud service uses logical data separation, authenticated user accounts, industry standard hardening and accredited to SOC2 Type II. Data in transit is encrypted with industry standard SSL and data at rest is encrypted with AES 256-bit encryption, complying government standards (e.g. HIPAA). This service is acccredited to ISO 270001 standards. We can help the buyer to enable a similar configuration suitable for their data at rest protection.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- There are many ways that a user can export data. Splunk provides a REST API to export data. Data can be exported by the Splunk Web facility. Users can use the Command Line Interface, SDK's and data forwarding tools.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- JSON
- Raw data
- Any human readable log-source or format
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XML
- JSON
- Raw data
- Any human readable log-source or format
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Splunk sits within the Buyers network or the infrastructure of their chosen cloud provider. Data protection between networks is the responsibility of the buyer or their cloud provider.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection within supplier network
- Splunk sits within the Buyers network or the infrastructure of their chosen cloud provider. There is no connection between Splunks networks and those of the buyer. Data protection between networks is the responsibility of the buyer or their cloud provider.
Availability and resilience
- Guaranteed availability
- Splunk either resides with the buyer's infrastructure or the infrastructure of their chosen cloud provider. Availability is controlled by the buyer or their cloud provider.
- Approach to resilience
- Splunk either resides with the buyer's infrastructure or the infrastructure of their chosen cloud provider. Resilience is the responsibility of the buyer or their cloud provider.
- Outage reporting
- Splunk either resides with the buyer's infrastructure or the infrastructure of their chosen cloud provider. Outage reporting is the responsibility of the buyer or their cloud provider.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Splunk sits in the buyers infrastructures or their cloud service provider of choice. In both instances the Splunk user authentication system allows the assignment of roles which require custom permissions. Admin, Power and User are roles set by default. The buyer can define other roles using a list of capabilities. Splunk authentication is enabled by default in Splunk Enterprise.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 28/01/2020
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- This offering is for cloud capable software for the buyer to deploy how they chose either inside their network as a private or hybrid cloud or within the infrastructure of their cloud service provider. Therefore the information security policies and processes will remain the responsibility of the buyer or their service provider. However, we understand the requirements for security policies and processes. Our Cloud based service uses third-party validation of our processes and policies and efforts to safeguard customer data to industry standards worldwide. Working with our audit partners, ISO 27001 certification is completed for Splunk Cloud customer environments provisioned for data ingestion of over 20GB/day
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Splunk sits within the buyer's infrastructure or their chosen cloud provider, Configuration and change management is the responsibility of the buyer or their cloud service supplier.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Splunk sits within the buyer's infrastructure or their chosen cloud service provider and therefore they control their vulnerability management process. However we have a robust process for threats to the Splunk platform . We maintain a policy of evaluating all potential security vulnerabilities that are discovered internally or externally within two business days of discovery. We use the industry standard CVSSv2 to rate vulnerabilities. In the case of critical risk, high impact vulnerabilities, Splunk will make all reasonable effort to supply patches, assuming that patches are a viable stop-gap for customers who cannot otherwise upgrade Splunk.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Splunk sits within the buyer's infrastructure or their chosen cloud provider, therefore protective monitoring is the responsibility of the buyer or their cloud service supplier.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Splunk sits within the buyer's infrastructure or their chosen cloud service provider and therefore incident management policy and approach is the responsibility of the buyer or their cloud service provider.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Networkology is a Carbon Negative company. Our contributions to the environment via Carbon Neutral Britain offset more than 100% of our impact to the environment. In addition to this Networkology is a virtual first company which results in significantly less impact to the environment than a standard office based company.
Networkology is accredited to ISO 14001, which provides us with a framework to protect the environment and respond to changing environmental conditions in balance with socio-economic needs.
Our G-Cloud service provisions allow us to continue to exceed our environmental goals through the use of distributed cloud-based technologies, which are much more environmentally friendly than traditional computing alternatives that rely heavily on on-premise infrastructure. Our service provisions also provide us with continuing real-world examples to help influence our supply chains and staff with regards to responsible stewardship of the environment.Covid-19 recovery
As a company that has been operating virtually since April 2018 the pandemic had little impact to our service offerings and operations. We successfully managed to keep our staff safe and met all customer obligations and took our own experience of operating remotely to many of our customers that had not yet made the step to operating virtually, ensuring their services have continued to operate fully through positive collaboration. Networkology continues to follow all government advice and supplements this with professional guidance from a partner organisation, which has ensured all of our implemented measures keep both our staff and customers safe during the pandemic.
We have supported staff that have needed to recover from COVID-19 and that have needed to shield during the pandemic by offering flexible working arrangements and adapting working practices to meet their needs at the time. During the pandemic, Networkology has been actively recruiting staff from across the UK, particularly those impacted in some way by the pandemic. Our work with the Governments Kickstart team is an example of this, where we advertised multiple roles. We also ensured we developed our own supply chains so that we could navigate the impacts and shortages being experienced in some areas, whilst ensuring supply chain security was kept at the high standards we require and inline with our ISO 9001 accreditation.Tackling economic inequality
Networkology is a Disability Confident and a Real Living Wage employer.
The Real Living Wage is based on the cost of living and is voluntarily paid by employers that believe we all need a wage that meets our everyday needs. Being a Real Living Wage employer means that we will always pay more than the National Wage and is the only wage rate based upon what people need to live.
The Disability Confident scheme supports employers to make the most of the talents disabled people can bring to your workplace. Being a Disability Confident employer means that we offer inclusive and accessible recruitment, we will offer an interview to disabled people and we will support our existing employees.
Both of these schemes allow us to engage and support those who face barriers to employment or are struggling with the cost of living.
Our G-Cloud service provisions allow us to maintain and grow our supply chains, which already consists of many small organisations (SMEs), which helps support economic growth and business creation. Our ISO9001 accredited processes ensure that our supply chain is fully collaborative and that we responsibly work with our suppliers to jointly deliver products and solutions.
Networkology are both ISO27001 and Cyber Essentials Plus certified which demonstrates our dedicated to identifying and managing Cyber security risks within our supply chain.Equal opportunity
Networkology is an equal opportunities employer. We ensure that all workers are treated appropriately and fairly and that, all things being equal, no candidate is treated unfairly because of their age, gender, race, sexuality or any other protected characteristic. Networkology also operates a veteran recruitment programme, NetVets. We recognise and value the unique combination of skills and attributes that veterans and service leavers possess. Our strong focus on defence and the public sector, combined with our core values allows us to offer a working environment perfectly suited to those looking to leave the services and continue their career as civilians.
Networkology is a Disability Confident and a Real Living Wage employer.
The Real Living Wage is based on the cost of living and is voluntarily paid by employers that believe we all need a wage that meets our everyday needs. Being a Real Living Wage employer means that we will always pay more than the National Wage and is the only wage rate based upon what people need to live.
The Disability Confident scheme supports employers to make the most of the talents disabled people can bring to your workplace. Being a Disability Confident employer means that we offer inclusive and accessible recruitment, we will offer an interview to disabled people and we will support our existing employees.Wellbeing
Networkology promotes home working and employee independence over traditional office-based inflexible practices. Whilst this is great, we do acknowledge that this approach, combined with the continuing challenging global situation can have an impact on mental health, the impact of which varies from person to person. Sometimes we all need human interaction, if only to offload about our weekend or subjects that are nothing to do with work. This is why we introduced the Oasis. Quite simply, it’s a weekly virtual session where people can gather and chat freely, with no agenda, rules or expectations.
We also offer a number of social events run throughout the year to give staff and their families an opportunity to meet up and enjoy time away from work in a relaxed, friendly environment.
To further support our staff in their day to day activities we provide a managed Knowledge Base library where the collective Networkology Knowledge is shared and regularly built upon, meaning that any of our staff working on-site with a client has near-instant access to the combined knowledge and support of the organisation.
We also operate internal mentoring programmes to help coach and train junior members of the company in their roles, thus ensuring that all staff have clear career opportunities and are adequately supported in achieving their goals.
Pricing
- Price
- £1,695.00 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full capability of a Splunk Enterprise license for 60 days allowing indexing up to 500MB/day. This can be converted to a perpetual Free license or the buyer can purchase an Enterprise license to continue using the expanded functionality designed for multi-user deployments.
- Link to free trial
- https://www.networkology.com/splunkfreetrial/