Skip to main content

Help us improve the Digital Marketplace - send your feedback

BRIGHT CONSULTING

Splunk Software License

The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative. As Premier Splunk Reseller and Professional Services Partner BRIGHT brings 16+ years of experience and provide E2E solutions for ITOps, Security, Compliance, RiskManagement, Business analytics.

Features

  • Real-time data monitoring and reporting
  • Security leader in SIEM and Security Monitoring
  • IT Operations alerting, monitoring and prediction
  • Forecasting enabled with ML capabilities
  • Business Analytics and Intelligence Use cases in all industries
  • Log Management
  • Continuous Compliance Automation in real time
  • Anti Money Laundering and Anti Fraud Solutions
  • Event and Transaction Monitoring in Real-Time
  • Umbrella-like solutions for multiple Data Sources

Benefits

  • Extensible data platform
  • Integrated observability and security
  • End-to-end data coverage
  • Flexibility to ask questions of unstructured data
  • Rapid time-to-action
  • Modernize security operations across the hybrid, multi-cloud
  • Real-time view health and performance technology stack

Pricing

£600 to £1,500 a gigabyte a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@bright.consulting. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 6 8 5 9 9 8 5 5 6 0 2 2 9 4

Contact

BRIGHT CONSULTING Monyo Monev
Telephone: ‪+44 20 8078 0586
Email: sales@bright.consulting

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
This would be dependent on the client requirements and agreed ‘response’ service level agreement (SLA). We operate a range of different SLA models across our client base and we are flexible for any arrangements.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Bright offers flexible support services, with various options available to our clients. An SLA will be agreed at the time of negotiation. Additionally, every organisation will have a Dedicated Technical Account Manager and Success Manager assigned who will support the client as well.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We are experienced in helping the companies and organizations to transform their business with Digitalization, Security, Monitoring and Analytics initiatives and to bring business value at optimized cost. Uniquely, we offer end-to-end delivery approach including consulting, design, implementation, support, trainings and knowledge transfers incl. technical and business documentation (service design, UGs etc.), plus proactive continuous improvement of the environment and processes.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Video format
  • Knowledge Transfers
  • Labs and hands-on Trainings
End-of-contract data extraction
Splunk products allow flexible retention policies to automatically or semi-manually archive, erase or extract data at any desired point in time; all requirements for EoC data management are managed and detailed with the customer organization at the time of detailed planning.
End-of-contract process
All requirements could be covered at the EoC process; typically the support or implementation contracts include as well detailed scope and recommendation tackling the topic.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
You can have the same seamless experience using the mobile application, too.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
The Splunk platform REST API gives access to the same information and functionality available to core system software and Splunk Web.

To see a list of available endpoints and operations for accessing, creating, updating, or deleting resources, there is a detailed manual, available at splunk.com.
API documentation
Yes
API documentation formats
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Splunk is a leader in several major areas such as IT Observability, Security Monitoring and Business Analytics exactly because the splunk products are easily customized by end users. For best results, Splunk Inc. recommends the tool is customized to meet the business needs after consulting a certified splunk consultant.

Scaling

Independence of resources
Splunk Cloud comes with a guaranteed availability of approx. 99.9997% availability. Each environment is monitored automatically by splunk, Inc.

Analytics

Service usage metrics
Yes
Metrics types
BRIGHT is providing service/license usage metrics both with the integrated splunk Management console and via any custom metric that the customer organization would require.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
All type of organizations

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Other
Other data at rest protection approach
BRIGHT is protecting data according to ISO 27001 and splunk best practices
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
There are a variety of ways for administrators and users to export data - Form export, List export, URL export,Web services, Export sets, etc. Splunk is a data management platform and exports/imports practically are not limited
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Tgz
  • Spl
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
All known formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Service Level Commitment guarantees the Splunk Cloud Services will be available 100% of the time, as measured by Splunk over each calendar quarter of the Subscription Term, and subject to the exclusions set forth in the splunk “Service Level Commitment”, published and updated on splunk.com
A Splunk Cloud Service is considered available if the Customer is able to login to its Splunk Cloud Service account and initiate a search using Splunk Software.
Splunk is providing additional credits as per schema, published at splunk.com, should the availability of the Cloud Services fails to meet 100%
Approach to resilience
Splunk uses a range of technologies to prevent unauthorized access or compromise of Splunk’s network, servers or applications, which include such things as logical and physical controls to segment data, systems and networks. Splunk monitors demarcation points used to restrict access such as firewalls and security group enforcement points. Remote users must authenticate with two-factor authentication prior to accessing Splunk networks containing customer content.
Outage reporting
- a public dashboard
- email alerts
There is a dedicated portal for filing tickets to splunk, open for partners and customers, with a continuous update on the potential incident status.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Only certain users with special roles (power users, admins) has access to management interfaces or support channels. Role segregation policy is in place according to integrated ISO control environment.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
ISO27001:2013; RINA S.p.A
ISO/IEC 27001 accreditation date
20.04.2019
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • ISO 9001
  • GDPR compliance
  • Personnel security certifications

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
General Data Protection Regulation
Information security policies and processes
Remote work policy; Password management policy; Permissible Use Policy; Policy for use of personal devices; Data Encryption Policy; Clean Desk/Clean Screen Policy; Access Control Policy; Vulnerability Management Policy; BYOD Policy; Archiving and Retention Policy; Security Incident Management Procedure; User Onboarding and Off-boarding Procedure

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
BRIGHT Configuration and Change Management's processes are under integrated ISO20000 and ISO270001 management system. Details for the execution and specifics are available upon request.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The purpose of the existing procedure and processes at BRIGHT is to outline the steps in IT vulnerability management, to ensure that appropriate tools and methodologies are used to assess vulnerabilities in systems or applications, and to provide remediation. More details are available upon request, as we continuously harden the existing environment due to external and internal factors.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Available upon request
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Splunk has an incident response plan (the Splunk Incident Response Framework) and team to assess, respond, contain and remediate (as appropriate) identified security issues, regardless of their nature (e.g., physical, cyber, product). Splunk reviews/updates the SIRF annually to reflect emerging risks and “lessons learned.”
Splunk notifies Customers without undue delay after becoming aware of a Data Breach -a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of or access to Customer Content under the applicable Agreement, including Personal Data as defined under the 2016/679 (GDPR), while being transmitted, stored or otherwise processed by Splunk.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

Bright is trying to focus on the wellbeing of its employees:
Employee wellness policy
Good management
Feedback
To improve staff retention
Natural environment
Health

Pricing

Price
£600 to £1,500 a gigabyte a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
The trials for splunk Cloud Services are available at no cost here, after login at splunk.com here: https://www.splunk.com/en_us/download/splunk-cloud.html

The 5GB data ingestion instance is available for 14 days trial
Link to free trial
https://www.splunk.com/en_us/download/splunk-cloud.html

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@bright.consulting. Tell them what format you need. It will help if you say what assistive technology you use.