Splunk Software License
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative. As Premier Splunk Reseller and Professional Services Partner BRIGHT brings 16+ years of experience and provide E2E solutions for ITOps, Security, Compliance, RiskManagement, Business analytics.
Features
- Real-time data monitoring and reporting
- Security leader in SIEM and Security Monitoring
- IT Operations alerting, monitoring and prediction
- Forecasting enabled with ML capabilities
- Business Analytics and Intelligence Use cases in all industries
- Log Management
- Continuous Compliance Automation in real time
- Anti Money Laundering and Anti Fraud Solutions
- Event and Transaction Monitoring in Real-Time
- Umbrella-like solutions for multiple Data Sources
Benefits
- Extensible data platform
- Integrated observability and security
- End-to-end data coverage
- Flexibility to ask questions of unstructured data
- Rapid time-to-action
- Modernize security operations across the hybrid, multi-cloud
- Real-time view health and performance technology stack
Pricing
£600 to £1,500 a gigabyte a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 6 8 5 9 9 8 5 5 6 0 2 2 9 4
Contact
BRIGHT CONSULTING
Monyo Monev
Telephone: +44 20 8078 0586
Email: sales@bright.consulting
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- This would be dependent on the client requirements and agreed ‘response’ service level agreement (SLA). We operate a range of different SLA models across our client base and we are flexible for any arrangements.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Bright offers flexible support services, with various options available to our clients. An SLA will be agreed at the time of negotiation. Additionally, every organisation will have a Dedicated Technical Account Manager and Success Manager assigned who will support the client as well.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We are experienced in helping the companies and organizations to transform their business with Digitalization, Security, Monitoring and Analytics initiatives and to bring business value at optimized cost. Uniquely, we offer end-to-end delivery approach including consulting, design, implementation, support, trainings and knowledge transfers incl. technical and business documentation (service design, UGs etc.), plus proactive continuous improvement of the environment and processes.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
-
- Video format
- Knowledge Transfers
- Labs and hands-on Trainings
- End-of-contract data extraction
- Splunk products allow flexible retention policies to automatically or semi-manually archive, erase or extract data at any desired point in time; all requirements for EoC data management are managed and detailed with the customer organization at the time of detailed planning.
- End-of-contract process
- All requirements could be covered at the EoC process; typically the support or implementation contracts include as well detailed scope and recommendation tackling the topic.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- You can have the same seamless experience using the mobile application, too.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
-
The Splunk platform REST API gives access to the same information and functionality available to core system software and Splunk Web.
To see a list of available endpoints and operations for accessing, creating, updating, or deleting resources, there is a detailed manual, available at splunk.com. - API documentation
- Yes
- API documentation formats
-
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Splunk is a leader in several major areas such as IT Observability, Security Monitoring and Business Analytics exactly because the splunk products are easily customized by end users. For best results, Splunk Inc. recommends the tool is customized to meet the business needs after consulting a certified splunk consultant.
Scaling
- Independence of resources
- Splunk Cloud comes with a guaranteed availability of approx. 99.9997% availability. Each environment is monitored automatically by splunk, Inc.
Analytics
- Service usage metrics
- Yes
- Metrics types
- BRIGHT is providing service/license usage metrics both with the integrated splunk Management console and via any custom metric that the customer organization would require.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- All type of organizations
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Other
- Other data at rest protection approach
- BRIGHT is protecting data according to ISO 27001 and splunk best practices
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- There are a variety of ways for administrators and users to export data - Form export, List export, URL export,Web services, Export sets, etc. Splunk is a data management platform and exports/imports practically are not limited
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Tgz
- Spl
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- All known formats
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Service Level Commitment guarantees the Splunk Cloud Services will be available 100% of the time, as measured by Splunk over each calendar quarter of the Subscription Term, and subject to the exclusions set forth in the splunk “Service Level Commitment”, published and updated on splunk.com
A Splunk Cloud Service is considered available if the Customer is able to login to its Splunk Cloud Service account and initiate a search using Splunk Software.
Splunk is providing additional credits as per schema, published at splunk.com, should the availability of the Cloud Services fails to meet 100% - Approach to resilience
- Splunk uses a range of technologies to prevent unauthorized access or compromise of Splunk’s network, servers or applications, which include such things as logical and physical controls to segment data, systems and networks. Splunk monitors demarcation points used to restrict access such as firewalls and security group enforcement points. Remote users must authenticate with two-factor authentication prior to accessing Splunk networks containing customer content.
- Outage reporting
-
- a public dashboard
- email alerts
There is a dedicated portal for filing tickets to splunk, open for partners and customers, with a continuous update on the potential incident status.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Only certain users with special roles (power users, admins) has access to management interfaces or support channels. Role segregation policy is in place according to integrated ISO control environment.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- ISO27001:2013; RINA S.p.A
- ISO/IEC 27001 accreditation date
- 20.04.2019
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 9001
- GDPR compliance
- Personnel security certifications
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- General Data Protection Regulation
- Information security policies and processes
- Remote work policy; Password management policy; Permissible Use Policy; Policy for use of personal devices; Data Encryption Policy; Clean Desk/Clean Screen Policy; Access Control Policy; Vulnerability Management Policy; BYOD Policy; Archiving and Retention Policy; Security Incident Management Procedure; User Onboarding and Off-boarding Procedure
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- BRIGHT Configuration and Change Management's processes are under integrated ISO20000 and ISO270001 management system. Details for the execution and specifics are available upon request.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- The purpose of the existing procedure and processes at BRIGHT is to outline the steps in IT vulnerability management, to ensure that appropriate tools and methodologies are used to assess vulnerabilities in systems or applications, and to provide remediation. More details are available upon request, as we continuously harden the existing environment due to external and internal factors.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Available upon request
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Splunk has an incident response plan (the Splunk Incident Response Framework) and team to assess, respond, contain and remediate (as appropriate) identified security issues, regardless of their nature (e.g., physical, cyber, product). Splunk reviews/updates the SIRF annually to reflect emerging risks and “lessons learned.”
Splunk notifies Customers without undue delay after becoming aware of a Data Breach -a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of or access to Customer Content under the applicable Agreement, including Personal Data as defined under the 2016/679 (GDPR), while being transmitted, stored or otherwise processed by Splunk.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Bright is trying to focus on the wellbeing of its employees:
Employee wellness policy
Good management
Feedback
To improve staff retention
Natural environment
Health
Pricing
- Price
- £600 to £1,500 a gigabyte a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
The trials for splunk Cloud Services are available at no cost here, after login at splunk.com here: https://www.splunk.com/en_us/download/splunk-cloud.html
The 5GB data ingestion instance is available for 14 days trial - Link to free trial
- https://www.splunk.com/en_us/download/splunk-cloud.html