Cribl
Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy. Powered by a data processing engine purpose-built for IT and Security, Cribl’s product suite is a vendor-agnostic data management solution. bssgc
Features
- Cribl Stream = data processing engine
- edge-based collection system for logs, metrics and application data
- perform federated search-in-place queries on any data, anywhere
- Cribl Lake = cost-effective data lake
Benefits
- Choice = Remove data vendor lock-in
- Optimised data storage = lower storage costs
- Control = enforce data policies, standards, and formats across toolsets
- Increase operational efficiency = streamline monitoring
- Reduce time / costs of data management
- Reduce complexity = replace multiple legacy agents
- Get access to all o11y and security data
- Reduce operational overhead = streamline deployment and management
Pricing
£0.27 a gigabyte a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 0 5 9 2 6 6 5 3 9 2 3 5 7 7
Contact
Bytes Software Services
Chris Swani
Telephone: +44 (0) 7951 326815
Email: tenders@bytes.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
"Stream = any system that you collect and send data to
Edge = universal agent for all logs, metrics and application data
Search = federated search-in-place across all systems
Lake = reduce operational overhead of your data lake" - Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
- Please see details here: https://docs.cribl.io/stream/deploy-planning/
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times cn be found here: https://cribl.io/support/
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- None
- Onsite support
- Yes, at extra cost
- Support levels
- Please see: https://cribl.io/support/
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
"Cribl has multiple tiers of the Stream product: Free (on-prem), Free (Cloud), Standard, Enterprise or Cribl.Cloud.
Cribl provide all training free-of-charge, with multiple hands-on sandboxes and exploratory online course available through https://sandbox.cribl.io/" - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Cribl Stream provides a data-pipeline for routing event data from sources to destinations. Data held within Stream is purely for configuration purposes, and can be extracted at contract-end time. Event data can be archived using Stream, this data is saved to a location chosen by the customer and therefore can be extracted and retained by the customer outside of the contract.
- End-of-contract process
- SeeSection 6 of our subscription services agreement: https://cribl.io/legal/archived-terms/
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- Yes
- What users can and can't do using the API
- Please see: https://docs.cribl.io/stream/api-tutorials/
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. Stream ingests data from within the buyer's infrastructure. Administrators of the Cribl Stream instance(s) can customise and configure the application to consume target data-sources, filter and transform the events, enrich and enhance via knowledge lookups, and forward to one or more destinations. The pipeline is configurable with inbuilt features and functionality. Configuration can be performed through Stream's user interface, API or through the underlying configuration files. Cribl uses Git to manage and maintain the underlying configurations and customisations for Stream, which can be synchronised and pushed as required.
Scaling
- Independence of resources
- Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. Where the buyer is hosting the solution in their on-prem or cloud infrastructure the resources are within the buyers control. We can assist with Professional Services to analyse user demands on the service and provide recommendations to ensure the platform is configured and resources to support the user demands.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Please see: https://docs.cribl.io/stream/monitoring/
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Cribl
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Other
- Other data at rest protection approach
- The buyer can chose to implement Cribl Stream on their own infrastructure, or in a cloud provider of their choosing (including Cribl's own SaaS platform). Our Professional Services can provide advice and guidance on securing data-at-rest in these scenario. Cribl's own cloud service uses logical data separation, authenticated user accounts, industry standard hardening and accredited to SOC2. Data in transit is encrypted with industry standard SSL and data at rest is encrypted, complying government standards (e.g. HIPAA).
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Cribl Stream is a data observability pipeline solution. Its core functionality is to ingest from data sources and export data to target destinations in the format and protocol accepted by the target destination/service. Users or Administrators of Cribl Stream build pipelines which connect Sources to Destinations, allow the flow of data to traverse the platform and export in the desired format.
- Data export formats
- Other
- Other data export formats
-
- Splunk, Elastic, Confluent Cloud, Kafka, New Relic
- Amazon Kinesis, S3 and Cloudwatch, SQS
- Azure Blob, Monitor Log, Event Hub
- Google Cloud Chronicle, Stoage and Pub/Sub
- Syslog, SNMP, Filesystem, NFS
- StatsD and StatsD Extended
- DataDog, MinIO, Wavefront, SignalFX, Sumo Logic
- InfluxDB, Grafana, Prometheus, Loki
- Opentelemtary, Webhook, JSON and RAW (Replay)
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Syslog
- TCP JSON and TCP RAW
- Splunk TCP/HEC
- SNMP
- HTTPS (Bulk and Raw)
- Prometheus
- Amazon Kinesis Firehose
- Elasticsearch (API)
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
-
"Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. The Buyer would take responsibility to ensure communication between the buyer's data sources and their chosen Stream platform is secure. The buyer would also take responsibility for securing data transmitted to a destination. Cribl's inter-component communications will be secured as per Cribl best practice. Cribl provide several guides to assist buyers with securing their communications.
https://docs.cribl.io/stream/securing-and-monitoring
https://docs.cribl.io/stream/securing-communications
https://docs.cribl.io/stream/securing-data" - Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
"Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. Data protection between data-sources and Stream, and Stream to the buyer's destinations is their responsibility. Cribl provide several guides and options for security incoming data, outgoing data, and inter-component communications.
https://docs.cribl.io/stream/securing-and-monitoring
https://docs.cribl.io/stream/securing-communications
https://docs.cribl.io/stream/securing-data
Networkology's Professional Services team can support the buyer to ensure their data is secured in accordance with their data security standards."
Availability and resilience
- Guaranteed availability
- Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. Availability of the infrastructure within the buyer's control is the responsibility. If the buy choses to use Cribl's own SaaS environment the availabilty is 99.9%. For further details please see section 3.6 of our terms of service: https://cribl.io/legal/archived-terms/
- Approach to resilience
- Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. Resilience of the buyer's own infrastructure (on-prem or Cloud) is the responsibility of the buyer or their cloud provider. If the buyer choses to use Cribl's SaaS platform the resilience is provided within the solution and ensures the platform is able to meet a 99.9% SLA. Information about Crib's SaaS resilience can be obtained on request.
- Outage reporting
- Cribl Stream can reside within the buyers' own infrastructure, within the infrastructure of their chosen Cloud Provider, or hosted within Cribl's own SaaS platform. Outage reporting is the responsibility of the buyer or their cloud provider when hosted on their own infrastructure. If the buyer choses to use Cribl's SaaS platform, outages are reported via email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Other
- Other user authentication
- For further details please see: https://docs.cribl.io/stream/authentication/
- Access restrictions in management interfaces and support channels
- Cribl Stream resides within the buyer's infrastructure; their chosen cloud service provider; or Cribl's SaaS platform. In all instances the Cribl Stream user authentication system allows the assignment of roles which require custom permissions. The buyer can define roles using a list of capabilities. internal authentication is enabled by default in Cribl Stream.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Other
- Description of management access authentication
- For further details please see: https://docs.cribl.io/stream/access-management/
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- A-LIGN
- ISO/IEC 27001 accreditation date
- 30/10/2023
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
"This offering enables Cribl Stream software to be deployed on a platform of the buyer's chosing - either inside their network as a private or hybrid cloud; within the infrastructure of their cloud service provider; or on Cribl's own SaaS platform.
The information security policies and processes will remain the responsibility of the buyer or their service provider when deployed outside of Cribl's SaaS platform. Networkology understand the requirements for security policies and processes, and are able to provide buyers with advice and guidance on appropriate security policies and process to follow. The would include reporting structures, policy management and enforcement, and overall policy review.
Details of Cribl's SaaS platform security policy and reporting structure is internal to their organisation, and may be available on request."
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
"Cribl Stream resides within the buyer's infrastructure; their chosen cloud provider or the Cribl Cloud SaaS platform, Configuration and change management is the responsibility of the buyer or their cloud service supplier when hosted outside the Cribl SaaS platform.
Cribl's SaaS platform maintains strict change control, with email notifactions released to cloud customers when changes are being implemented. Cribl will maintain the underlying platform and Stream application version, the configuration and customisation of the application is the responsibility of the buyer." - Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Cribl Stream resides within the buyer's infrastructure; their chosen cloud service provider; or Cribl's SaaS platform. Control of the vulnerability management process sits with the buy when Stream is implemented outsite the Cribl SaaS platform. Networkology have a robust process for threat management and assessment of vulnerabilities to Stream by evaluating all potential security vulnerabilities that are discovered internally or externally within two business days of discovery. We use the industry standard CVSSv2 to rate vulnerabilities. In the case of critical risk, high impact vulnerabilities, Cribl will make all reasonable effort to supply patches to their software.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Cribl Stream resides within the buyer's infrastructure; their chosen cloud provider; or within Cribl's SaaS platform. Protective monitoring is the responsibility of the buyer or their cloud service supplier when implemented outside of the Cribl SaaS platform.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Cribl Stream resides within the buyer's infrastructure; their chosen cloud service provider; or Cribl's SaaS platform. Incident management and associated processes for Stream implemented outside Crib's SaaS solution are the buyer's responsibility.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We take our environmental management and the impact we have on the environment very seriously. We have environmental policies in place and hold the ISO14001 accreditation. Our environmental assessments are conducted annually by an external Lead ESOS Assessor; they are signed-off by the board and compliance reported to the regulator (the Environment Agency). Our environmental policy is published on our website at https://www.bytes.co.uk/company/sustainability/environmental.
Bytes achieved carbon net zero in March 2022 through approved carbon offsetting schemes. We are always seeking to reduce our impact on the environment. We aim to minimise waste, reduce pollutants and use renewable materials. Our offices have recycling facilities for cans, plastic and paper. We aim to reduce our office printing to zero within the next few years.
An Environmental Steering Committee has been established to coordinate environmental activities and drive change.
To drastically reduce our emissions, we have switched to renewable energy. Our Head Office has reached our first milestone of using a specialist 100% renewable electricity provider. We are also exploring options to install solar panels on our Headquarters building.
Other environmental initiatives include installing electric vehicle charging points and encouraging staff to commute to work without the car (setting up a car share network and installing secure cycle parking).
We produce a SECR (Streamlined Energy and Carbon Reporting) report that details the companies energy consumption and carbon emissions. This report is produced annually by an independent assessor.
This report provides details of our emissions in Scope 1, 2 and 3 categories. It details the activities previously taken to reduce emissions and also recommendations for further improvements.
For scope 1,2 and 3 emissions we aim to reduce these by 50% by 2025-2026 from our 2021 baseline.
We aim to be Net Zero by 2040, covering our own operational emissions.
Pricing
- Price
- £0.27 a gigabyte a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- https://cribl.io/cribl-cloud/try-cribl-cloud/
- Link to free trial
- https://cribl.io/cribl-cloud/try-cribl-cloud/