

One of the biggest most promising trends in the security business today is this unison of data analytics and security in one happy package. A number of leading products have implemented analytics into their security platform and it figures to be a big field yet again in 2014. Perhaps none of these examples may be as interesting as Splunk, who finds themselves at the center of the current cybersecurity landscape through the use of its advanced data analytics. Splunk shares some of their perspective on the year ahead and we discussed these topics with Joe Goldberg, senior manager of product marketing at Splunk.
Goldberg sees three categories of the most key threats – nation states, cybercriminals and malicious insiders. In the paradigm of the classic APT bucket, the challenge is that these attacks are not signature based, so relying on signature-based tools is a losing proposition. The enterprise needs an advanced technology to detect and react to these types of threats. That means investment in better tools, and investment in security practitioners. Splunk’s growth is well over 50% from year to year with more than 6400 customers, 2500 which are security customers and Gartner distinguishes them as the fastest growing SIEM vendor. Analytic security is taking off like wildfire and the only gap that Goldberg sees is the availability of security personnel needed to run them. That’s the case with a lot of tools in the industry with options abound, but a dearth of qualified people to properly deploy them. That will be a big movement for 2014 as outlined in the predictions, and a premium will be put on finding talent that is familiar with and can think like a cybercriminal does. There will be more hiring of “red teams”, that is specialized teams of hackers for hire that execute advanced penetration testing.
Whether it’s bleeding-edge applications, SCADA devices or the burgeoning Internet of Things, while these all should be properly written and hardened prior to production, sometimes that’s just not possible. Many could have been written ten or fifteen years ago, so having Splunk as a tool for anomalous event detection is critical for the evolving enterprise. Additionally, some 80% of advanced attacks are sourced to things like spearphishing or social engineering. These are extremely difficult to defend against without analytics. By determining what’s normative baseline behavior, real-time detection of deviations is possible, and one can even predict what should be happening in an environment based on these standards. So the collection and analysis of data is great and all, but the real trick comes in accurate detection and analysis of what is a threat, because there is a lot of data to sift through.
Goldberg points out how nascent this is, as security is only 30% of the company’s business. The rest is composed of ops and management, still they all bleed together because all data is security relevant. As we’ve seen, sometimes fingerprints of advanced malware are performance based and thus Splunk’s capabilities become that much more critical.
Splunk is seeing a number of competitors in the security analytics game, but Goldberg points out that they tend to be disparate products that are bolted together. Known as “FrankenSIEMs” in certain circles, they certainly look great in marketing documents, but when compared to Splunk’s unified UI and datastore the differentiation is very clear. Splunk also features big data architecture, incorporating any kind of machine data from any source, indexing all of it and implementing very fast search. Some customers index as much as 100TB of data a day, and can return search results on this data in seconds or minutes. The use cases for Splunk go beyond just security and are a good point of investment. In some cases customers are even using it for real-time fraud detection.
Goldberg says that Splunk is also easy for the enterprise to consume. All it takes is one guy in the organization, who is perhaps a bit more open-minded than usual, looking for a solution to a problem. It’s practical and free to download. From there the product scales on its own because it’s intuitive, easy to use and adds so much value.
“If you can use Google, then you can use Splunk”
Customers are starting to outsource this as well, through MSP service providers that are hybrid/partners that can really help out SMBs and mid-size companies that are as vulnerable and targeted a threat as any other business in the industry.
THANK YOU