

Security is a major issue in the tech world, as well as a top priority for technology consumers. Tools that allow companies to detect threats before they strike are a vital part of any serious security program. To that end, Splunk Inc. is moving into the security world by using the power of aggregated data to discover the traces of a potential breach before the company is compromised.
To talk about the implications of data-driven security, John Furrier and Jeff Frick, cohosts of theCUBE, from the SiliconANGLE Media team, spoke to David Monahan, research director of security and risk management with Enterprise Management Associates, Inc. (EMA), at the Splunk .conf2015 conference.
The conversation started with a quick discussion about how Splunk fits into the market for security. Monahan agreed that the space was huge. He also explained how Splunk fit in as part of the security ecosystem. Splunk uses data aggregation and analytic technology to find potential concerns by pulling together data from multiple sources. Companies can leverage Splunk for additional capability using the data they already gather and use.
The important thing is that Splunk doesn’t replace the current technology a company uses. Instead, Splunk augments what’s already there, allowing a business to preserve their original capital investment. This vastly reduces the total cost of ownership.
Monahan then spoke about what people are saying in the security space, both customers and businesses. He brought up surveys that showed the ability to correlate data was huge for companies, which Splunk does to help reduce false positives.
He also pointed out that companies are very concerned about their employee needs, and look to do more with less in this area, seeking tools that help them do their work with fewer, or less experienced, people. The business community also is searching for ways to gain better visibility across their data silos to combine and analyze data from different sources. By applying this visibility to security, companies will be able to detect threats earlier, which is also a big concern.
Watch the full interview below, and be sure to check out more of SiliconANGLE and theCUBE’s coverage of Splunk .conf2015.
THANK YOU