Splunk is a Leader and Placed Highest in Execution in the Gartner® Magic Quadrant™ for SIEM

We are honored to share that Splunk has once again been named a Leader in the 2025 Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM)our eleventh consecutive placement. Even more meaningful to us, Splunk was placed highest in Ability to Execute in our opinion, underscoring our relentless commitment to helping security teams stay ahead in today’s rapidly evolving threat landscape. This recognition is not just about Splunk. It’s about you—our customers—who have been on this journey with us from the very beginning.

Our Journey Together: Redefining the Next Era for the SOC

In the mid-2010s, we launched Splunk Enterprise Security (ES) with a bold vision: to give security teams a SIEM that could handle any data, at any scale, and make it immediately useful for security. That vision quickly grew into reality—reshaping how SOCs detect, investigate, and respond to threats.

From those early days of schema-on-the-fly SIEM to today’s AI-powered SecOps platform, the journey has always been a collaborative one. Each milestone was shaped by your real-world challenges—managing explosive data growth, defending against increasingly sophisticated threats, overcoming analyst shortages, and reducing alert fatigue.

Your feedback, your trust, and your partnership have pushed us to evolve faster and smarter. Together, we’ve built not only a product, but a movement—driving the future of security operations into the agentic AI era.

Executing on our Shared Vision

At .conf25, we unveiled the next chapter of Splunk Enterprise Security: a unified, AI-powered SecOps platform that simplifies the analyst experience and delivers faster, smarter outcomes across the entire threat detection, investigation, and response (TDIR) workflow. Here are just a few of the innovations we’ve recently introduced—shaped directly by customer feedback:

Simplifying the Analyst Experience With Unified Workflows

Expanding Detection and Visibility

Accelerating the SOC with AI and Agentics

Splunk delivers AI that works the way your SOC works—purpose-built AI embedded across the entire analyst workflow, rooted in operational reality, and measurable outcomes. Highlights include:

Thank You for Being Part of This Journey

None of this would be possible without you—our customers, partners, and community. Your trust, collaboration, and feedback have fueled every milestone on this journey.

Being recognized as a Leader in the Gartner Magic Quadrant for 11 years in a row is not just a Splunk achievement—it’s a shared success story with every security team that chose to build resilience with us.

As we look ahead to the agentic AI era, our focus remains the same: empowering SOCs to end analyst fatigue, deliver faster outcomes, reduce risk, and build stronger resilience—together.

From all of us at Splunk: thank you. Here’s to the next chapter of our journey.

Join our live webinar and demo on October 22 to learn how to end SOC analyst fatigue with the reimagined Splunk Enterprise Security. Don’t miss out!

Get Your Copy of the 2025 Magic Quadrant for SIEM

To our customers and partners, thank you for making this recognition possible. Download your complimentary copy of the 2025 Gartner® Magic Quadrant™ today to learn more about why Splunk was recognized. To learn more about Splunk Enterprise Security, visit our website or take a tour.

* In Alpha where available

** Triage Agent, AI Playbook Authoring, Response Importer, AI-Enhanced Detection Library and Personalized Detection SPL Generator will be available in 2026.

GARTNER is a registered trademark and service mark of Gartner and Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Splunk.

Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.