Splunk Named a Leader in Gartner SIEM Magic Quadrant for the Fifth Straight Year

Security Splunk

Gartner has published the 2017 Magic Quadrant for Security Information and Event Management and Splunk was named a leader for the fifth straight year.

In the report, Gartner placed Splunk in the Leaders quadrant and recognized Splunk for its ability to execute and completeness of vision.

Ongoing Customer Success With Analytics-Driven Security

Our analytics-driven SIEM, Splunk Enterprise Security—in addition to being used by customers for security monitoring, advanced threat detection, forensics and incident response—addresses a wide range of security analytics use cases for organizations of all sizes and maturity.

Customers use Splunk Enterprise Security to replace their legacy SIEM, as their first SIEM and to solve use cases that their legacy security tools fail to do.

Another trend is the rapid adoption of Splunk Enterprise Security with our SaaS offer, Splunk Cloud, to improve threat identification, risk mitigation, reduce remediation cycle times and demonstrate regulatory compliance.

In addition to adopting Splunk Enterprise Security as their SIEM, thousands of customers are using our analytics-driven security portfolio, which includes Splunk® Enterprise (Splunk Cloud), Splunk Enterprise Security, Splunk User Behavior Analytics, Splunk Stream and more than 600 Splunk and partner apps!

Get Your Copy of the 2017 SIEM Magic Quadrant

Register for a complimentary copy of the 2017 Gartner Magic Quadrant for SIEM today!

Are you in a hurry to get started with SIEM replacement? Learn how four customers—a financial services firm, a luxury retailer and two government agenciesreplaced their legacy SIEMs using Splunk. Contact our Security Specialists if you have any questions on how Splunk can help.

Thanks,

Girish Bhat
Director, Security Product Marketing
Splunk LLC

Follow @girishb

Follow @splunk

This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Splunk.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

----------------------------------------------------
Thanks!
Girish Bhat

Related Articles

CISA Top Malware Summary
Security
8 Minute Read

CISA Top Malware Summary

This blog summarizes the Splunk Threat Research Team’s (STRT) recent review of the CISA Top 10 Malware strains for the year 2021 report.
SUPERNOVA Redux, with a Generous Portion of Masquerading
Security
10 Minute Read

SUPERNOVA Redux, with a Generous Portion of Masquerading

A review of the Pulse Secure attack where the threat actor connected to the network via a the Pulse Secure virtual private network (VPN), moved laterally to its SolarWinds Orion server, installed the SUPERNOVA malware, and collected credentials, all while masquerading the procdump.exe file and renamed it as splunklogger.exe.
Introducing the PEAK Threat Hunting Framework
Security
4 Minute Read

Introducing the PEAK Threat Hunting Framework

Introducing the PEAK Threat Hunting Framework, bringing a fresh perspective to threat hunting and incorporating three distinct types of hunts.