Splunk Named a Leader in The Forrester Wave™: Security Analytics Platforms, Q2 2025

Security Olivia Henderson

We’re honored to share that Splunk has been named a Leader in The Forrester Wave™: Security Analytics Platforms, Q2 2025.

Splunk is committed to power the SOC of the Future by providing a unified threat detection, investigation, and response (TDIR) experience — no matter their deployment requirements. We are proud to help organizations strengthen their digital resilience with increased visibility, accurate detections, and integrated, automated workflows delivered through a unified platform so that they can navigate their security challenges.

Splunk Has Been Recognized With the Top Score in the Current Offering Category

We received the highest possible scores from the Forrester evaluation in the following criteria:

According to the Forrester report, “Splunk maintains its strategic focus on data, where it is strongest: accessing it, applying the right analytics, and accelerating actions across IT and security…Enterprise Security’s latest release unified Splunk’s security orchestration, automation, and response (SOAR) for a more seamless analyst workflow. Its analytics — scheduled queries and streaming analytics — show up in risk-based alerting, so users can build correlation rules.”

We are extremely grateful to our customers and partners for making this recognition possible. Access The Forrester Wave™: Security Analytics Platforms, Q2 2025 to learn more about how Splunk Enterprise Security stacks up, visit our website or take a product tour.

Forrester does not endorse any company, product, brand, or service included in its research publications and does not advise any person to select the products or services of any company or brand based on the ratings included in such publications. Information is based on the best available resources. Opinions reflect judgment at the time and are subject to change. For more information, read about Forrester’s objectivity here.

Related Articles

Process Hunting with PSTree
Security
5 Minute Read

Process Hunting with PSTree

This tutorial shows how to use the pstree command & app to help you look through all the processes you have to investigate.
From Water to Wine: An Analysis of WINELOADER
Security
9 Minute Read

From Water to Wine: An Analysis of WINELOADER

In this blog post we'll look closely at the WINELOADER backdoor and how Splunk can be used to detect and respond to this threat.
You Bet Your Lsass: Hunting LSASS Access
Security
13 Minute Read

You Bet Your Lsass: Hunting LSASS Access

Dive in as the Splunk Threat Research Team shares how Mimikatz, and a few other tools found in Atomic Red Team, access credentials via LSASS memory.