Large teams of remote workers can add tremendous pressure to both IT and Security teams, and to the infrastructure they support. Splunk has curated a list of solutions that can help facilitate this shift to remote work. These packages are easy to install and run for existing Splunk customers. Check back often as we will continue to add to this list.
Virtualized Infrastructure Availability
Get rapid observability into the services that support virtualization.
Shared Resource Availability and Usage
Help ensure that shared services remain accessible to your entire organization.
Supporting Infrastructure
Manage your infrastructure as it scales to the demands of remote access users.
- Splunk App for Infrastructure
- Splunk App for AWS
- Splunk App for Unix and Linux
- Splunk App for Windows Infrastructure
- Splunk Add-on for Amazon Web Services
- Splunk Add-on for Amazon Kinesis Firehose
- Splunk Add-on for Cisco ASA
- Splunk Add-on for Cisco Identity Services
- Splunk Add-on for Cisco UCS
- Splunk Add-on for F5 BIG-IP
- Splunk Add-on for Unix and Linux
- Splunk Add-on for Microsoft Windows
- Splunk Add-on for Microsoft Systems Center Operations Manager
- Palo Alto Networks App for Splunk
- EMC Isilon Add-on for Splunk Enterprise
- Dell EMC VMAX Add-on for Splunk
- Dell EMC ECS Add-on for Splunk
- EMC Isilon App for Splunk Enterprise
- Cisco FirePower App for Splunk
- Palo Alto Networks Add-on for Splunk
- Splunk DB Connect
- Splunk Stream
VPN Infrastructure Monitoring
Help ensure that shared services remain accessible to your entire organization.
VPN Session Status and Statistics and Client Information
Monitor the security of your VPN services by tracking connections, identifying abnormal behavior and improving the mean time to resolve any service issues.
Data Loss Detection
Help prevent data loss and leakage by monitoring for data hoarding, exfiltration and unauthorized USB device activity.
Day-Zero Malware and Threat Hunting
Monitor and investigate unusual app and process behavior, connections to new domains, and WFH networks that may be infected.
Zero-Trust Monitoring
Track and monitor off-net devices, SaaS user behavior and connections to untrusted networks.
Unapproved Applications and SaaS Visibility
Locate and identify the SaaS domains, applications, processes, and shadow-IT instances being accessed or run on devices.
Security Evasion and User Attribution
Rapidly detect which endpoint security apps or NVM's are disabled or not installed.
Asset Inventory
Create an inventory of all devices and device types, and confirm data privacy compliance.
Protect Against COVID-19 Risks
Identify and respond to potential COVID-19 phishing content. Analyze the location of employees to ensure safety.