Splunk
  • Pricing
  • Training
  • Support
    • Support Portal
    • Support Programs
    • Contact Support
    • Splunk Answers
    • Documentation
    • Product Security Updates
    • Getting Started with Splunk Software
    • Community Support
    • Splunk Services
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • 한국어
    • Português
    • Pусский
    • 简体中文
    • 繁體中文
    • Login
    • Sign Up
Splunk
  • IT
  • SECURITY
  • IoT
  • BUSINESS ANALYTICS
  • WHY SPLUNK?
  • EXPLORE
    Products | Overview
    CORE
    • Splunk Cloud
    • Splunk Enterprise
    IT OPERATIONS
    • Splunk IT Service Intelligence
    • Splunk Insights for AWS Cloud Monitoring
    • Splunk App for Infrastructure
    • VictorOps
    SECURITY
    • Splunk Enterprise Security
    • Splunk Phantom
    • Splunk User Behavior Analytics
    IoT
    • Splunk for Industrial IoT
    BUSINESS ANALYTICS
    • Splunk Business Flow
    Industries
    • Communications
    • Financial Services
    • Healthcare
    • Public Sector
    • All Industries
    Company
    • About Splunk
    • Customers
    • Partners
    • Splunk Next
    • Trek-Segafredo Partnership
    • Pricing
    • Value Calculator
    • Blogs
    • Free Trials and Downloads
    • Resources
  • Free Splunk
Splunk Free Splunk
Login | Sign Up
IT
SECURITY
IoT
BUSINESS ANALYTICS
WHY SPLUNK?
Products
Overview
  • CORE
  • Splunk Cloud
  • Splunk Enterprise
  • IT OPERATIONS
  • Splunk IT Service Intelligence
  • Splunk Insights for AWS Cloud Monitoring
  • Splunk App for Infrastructure
  • VictorOps
  • SECURITY
  • Splunk Enterprise Security
  • Splunk Phantom
  • Splunk User Behavior Analytics
  • IoT
  • Splunk for Industrial IoT
  • BUSINESS ANALYTICS
  • Splunk Business Flow
Industries
  • Communications
  • Financial Services
  • Healthcare
  • Public Sector
  • All Industries
Company
  • About Splunk
  • Customers
  • Partners
  • Splunk Next
  • Trek-Segafredo Partnership
Pricing
Value Calculator
Blogs
Free Trials and Downloads
Resources
Pricing
Training
Support
  • Support Portal
  • Support Programs
  • Contact Support
  • Splunk Answers
  • Documentation
  • Product Security Updates
  • Getting Started with Splunk Software
  • Community Support
  • Splunk Services
Languages
  • Deutsch
  • Español
  • Français
  • Italiano
  • 日本語
  • 한국어
  • Português
  • Pусский
  • 简体中文
  • 繁體中文
Public Sector

Defense and Intelligence Agencies

Listen to your data

  • Public Sector
  • |
  • Federal Civilian Agencies
  • |
  • Defense & Intelligence Agencies
  • |
  • State & Local Government

Real-Time Situational Awareness for Missions

Defense and intelligence agencies are looking to embrace technologies that can offer a competitive advantage to ensure the success of their missions—be it protecting the homeland, keeping the peace in a war-torn country or delivering humanitarian relief. All four branches of the US Military and many agencies in the intelligence community already use Splunk. With Splunk you can:

  • Continuously monitor your infrastructure and protect against advanced external and insider threats
  • Gain real-time situational awareness in theater of operations
  • Ensure mission efficiencies through performance monitoring and reporting
  • Ensure compliance with various mandates for accountability, security and procurement
  • Predict and resolve issues before they impact the mission
Get Started
  • Solution Guide Splunk for Defense
  • IT Operations Management Mining Gold from Machine Data
  • Tech Brief Smart Soldiers
  • Tech Brief Connected Vehicles in the Military
  • Tech Brief Splunk for Risk Management Framework
  • Research Challenges & Trends in Federal & Department of Defense IT Operations: United States
Splunk Enterprise Free Download
.conf
See how Mitre discovers threats by monitoring behaviors and endpoints, and how they share obtained analytics.
Watch the Presentation Read the PDF
.
News
Lockheed Martin

Monitors and analyzes IT systems and network behavior for F-35 fighter jets with Splunk Enterprise.

Read the News
.conf
NSA-IAD

Uses Splunk to understand how organizations have implemented security mitigations on their networks.

Watch the Presentation
News
Eglin Air Force Base

Analyzes energy usage and costs using machine data from more than 20,000 sensors.

Read the Article

Cybersecurity

Traditional perimeter-based defense approaches are ill-equipped to handle today's security threats from nation states, sophisticated cyber criminals and insiders. Siloed products and a skills and resource shortage are compounding the challenge. Agencies require Splunk's analytics-driven security approach to quickly determine malicious activity and enable fast incident response through an intuitive, integrated interface.

screenshot
diagram

Insider Threats

The need to detect insider threats has forced agencies to look for new ways to understand complex user behavior. Knowing the difference between willful acts and innocent mistakes requires understanding when user activity is abnormal in the broader context of employee behavior.

Identifying activities that are unauthorized or suspicious is done through the use of Splunk's statistical analysis commands on very large data volumes. Using statistical analysis, personal-activity comparative analysis, and user-activity context analysis, Splunk technology can correlate these key data types with user activities to provide a more complete story around suspected malicious behavior.

Internet of Things and the Data-Driven Battlefield

The Army has started testing TALOS (Tactical Assault Light Operator Suit) in the field for deployment in 2018. Sensor data from the suit can provide information on the operating status of suit hydraulics and batteries. Next steps often discussed include monitoring soldier vital signs and hydration. Learn how Splunk enables concepts such as smart soldiers and connected vehicles that can provide real-time situational awareness and accelerate mission operational efficiencies.

icons

Additional Resources

Additional Resources

Solution Guides

  • Splunk for Defense

Technical Briefs

  • Using Splunk for Government Insider Threat Detection

Industry Perspectives

  • Splunk and the CIS Critical Controls
  • Gaining the Situational Awareness needed to Mitigate Cyberthreats
  • Challenges & Trends in Federal & Department of Defense IT Operations: United States
What can you do with Splunk?
Ask an Expert
PRODUCTS
  • Splunk Cloud
  • Splunk Enterprise
  • Splunk IT Service Intelligence
  • Splunk Insights for AWS Cloud Monitoring
  • Splunk App for Infrastructure
  • VictorOps
  • Splunk Enterprise Security
  • Splunk Phantom
  • Splunk User Behavior Analytics
  • Splunk for Industrial IoT
  • Splunk Business Flow
FREE TRIALS AND DOWNLOADS
PRICING
CALCULATORS
  • Splunk Value Calculator
  • Critical IT Incident Calculator
SOLUTIONS
  • IT
  • Security
  • IoT
  • Business Analytics
INDUSTRIES
  • Aerospace and Defense
  • Communications
  • Energy and Utilities
  • Financial Services
  • Healthcare
  • Higher Education
  • Manufacturing
  • Nonprofits
  • Online Services
  • Public Sector
  • Retail
CUSTOMERS
RESOURCES
  • E-books
  • Recorded Webinars
  • Videos
  • White Papers
  • More...
STRATEGY AND BUSINESS INSIGHTS
  • AI Ops
  • Machine Learning
  • Data Insider
  • Data-to-Everything
  • More...
PARTNERS
  • Become a Partner
  • Partner Login
  • More...
SUPPORT
  • Support Portal
  • Contact Support
  • Splunk Services
  • Support Programs
TRAINING
ABOUT SPLUNK
  • Careers
  • Events
  • Investor Relations
  • Leadership Team
  • Locations
  • Newsroom
  • Splunk for Good
  • Splunk Protects
  • Splunk Ventures
  • More...
CONNECT WITH SPLUNK
  • Support
  • Partners
  • Sales
SPLUNK SITES
  • Splunk Answers
  • Blogs
  • Community
  • .conf
  • Developers
  • Documentation
  • Splunkbase
  • SplunkLive!
  • T-shirt Store
  • User Groups
Splunk
Sitemap | Contact | Careers | Privacy | Terms of Use | Export Control | Modern Slavery Statement
© 2005-2019 Splunk Inc. All rights reserved.
Splunk, Splunk> and Turn Data Into Doing are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.