Splunk
  • Pricing
  • Training
  • Support
    • Support Portal
    • Support Programs
    • Contact Support
    • Splunk Answers
    • Documentation
    • Product Security Updates
    • Getting Started with Splunk Software
    • Community Support
    • Splunk Services
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • 한국어
    • Português
    • Pусский
    • 简体中文
    • 繁體中文
    • Login
    • Sign Up
Splunk
  • IT
  • SECURITY
  • IoT
  • BUSINESS ANALYTICS
  • WHY SPLUNK?
  • EXPLORE
    Products | Overview
    CORE
    • Splunk Cloud
    • Splunk Enterprise
    IT OPERATIONS
    • Splunk IT Service Intelligence
    • Splunk Insights for AWS Cloud Monitoring
    • Splunk App for Infrastructure
    • VictorOps
    SECURITY
    • Splunk Enterprise Security
    • Splunk Phantom
    • Splunk User Behavior Analytics
    IoT
    • Splunk for Industrial IoT
    BUSINESS ANALYTICS
    • Splunk Business Flow
    Industries
    • Communications
    • Financial Services
    • Healthcare
    • Public Sector
    • All Industries
    Company
    • About Splunk
    • Customers
    • Partners
    • Splunk Next
    • Trek-Segafredo Partnership
    • Pricing
    • Value Calculator
    • Blogs
    • Free Trials and Downloads
    • Resources
  • Free Splunk
Splunk Free Splunk
Login | Sign Up
IT
SECURITY
IoT
BUSINESS ANALYTICS
WHY SPLUNK?
Products
Overview
  • CORE
  • Splunk Cloud
  • Splunk Enterprise
  • IT OPERATIONS
  • Splunk IT Service Intelligence
  • Splunk Insights for AWS Cloud Monitoring
  • Splunk App for Infrastructure
  • VictorOps
  • SECURITY
  • Splunk Enterprise Security
  • Splunk Phantom
  • Splunk User Behavior Analytics
  • IoT
  • Splunk for Industrial IoT
  • BUSINESS ANALYTICS
  • Splunk Business Flow
Industries
  • Communications
  • Financial Services
  • Healthcare
  • Public Sector
  • All Industries
Company
  • About Splunk
  • Customers
  • Partners
  • Splunk Next
  • Trek-Segafredo Partnership
Pricing
Value Calculator
Blogs
Free Trials and Downloads
Resources
Pricing
Training
Support
  • Support Portal
  • Support Programs
  • Contact Support
  • Splunk Answers
  • Documentation
  • Product Security Updates
  • Getting Started with Splunk Software
  • Community Support
  • Splunk Services
Languages
  • Deutsch
  • Español
  • Français
  • Italiano
  • 日本語
  • 한국어
  • Português
  • Pусский
  • 简体中文
  • 繁體中文
Public Sector

Federal Civilian Agencies

A petabyte of data is a terrible thing to waste 

  • Public Sector
  • |
  • Federal Civilian Agencies
  • |
  • Defense & Intelligence Agencies
  • |
  • State & Local Government

Massively Scalable Data Analytics Platform

Federal agencies face increasing cost-saving directives, stricter compliance mandates and a growing number of technology silos that limit insights. Only Splunk provides a proven, integrated and massively scalable data analytics platform that cuts across technology silos to provide government organizations the real-time Operational Intelligence needed to take the fast, decisive actions necessary for efficient program delivery and success.

Splunk software empowers federal agencies to:

  • Ensure compliance and streamline reporting with programs for accountability, transparency, and data protection
  • Accelerate data center consolidation and cloud migration initiatives
  • Protect your infrastructure against advanced external and insider threats
Get Started
  • Solution Guide Splunk for Government
  • Cybersecurity Gaining the Situational Awareness needed to Mitigate Cyberthreats
  • Infographic How Splunk Maps to CDM Phases 1-3
  • Technical Brief Using Splunk for CDM and CMaaS
  • White Paper All Data, All Uses
  • Research Challenges & Trends in Federal & Department of Defense IT Operations: United States
Splunk® Enterprise Free Download

NIF, World’s Largest Laser and Splunk

When you work with the world's largest laser, you need secure and reliable IT infrastructure.
Watch Video
PRESS RELEASE
CDM Integration With Splunk

Splunk will be used at 25 civilian agencies covering 97 percent of the federal civilian government workforce.

Read the Press Release
INDUSTRY PANEL
GovSummit 2015

Government panelists discuss the impact analyzing data has on their ability to stay ahead of security breaches.

Watch the Video
.CONF
Los Alamos National Laboratory

Making better decisions with Splunk to ensure an optimal High Performance Computing (HPC) environment.

Watch the Presentation
hen combining this data with IT operations data for additional context.

Continuous Diagnostics and Mitigation

The U.S. federal government's continuous diagnostics and mitigation (CDM) program enables government agencies to manage and strengthen the posture of their cyber networks.

By 2017, the CDM program will be transformed to enable departments and agencies to maintain a near-real-time security risk awareness and assessment capability to rapidly respond to critical risk management issues and threats.

Diagram
diagram

Insider Threat

While the signs that you may have a malicious insider are varied, the analysis and data types needed for discovery are almost always the same. Splunk correlates system and security logs with organizational and external context to detect malicious insider activity. Using statistical analysis, personal-activity comparative analysis, and user-activity context analysis, Splunk technology can correlate these key data types with user activities to provide a more complete story around suspected malicious behavior.

  • IT system and security logs: Any data generated by the user as a result of credentialed human-to-machine activities
  • Organizational context: Information about the employee - usually contained in a business system such as an HR database or time management system
  • External context: Data that an employer can access as a result of an employment agreement, especially for those handling sensitive information or intellectual property

Cybersecurity

Traditional perimeter-based defense approaches are ill-equipped to handle today's sophisticated security threats. Splunk's platform for big data is ideal for detecting patterns and discovering malicious behavior and attacks not seen by signature and rule-based systems.

Splunk customers gain the most value and the fastest incident response times when capturing data from traditional security point solutions and from credentialed user-to-machine interactions and then combining this data with IT operations data for additional context. Recognized by Gartner as a leader in the SIEM magic quadrant, Splunk can complement existing SIEM deployments or replace them.

screenshot
 

Fraud

Fraud at government agencies is growing at an alarming rate and includes activities like the "social engineering" of call center personnel, "water-holing" schemes, phishing attacks and applications for undeserved benefits. Call data records, XML forms and structured data residing in a database are all sources of information that can be used to analyze and detect fraud.

Splunk provides multiple checks to monitor and proactively prevent fraud by:

  • Using trended statistical analysis
  • Applying logic to data collected in forms and watching for illogical patterns
  • Performing look-ups to external sources of data
  • Automatically interacting with other systems based on the search results

Thousands of private sector companies in the telecommunications, education, and financial services industries rely on the Splunk platform to protect them against financial losses from fraud.

Additional Resources

Additional Resources

Solution Guides

  • Splunk for Government

Technical Briefs

  • Using Splunk for Government Insider Threat Detection
  • Splunk for CDM Phase 2

Industry Perspectives

  • Splunk and the CIS Critical Controls
  • Mining Gold from Machine Data
  • Gaining the Situational Awareness needed to Mitigate Cyberthreats
  • Challenges & Trends in Federal & Department of Defense IT Operations: United States
See More
What can you do with Splunk?
Ask an Expert
PRODUCTS
  • Splunk Cloud
  • Splunk Enterprise
  • Splunk IT Service Intelligence
  • Splunk Insights for AWS Cloud Monitoring
  • Splunk App for Infrastructure
  • VictorOps
  • Splunk Enterprise Security
  • Splunk Phantom
  • Splunk User Behavior Analytics
  • Splunk for Industrial IoT
  • Splunk Business Flow
FREE TRIALS AND DOWNLOADS
PRICING
CALCULATORS
  • Splunk Value Calculator
  • Critical IT Incident Calculator
SOLUTIONS
  • IT
  • Security
  • IoT
  • Business Analytics
INDUSTRIES
  • Aerospace and Defense
  • Communications
  • Energy and Utilities
  • Financial Services
  • Healthcare
  • Higher Education
  • Manufacturing
  • Nonprofits
  • Online Services
  • Public Sector
  • Retail
CUSTOMERS
RESOURCES
  • E-books
  • Recorded Webinars
  • Videos
  • White Papers
  • More...
STRATEGY AND BUSINESS INSIGHTS
  • AI Ops
  • Machine Learning
  • Data Insider
  • Data-to-Everything
  • More...
PARTNERS
  • Become a Partner
  • Partner Login
  • More...
SUPPORT
  • Support Portal
  • Contact Support
  • Splunk Services
  • Support Programs
TRAINING
ABOUT SPLUNK
  • Careers
  • Events
  • Investor Relations
  • Leadership Team
  • Locations
  • Newsroom
  • Splunk for Good
  • Splunk Protects
  • Splunk Ventures
  • More...
CONNECT WITH SPLUNK
  • Support
  • Partners
  • Sales
SPLUNK SITES
  • Splunk Answers
  • Blogs
  • Community
  • .conf
  • Developers
  • Documentation
  • Splunkbase
  • SplunkLive!
  • T-shirt Store
  • User Groups
Splunk
Sitemap | Contact | Careers | Privacy | Terms of Use | Export Control | Modern Slavery Statement
© 2005-2019 Splunk Inc. All rights reserved.
Splunk, Splunk> and Turn Data Into Doing are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.