Products/Services
product
- Why choose Splunk
- Installation record
- price
- Splunk Enterprise Security
- Splunk Phantom (SOAR)
- Splunk ITSI (Next Generation IT Operations)
- Splunk Observability Cloud
- Splunk UBA
- Macnica CSIRT App Basic
- App for Splunk for Financial Institutions
- Splunk Analytics for Hadoop
- About Apps
- Splunk Edge Hub
- What is Splunk
service
- Dashboard/SPL Creation Pack [Implementation/Building Support]
- Version upgrade service [implementation and construction support]
- Smart Security Monitoring App [Original App/Service]
- Splunk × LANSCOPE Original App [Original App/Service]
- Security Monitoring App for Box [Original App/Service]
- Cloud Security Monitoring App [Original App/Service]
- List of services
Specifications/Technical Information
Specifications/Technical Information
Evaluation machine application/FAQ
Application for evaluation machine
- FAQ
Splunk
Splunk
Click here to download all materials
Splunk use case
Security

What is the “ideal figure” and “reality” expected of SOC?

Explains unexpected pitfalls when outsourcing security operations.

In fact, operational automation is not straightforward. Introducing SOAR utilization steps that do not fail.

Why do threats evade countermeasures? ? The correct log analysis method to tackle now
DX

Why do so many DX projects falter? Introducing the secret of visualization of the process necessary for promoting DX.
Splunk Premium Apps

Introducing Splunk Phantom's functions, usage images, licenses, etc.

Recommendations for internal fraud countermeasures starting with Splunk UBA.
Inquiry
In charge of Macnica Splunk Co., Ltd.
- TEL:045-476-2010
- E-mail:splunk-sales@macnica.co.jp
Weekdays: 9:00-17:00

