product
service
- Simple Security Consulting [Consulting]
- Splunk SOAR Automation Assessment Service [Consulting]
- Dashboard/SPL Creation Pack [Implementation/Building Support]
- Version upgrade service [implementation and construction support]
- Splunk Premium Apps construction support service [implementation and construction support]
- Splunk Security Log Analysis Start Package [Original App/Service]
- Splunk × CrowdStrike Falcon Insight, Macnica Original App [Original App/Service]
- Government uniform standard compatible App [Original App/Service]
- Smart Security Monitoring App [Original App/Service]
- Splunk × LANSCOPE Original App [Original App/Service]
- Security Monitoring App for Box [Original App/Service]
- Cloud Security Monitoring App [Original App/Service]
- SIEM Operation Monitoring Service [Original App/Service]
- List of services
- Macnica Premium Support for Splunk (utilization support, version upgrade monitoring)
- Macnica Premium Support for Splunk Skill Up Package
Specifications/Technical Information
Application for evaluation machine
- FAQ
Splunk
Splunk
Solving Problems with Splunk - Security
Used by 2,500 companies worldwide for security purposes
Incident detection, analysis, and investigation "Splunk" using log infrastructure
Accurately grasping the situation in a short amount of time is the first step in reducing the damage caused by security threats such as cyberattacks.
The clues are the system and network logs. Since it is nearly impossible to manually analyze the enormous amount of logs that span multiple security devices, this log utilization platform has been introduced by 2,500 companies around the world to quickly and easily detect, analyze, and investigate security incidents.・・・
We will introduce security utilization of machine data analysis platform "Splunk".
Are you having trouble with these security issues?
- Investigation of security incidents takes time
- Cannot be analyzed with existing products
- Unable to collate logs across multiple security devices
- Feeling the limits of human-wave tactics for log analysis
- Research and analysis methods are dependent on the individual
It can be solved by introducing Splunk
Splunk enables you to:
- Centralized management of security events
- Cross-analysis of logs from multiple security devices
- Easy access to logs centralized in Splunk with GUI!
- High-speed extraction of only the information you want to see with the standard functions of search, tabulation, and visualization!
Centralized management of security events
rapid investigation
Incident investigation and management
Analysis scenario
- Aggregates the number of attacks detected by IPS for each source IP address and destination IP address
・Confirm the communication status of Firewall for the specific source IP address "172.21.50.120" in ②. - Communication status of specific source IP address of Firewall Time-series graph
・Display a time-series graph for the source IP address "172.21.50.120" where attacks were detected.
Matching analysis of multiple logs
Example: Analysis of adding employee information to DHCP logs
Even if the information is not recorded in the log, it is possible to add information by referring to the external table and aggregate it.
Dashboard and pinpoint search example
Dashboard for internal controls and PC operation logs
Security health dashboard
Inquiry/Document request
In charge of Macnica Splunk Co., Ltd.
- TEL:045-476-2010
- E-mail:splunk-sales@macnica.co.jp
Mon-Fri 8:45-17:30