Home Industry Splunk Named a Leader in 2015 Gartner Magic Quadrant for SIEM

Splunk Named a Leader in 2015 Gartner Magic Quadrant for SIEM

by CIO AXIS

Splunk, Inc. today announced it has been named a leader in Gartner’s 2015 Magic Quadrant for Security Information and Event Management (SIEM) for the third straight year. Splunk was the only vendor to improve its completeness of vision from last year’s results. Gartner evaluated the Splunk security portfolio, including Splunk® Enterprise and the Splunk App for Enterprise Security, used by thousands of organizations around the world. To view the report, go to: splunk.com/goto/SIEM_MQ.

According to Gartner report authors Kelly Kavanagh, principal research analyst, and Oliver Rochford, research director,“The greatest area of unmet need is effective targeted attack and breach detection. Organizations are failing at early breach detection, with more than 92 percent of breaches undetected by the breached organization. The situation can be improved with stronger threat intelligence, the addition of behavior profiling and better analytics.”

“Splunk is the only security provider to improve on completeness of vision in the Gartner 2015 SIEM Magic Quadrant which we believe serves as the latest evidence that Splunk remains at the forefront of solving advanced and emerging SIEM use cases,” said Haiyan Song, senior vice president of security markets, Splunk. “Splunk is growing well beyond the SIEM market rate, as an increasing number of companies recognize the value of taking an analytics-driven approach to security with Splunk as the nerve center. And with our recent acquisition of Caspida, Splunk is adding machine learning-based user behavioral analytics and extending our analytics-enabled SIEM to better detect advanced and insider threats.”

To protect against advanced threats, a growing number of organizations are using Splunk security analytics to augment, replace and go beyond their legacy SIEM deployments. Splunk security solutions help organizations improve the detection, response and recovery from advanced threats by providing them with broad security intelligence from data that is collected across IT, the business and the cloud.

Recommended for You

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Close Read More

See Ads