SlideShare a Scribd company logo
1 of 46
Taking Splunk to the
Next Level for Management
Doug May
Director, Global Business Value Consulting
Splunk>
May 7, 2015
Help Splunk customers, prospects, and partners
document the projected and already realized
business value of making machine data accessible,
usable, and valuable for everyone
Common Deliverables:
› CFO-Ready Business Cases
› Value Realization Studies
› Adoption Roadmaps and Maturity Assessments
› Customer and Use Case Benchmarks
Business Value Consulting @Splunk
3
Focusing on Value Takes it to the Next Level
4
Your process requires it
Create and maintain visibility
Replicate success across the organization
Accelerate enterprise adoption
Maximize business results
Splunk is a Hidden Gem
5
Way cool,
dude.
What business
value do I get?
I’m invincible!
Top Challenges to Documenting Value
Lack of Splunk
and Industry
Benchmarks
x
Data
Lack of Tools to
Make Value
Measurement Easy
x
Tools
Not Enough
Time to Assess
Your Value
x
Time
Splunk Can Help Documenting Value
All Splunk Tools
Are Available to
All of You
ToolsTime
Tools, Content
and Team Will
Save You Time
Access to Splunk
and Industry
Benchmarks
Data
Best Practices for Documenting & Positioning Value
Taking your Splunk deployment to the next level
4
Measure and
Track Your
Success
1
Align with Key
Business
Objectives
Qualify and
Quantify
Business Value
2 3
Incremental
Steps with a Big
Picture Plan
Value is in the Eye of the Beholder
1
Align with Key
Business
Objectives
Did you know you can save
15% on your car insurance
when you call Geico?
Is that important to you?
Maybe it’s not.
Link your project to important goals and strategies to prioritize your project
REAL EXAMPLE -Aligning with Company Priorities
10
Profit
Double revenues while
increasing margins
Productivity
Design and implement to
most effective and
efficient business system
People
Attract, engage, and
retain the best talent
Partners
Become a critical part of
our customers’ growth
strategies
Portfolio
Double servings per day
and be #1 provider
Planet
Create advantage by
fulfilling our Live
Positively commitments
“We also launched a productivity and
reinvestment program to create $550
million to $650 million in annual savings by
2015. By freeing up resources via supply-
chain optimization, improved marketing
effectiveness, operational excellence and
systems standardization, we can invest more
in innovation, marketing and additional
“feet on the street” to drive our growth.” -
CEO
From investor presentations, annual reports,
and executive presentations
Steps to Qualify Value
• Align your project with something strategic
• Talk with influential and knowledgeable people
• Document why something should change or be added
• Describe the current challenges or barriers
• Identify the “desired” state
• Summarize and socialize - gain support
Qualify and
Quantify
Business Value
2
Qualifying Value Example
12
Visibility to Environment Health & User Exp.
 Brute force approach providing visibility to key
processes isn’t working and won’t scale
 Operations still lacks complete end-to-end visibility
to the environment’s health, use and trends
 Blinds spots still exist in monitoring and data access
for Operations which could help improve
troubleshooting and uptime / availability
Incident / Issue Notification
 Brute force approach to proactive monitoring isn’t
working consistently and won’t scale
 There’s a “Waterfall effect” – small issues go
without broader notification triggering other issues
eventually leading to a bigger incident
 Users are aware of issues before Operations and
call the helpdesk
 All the lights are “green” but still ~65% of incidents
overall are reported first by the business
Troubleshooting Incidents / Issues
 Operations troubleshooting is cumbersome and
suboptimal
 It’s still manual across IT silos
 It’s difficult to find root cause of incidents quickly
 Performance issues are difficult to resolve
 Outages and impact are elongated due to manual
efforts and silos
 Teams are distracted from their core work when
they’re troubleshooting
Recurring Incidents / Issues
 The Problem Management process isn’t working
because there are many high severity incidents still
without root cause determined
 As a result, Operations is solving the same problems
again and again
 Opportunities exist to improve on incident avoidance
since @25%+ of incidents are repeats
DESIRED STATE VISION:
Complete visibility to
environment health & trends
across full application stack for all
stakeholders
Proactively avoid issues before
the business is impacted
Reduce MTTR with rapid root
cause analysis
Quantifying Value with Splunk Tools
Financial Analysis Made Easy
• Over 40 Value Calculators
• Driven by Actual Customer Results
• Complete Financial Analysis
• Best Practice TCO Models
Don’t Forget
• Follow the Impact
• Capture All the Value
• Summarize and Socialize
13
Interactive Value Assessment (IVA) Highlights
ThepowerofSplunkvalueinasimplepackage
Target your business case Calculate value seamlessly
Be credible Deliver value on the spot!
Choose 1 or many
Groups
45 Value Calculators
Automatically surface
those that are relevant
Built-in Industry
Benchmarks and
Customer Case Studies
Presentation options
of benefit summaries
& financial analysis
IVA Demo
ExecuteAgainst a Strategy
Take directional, incremental steps
• Avoid being reactive – don’t drive by data source
• Develop a plan to expand Splunk
• Link the plan to strategic company goals
• Use Splunk tools and benchmarks to document and
quantify the anticipated value
• Set baselines for success
• Commit to measure value realized post deployment
3
Incremental
Steps with a Big
Picture Plan
What Your Splunk Strategy Might Look Like
Measuring & Tracking Success
Helping you take it to the next level
• Demonstrating success will help further the cause
• Tell the story of your Splunk usage
• Compare your success against Splunk customer
benchmarks
• Assess your usage and staffing maturity
• Then bring it all together
4
Measure and
Track Your
Success
Value
Realization
Usage
Maturity
Skills
Readiness
Measure Success with Value Realization
“Money follows money well spent”
• Summarize
BEFORE and
AFTER Splunk
• Capture
metrics of
improvement
• Socialize your
success
Usage Maturity Assessment – IT OPS
Drive expansion through highlighting value opportunities
20
Groups
% Data
Indexed
Log
Collection
Incident
Investigation
Root Cause
Analysis
Proactive
Alerting
Operational
Dashboards
Business
Analytic
s
Capacity
PlanningLevel 1
Triage
Level 2 &
3
Escalation
Virtualization 0%
OS - Unix 25%
OS - Windows 0%
Storage 33%
Network 100%
= Splunk fully in use = Splunk partially in use = Splunk not in use
Usage Maturity Assessments – APP DEV
Drive expansion through highlighting value opportunities
21
Top Apps
%
Indexed
Evaluate and Assess Needs Develop and Release
Data Collection Business Insight
Test Failure
Analysis
Defect
Investigation
SAP 0%
Warehouse Mgt 0%
E-Commerce Website 50%
Call Center 80%
= Splunk fully in use = Splunk partially in use = Splunk not in use
Usage Maturity Assessments – SECURITY
Drive expansion through highlighting value opportunities
22
Data
Sources
%
Indexed
Log
Collection
Level 1
Triage
Monitoring /
Alerting
Investigations
Incident
Response
Compliance
Reporting
Routine
Log
Reviews
Threat Intel:
(3rd Party)
70%
Threat Intel:
(OS Blacklist)
70%
Network:
(Firewall)
90%
Network:
(IDS/IPS)
90%
Endpoint:
(PCLM)
80%
Access &
Identity Mgt
75%
= Splunk fully in use = Splunk partially in use = Splunk not in use
CurrentlyhandledbyMSSP
Usage Maturity Assessments – SECURITY CONTROLS
Drive expansion through highlighting value opportunities
23
Critical Control In Place?
Monitor unauthorized devices or software
Monitor unmanaged devices or software
Monitor configuration compliance
Monitor patch compliance
Monitor malware defense
Monitor application software security
Monitor wireless access control
Analyze audit logs with time-based correlation
Critical Control In Place?
Monitor use of ports, protocols, and services
Monitor controlled use of admin privileges
Monitor perimeter IDS
Monitor controlled / uncontrolled access
Monitor orphan, expired, miss use of accounts
Monitor potential exfiltration of information
Monitor secure IP restriction policies
Maintain data going back months
= Splunk fully in use = Splunk partially in use = Splunk not in use
AReal Customer Example - Operations
MostcommonusesofSplunkdeliveringvalue
Business
Service
Components
% of
Data
Indexed
Log / Data
Collection
Incident Investigation
Root Cause
Analysis
Proactive
Alerting
Operational
Dashboards
Business
AnalyticsLevel 1
Triage
Level 2 & 3
Escalation
Custom Web Apps 80%
3rd Party Web-Apps 100%
Apps 75%
Web Server 50%
Database 100%
OS 100%
Network 95%
= Splunk fully in use = Splunk partially in use = Splunk not in use
E-Commerce Site
Splunk IT Operations Benchmarks
Know what toproject and/or compare how you’re doing
25
Reduced Sev1 and
Sev2 incidents by 43%
Reduced MTTR by
95% and reduced
escalations by 50%
Improved capacity
utilization and avoided
$200k in infrastructure
15% to 45% reduction in system incidents
70% to 90% faster investigation of system incidents
67% to 82% reduction in financial impact from outages
5% to 20% optimization with server capacity allocation
Splunk Application Support/Dev Benchmarks
Know what toproject and/or compare how you’re doing
26
15% to 45% reduction in application incidents
70% to 90% faster investigation of QA defects and incidents
10% to 50% faster time to market
10% to 50% increase in value for key projects
Went from 1
release/day to 8
because of Splunk
Shortened their
development
cycles by 30%
Reduced the number of
incidents leading to 9M
Euro per year in revenue
recaptured
Splunk Security & Compliance Benchmarks
Know what toproject and/or compare how you’re doing
27
70% to 90% improvement with detection and research of events
70% to 90% faster investigation of security incidents
10% to 50% lower risks with data breaches, fraud and IP theft
70% to 90% reduction in compliance labor
Reduced investigation
effort by more than 75%
Reduced the time to
report on SAS70
compliance by 83%
Reduced the number of
security incidents by 80%
Map Your Progressvs. Benchmarks
Estimates based on Value Realization and Usage Maturity
28
Incident Avoidance Incident/Problem Investigation
15% 45%Splunk Benchmark 70% 90%Splunk Benchmark
35%
20%
10%
0%
0%
75%
50%
25%
25%
25%
Groups
Infrastructure
Inventory
Manufacturing
Payroll
Collaboration
Splunk Staffing Readiness
Be sure you have the staff and skills to maximize value
29
A successful and scalable deployment of
Splunk relies on the orchestration of key
roles and responsibilities, primarily
centered around:
 Architecture
 Administration
 User adoption (Power User)
 Application development
Basic Communication Framework
30
Architect
Admin
Works with power users to determine
which data sources should be indexed
to meet each department’s needs
Scales the Splunk architecture to meet
business demand
Power Users Department Users
Adds data sources to the Splunk
platform according to business needs
Assist power users with the
development of advanced dashboards,
alerting and reporting
Maintains the Splunk SW and it’s
infrastructure for optimal performance
1 Power user per department
Provides basic support for new and existing reports
and dashboards
Works with their group to identify opportunities
where Splunk can provide value
Splunk Roles & Recommended Training
31
Splunk
Roles
Using
Splunk
Splunk
Administration
Searching
and
Reporting
Creating
Knowledge
Objects
Advanced
Searching &
Reporting
Developing
Apps with
Splunk
Developing
with Splunk
SDKs
Architect Required Required Optional Optional Optional Optional Optional
Admin Required Required Optional Optional
Power User Required Required Required Optional
Developer Required Optional Required Required Optional Required Optional
for Splunk on-premises
Splunk Power User Status
Recommendation: 1power-user pergroup
32
Splunk
Power User(s)
Using
Splunk
Splunk
Administration
Searching and
Reporting
Creating
Knowledge
Objects
Advanced
Searching &
Reporting
Developing
Apps with
Splunk
Developing
with Splunk
SDKs
• Web
• Anurag D.
• Security
• Josh H.
• Infrastructure
• Mike G.
= Splunk training completed= Required = Optional = Training required but not completed = Optional training not completed
Responsibilities
• Works with their group to identify opportunities where Splunk can provide value
• Collaborates with the Splunk admin(s) to add new data sources to address their requirements
• Provides basic support for new and existing reports and dashboards to their group
Map Your Roles & Highlight Training Gaps
33
Splunk Admin
#name
Splunk
Developer
#name
Security
Power User
#name
Collaboration
Power User
#name
Database
Power User
#name
CRM
Power User
#name
Network
Power User
#name
Financial Apps
Power User
#name
Splunk Architect
#name
= Fully Trained = Partially Trained = Not assigned
Web
Power User
#name
Server
Power User
#name
Your Company
Bringing it all together
Position Value in
Expansion Area
Taking it to the Next Level
Value Opportunity:
• faster detection,
• faster investigation,
• faster root cause
analysis of application
incidents
• fewer developer
escalation
After 3 to 6
months
After 3 to 6
months
Document Success for
Server & Network teams
Document Success for
App & DB teams
Position Value in
Expansion Area
Application
Development
Value Opportunity:
• faster test analysis,
• faster investigation of pre-
production bugs,
• faster releases cycles
Position Value in
Expansion Area
Security &
Compliance
Value Opportunity:
• faster detection, faster triage,
• faster investigation of security incidents
Value Realized:
• faster detection,
• faster investigation,
• faster root cause
analysis of system
incidents
IT Operations
Application
Support
Success from Current Use
PositiveROIachievedon~$1.7Mspendtodate
Proactively monitoring a $1.5B revenue
platform entirely with Splunk.
Reducing manual effort and impact
Avoiding revenue displacement and loss
“We almost had an outage today. We saw
some things in Splunk. That saved us a 1.5
hour incident and almost $300,000.”
Opportunities:
Get full stack of data in for additional
efficiencies (network, VM, storage, DB)
Web & Mobile
42% reduction in business impact
Avoiding revenue loss of $2.3M/year
Value $2.5M/year | 2,445 hours/year
Rapid search and investigation of security
incidents. Went from reactive to proactive.
Reducing manual effort, impact and risk
Innovating – search to alert to IDS
“If we didn’t have Splunk, I am not sure what
we would have done with the April incident.”
Opportunities:
Apply to PCI readiness saving GRC team
effort, enabling continuous compliance.
50% reduction in incident investigation
Avoiding 16k+ hours/year
Value $1.3M/year | 16,380 hours/year
Security
20,414
Yearly Hours
50% reduction in incident
investigation (when leveraged)
Value $124,102/yr* | 1,589 hours/yr*
Infrastructure
Resolving complex issues rapidly;
opportunity for even more value.
Reducing manual effort and impact
Realizing only partial benefits today
“When there’s a problem, it’s tricky to
figure out where it is. Splunk’s a helpful
tool to have.”
Opportunities:
Get full environment data in. Use more
consistently across team to capture value.
$3.92M
Yearly Value
See detailed calculations of value, usage adoption, and staffing maturity schedules in the Appendix. Benchmarks Used for Infrastructure Calcs
From a real Splunk
customer
Functional Adoption Summary
Comparing[customer]’s currentusageagainstthemostcommonSplunkusesdrivingvalue
IT &
APPLICATION
OPERATIONS
% Usable
Data
Indexed
Log
Collection
Incident Investigation
Root Cause
Analysis
Proactive
Alerting
Operational
Dashboards
Business
Analytics
Capacity
PlanningLevel 1
Triage
Level 2 & 3
Escalation
Web & Mobile
75%
NW*, VM,
DB, Storage
Infrastructure
20%
DB, VM,
Windows,
Storage
= Splunk fully in use = Splunk partially being used = Splunk not being used
SECURITY &
COMPLIANCE
% Data
Indexed
Log
Collection
Level 1
Triage
Monitoring /
Alerting
Investigations
Incident
Response
Compliance
Reporting
Routine Log
Reviews
Security
80%
3rd party
intel, AIM
MSSP
Refer to adoption charts for each team
in the Appendix for more details
From a real Splunk
customer
NOTE: VMware data not ingested. Storage visibility is limited to VM instance. Host and SAN would be beneficial.
* Network data is being collected today but in a separate Splunk instance due to be joined later this year.
Functional Adoption – Web Team
.Com Business
Service
% Data
Indexed
Log
Collection
Incident Investigation Root
Cause
Analysis
Proactive
Alerting
Operational
Dashboards
Business
Analytics
Capacity
Plannin
gLevel 1
Triage
Level 2 & 3
Escalation
Web/App Server 100%
Database 0%
Virtualization 10%
OS 100%
Storage 20%
Network* 90%
= Splunk fully in use = Splunk partially being used = Splunk not being used
From a real Splunk
customer
Functional Adoption – Security Controls
39
Critical Control In Place?
Monitor unauthorized devices or software
Monitor unmanaged devices or software
Monitor configuration compliance
Monitor patch compliance
Monitor malware defense
Monitor application software security
Monitor wireless access control
Analyze audit logs with time-based correlation
Critical Control In Place?
Monitor use of ports, protocols, and services
Monitor controlled use of admin privileges
Monitor perimeter IDS
Monitor controlled / uncontrolled access
Monitor orphan, expired, miss use of accounts
Monitor potential exfiltration of information
Monitor secure IP restriction policies
Maintain data going back months
= Splunk fully in use = Splunk partially in use = Splunk not in use
Current assessment of Splunk usage at [customer] for the SANS 20 security controls.
From a real Splunk
customer
[customer]’s Splunk Team
40
= Fully Trained
Splunk Architect
#name
Splunk Admin
#name
Splunk
Developer
#name
Security
Power User
#name
Collaboration
Power User
#name
Labor
Power User
#name
Mobile CRM
Power User
#name
Infrastructure
Power User
#name
GSIT
Power User
#name
Splunk Architect
#name
= Partially Trained = Not assigned
Splunk Admin
#name
Web/Mobile
Power User
#name
Warehouse
Power User
#name
From a real Splunk
customer
Sempra Energy Mitigates Security Risk
41
• One of the largest utilities in the US,
serving 20M+ customers
• Headquartered in San Diego, CA
• 17,000+ employees
Splunk Use:
– Rapid search capabilities for high volume logs
– Consumption of any type of data (structured,
unstructured) from hundreds of applications
– Event correlation complementing SIEM
Value Delivered:
– Reduced MTTR for identifying threats to minutes
– Saved $1.2M in help desk charges – faster MTTR for
BYOD account logins
– Avoided fines by maintaining NERC compliance
– Tracked anomalous incidents across several systems to
identify Advanced Threats
Splunk Security & Compliance Benchmarks
Know what toproject and/or compare how you’re doing
42
70% to 90% improvement with detection and research of events
70% to 90% faster investigation of security incidents
10% to 50% lower risks with data breaches, fraud and IP theft
70% to 90% reduction in compliance labor
Reduced investigation
effort by more than 75%
Reduced the time to
report on SAS70
compliance by 83%
Reduced the number of
security incidents by 80%
Future Value Opportunities(1of2)
AProactiveOperations approachwillreduceimpacthours
Collaboration toavoid171,348employeehours/year
Basic monitoring puts Collaboration at risk
as it grows from ~6k to 200k+ users and
becomes the portal to key apps
Proactively monitor to avoid incidents and
employee productivity loss (171k hrs)
Speed incident investigation and resolution,
reducing manual effort
“We expect 20% more issues as we go from
@6,000 to 200,000+ users.”
Incidents reduced by 25% | Impact 67%
Avoiding 34 hours/year of BII time
Value $5.2M/year | 1,501 IT hours/year
Collaboration
Shift from reactive to proactive improving
Labor stability and availability enabling
maximum scheduling efficiency
Proactively monitor to avoid incidents and
protect Partner productivity
Speed incident investigation and
resolution, reducing manual effort
“Last Tuesday if we got a heads up from
Splunk we could have resolved it in 1 hour
instead of 5.”
70% reduction in incident investigation
Sev1 time reduced 96 hours/year
Value $433,544/year | 5,549 hours/year
Labor Scheduling
Become more proactive further leveraging
centralized, real-time data to avoid and
reduce impact time
Proactively monitor to avoid incidents
and business impact
Further reduce investigation effort over
current, isolated log search solution
“If we had a dashboard showing us the
app, database, server, and network health,
we could get ahead of potential issues and
resolve them before impact.”
25% reduction in incidents
Avoiding 12 hours/year impact time
Value $1.0M/year | 828 hours/year
Warehouse
19,725
Yearly Hours
$7.5M
Yearly Value
From a real Splunk
customer
Best Practices for Documenting & Positioning Value
Taking your Splunk deployment to the next level
4
Measure and
Track Your
Success
1
Align with Key
Business
Objectives
Qualify and
Quantify
Business Value
2 3
Incremental
Steps with a Big
Picture Plan
Ask Me or Your Account Team For…
• The Interactive Value Assessment
(IVA) Excel ROI model
• Usage adoption maturity templates
• Splunk staff readiness templates
• Common benefits of Splunk and
customer benchmarks
Copyright © 2014 Splunk Inc.
Questions? Thank you!
Doug May
dmay@splunk.com

More Related Content

What's hot

SplunkLive! Munich 2019: Splunking Parcels with Deutsche Post DHL
SplunkLive! Munich 2019: Splunking Parcels with Deutsche Post DHLSplunkLive! Munich 2019: Splunking Parcels with Deutsche Post DHL
SplunkLive! Munich 2019: Splunking Parcels with Deutsche Post DHLSplunk
 
dlux - Splunk Technical Overview
dlux - Splunk Technical Overviewdlux - Splunk Technical Overview
dlux - Splunk Technical OverviewDavid Lutz
 
Splunk 101
Splunk 101Splunk 101
Splunk 101Splunk
 
Splunk Cloud
Splunk CloudSplunk Cloud
Splunk CloudSplunk
 
Splunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaSplunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaEdureka!
 
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...West Monroe Partners
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
IoT Asset Management
IoT Asset Management IoT Asset Management
IoT Asset Management Kelly Potter
 
Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2 Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2 Splunk
 
FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...
FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...
FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...Amazon Web Services
 
Gen AI Cognizant & AWS event presentation_12 Oct.pdf
Gen AI Cognizant & AWS event presentation_12 Oct.pdfGen AI Cognizant & AWS event presentation_12 Oct.pdf
Gen AI Cognizant & AWS event presentation_12 Oct.pdfPhilipBasford
 
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...AI in Telecom: How artificial intelligence is reshaping the vision of telco i...
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...Data Driven Innovation
 
A cloud readiness assessment framework
A cloud readiness assessment frameworkA cloud readiness assessment framework
A cloud readiness assessment frameworkCarlo Colicchio
 
Migration Planning with AWS Application Discovery Service - ENT308 - Chicago ...
Migration Planning with AWS Application Discovery Service - ENT308 - Chicago ...Migration Planning with AWS Application Discovery Service - ENT308 - Chicago ...
Migration Planning with AWS Application Discovery Service - ENT308 - Chicago ...Amazon Web Services
 
Accenture-Cloud-Data-Migration-POV-Final.pdf
Accenture-Cloud-Data-Migration-POV-Final.pdfAccenture-Cloud-Data-Migration-POV-Final.pdf
Accenture-Cloud-Data-Migration-POV-Final.pdfRajvir Kaushal
 
Modernizing our data platform
Modernizing our data platformModernizing our data platform
Modernizing our data platformaccenture
 
DXC ESO for SAP Client Event presentation
DXC ESO for SAP Client Event presentationDXC ESO for SAP Client Event presentation
DXC ESO for SAP Client Event presentationJoachim Mayer
 
Build and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWCBuild and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWCAmazon Web Services
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 

What's hot (20)

SplunkLive! Munich 2019: Splunking Parcels with Deutsche Post DHL
SplunkLive! Munich 2019: Splunking Parcels with Deutsche Post DHLSplunkLive! Munich 2019: Splunking Parcels with Deutsche Post DHL
SplunkLive! Munich 2019: Splunking Parcels with Deutsche Post DHL
 
dlux - Splunk Technical Overview
dlux - Splunk Technical Overviewdlux - Splunk Technical Overview
dlux - Splunk Technical Overview
 
Splunk 101
Splunk 101Splunk 101
Splunk 101
 
Splunk Cloud
Splunk CloudSplunk Cloud
Splunk Cloud
 
Splunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaSplunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | Edureka
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
 
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
IoT Asset Management
IoT Asset Management IoT Asset Management
IoT Asset Management
 
Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2 Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2
 
FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...
FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...
FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...
 
Gen AI Cognizant & AWS event presentation_12 Oct.pdf
Gen AI Cognizant & AWS event presentation_12 Oct.pdfGen AI Cognizant & AWS event presentation_12 Oct.pdf
Gen AI Cognizant & AWS event presentation_12 Oct.pdf
 
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...AI in Telecom: How artificial intelligence is reshaping the vision of telco i...
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...
 
A cloud readiness assessment framework
A cloud readiness assessment frameworkA cloud readiness assessment framework
A cloud readiness assessment framework
 
Migration Planning with AWS Application Discovery Service - ENT308 - Chicago ...
Migration Planning with AWS Application Discovery Service - ENT308 - Chicago ...Migration Planning with AWS Application Discovery Service - ENT308 - Chicago ...
Migration Planning with AWS Application Discovery Service - ENT308 - Chicago ...
 
Accenture-Cloud-Data-Migration-POV-Final.pdf
Accenture-Cloud-Data-Migration-POV-Final.pdfAccenture-Cloud-Data-Migration-POV-Final.pdf
Accenture-Cloud-Data-Migration-POV-Final.pdf
 
Modernizing our data platform
Modernizing our data platformModernizing our data platform
Modernizing our data platform
 
DXC ESO for SAP Client Event presentation
DXC ESO for SAP Client Event presentationDXC ESO for SAP Client Event presentation
DXC ESO for SAP Client Event presentation
 
Build and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWCBuild and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWC
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 

Viewers also liked

Organizing for Digital: Why Digital Dexterity Matters
Organizing for Digital: Why Digital Dexterity MattersOrganizing for Digital: Why Digital Dexterity Matters
Organizing for Digital: Why Digital Dexterity MattersRick Bouter
 
Splunk Discovery Brussels - September 2017
Splunk Discovery Brussels - September 2017Splunk Discovery Brussels - September 2017
Splunk Discovery Brussels - September 2017Splunk
 
Big Data and Digital Analytics presentation for NMIMS
Big Data and Digital Analytics presentation for NMIMSBig Data and Digital Analytics presentation for NMIMS
Big Data and Digital Analytics presentation for NMIMSAnees Merchant
 
Business Value Breakfast Presentation
Business Value Breakfast PresentationBusiness Value Breakfast Presentation
Business Value Breakfast PresentationSplunk
 
Taking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerTaking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerSplunk
 
Leading Digital Turning Tech into Business Transformation
Leading Digital Turning Tech into Business TransformationLeading Digital Turning Tech into Business Transformation
Leading Digital Turning Tech into Business TransformationCapgemini
 
Keynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi Conference
Keynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi ConferenceKeynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi Conference
Keynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi ConferenceRoss Dawson
 
Splunk company overview april. 2015
Splunk company overview   april. 2015Splunk company overview   april. 2015
Splunk company overview april. 2015Timur Bagirov
 
Drive more value through data source and use case optimization
Drive more value through data source and use case optimization Drive more value through data source and use case optimization
Drive more value through data source and use case optimization Splunk
 
Explain the Value of your Splunk Deployment Breakout Session
Explain the Value of your Splunk Deployment Breakout SessionExplain the Value of your Splunk Deployment Breakout Session
Explain the Value of your Splunk Deployment Breakout SessionSplunk
 
Didier Bonnet: Oracle Open World Presentation on #LeadingDigital
Didier Bonnet: Oracle Open World Presentation on #LeadingDigitalDidier Bonnet: Oracle Open World Presentation on #LeadingDigital
Didier Bonnet: Oracle Open World Presentation on #LeadingDigitalCapgemini
 
Paris live eddiesatterly_022013
Paris live eddiesatterly_022013Paris live eddiesatterly_022013
Paris live eddiesatterly_022013jenny_splunk
 
Splunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of ThingsSplunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of ThingsAruj Thirawat
 
Taking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkTaking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkSplunk
 
Ei Presentation on analytics
Ei Presentation on analyticsEi Presentation on analytics
Ei Presentation on analyticsLar Veale
 
Deck from Cap Gemini Conference
Deck from Cap Gemini ConferenceDeck from Cap Gemini Conference
Deck from Cap Gemini ConferenceGeoffrey Moore
 

Viewers also liked (16)

Organizing for Digital: Why Digital Dexterity Matters
Organizing for Digital: Why Digital Dexterity MattersOrganizing for Digital: Why Digital Dexterity Matters
Organizing for Digital: Why Digital Dexterity Matters
 
Splunk Discovery Brussels - September 2017
Splunk Discovery Brussels - September 2017Splunk Discovery Brussels - September 2017
Splunk Discovery Brussels - September 2017
 
Big Data and Digital Analytics presentation for NMIMS
Big Data and Digital Analytics presentation for NMIMSBig Data and Digital Analytics presentation for NMIMS
Big Data and Digital Analytics presentation for NMIMS
 
Business Value Breakfast Presentation
Business Value Breakfast PresentationBusiness Value Breakfast Presentation
Business Value Breakfast Presentation
 
Taking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerTaking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - Manager
 
Leading Digital Turning Tech into Business Transformation
Leading Digital Turning Tech into Business TransformationLeading Digital Turning Tech into Business Transformation
Leading Digital Turning Tech into Business Transformation
 
Keynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi Conference
Keynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi ConferenceKeynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi Conference
Keynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi Conference
 
Splunk company overview april. 2015
Splunk company overview   april. 2015Splunk company overview   april. 2015
Splunk company overview april. 2015
 
Drive more value through data source and use case optimization
Drive more value through data source and use case optimization Drive more value through data source and use case optimization
Drive more value through data source and use case optimization
 
Explain the Value of your Splunk Deployment Breakout Session
Explain the Value of your Splunk Deployment Breakout SessionExplain the Value of your Splunk Deployment Breakout Session
Explain the Value of your Splunk Deployment Breakout Session
 
Didier Bonnet: Oracle Open World Presentation on #LeadingDigital
Didier Bonnet: Oracle Open World Presentation on #LeadingDigitalDidier Bonnet: Oracle Open World Presentation on #LeadingDigital
Didier Bonnet: Oracle Open World Presentation on #LeadingDigital
 
Paris live eddiesatterly_022013
Paris live eddiesatterly_022013Paris live eddiesatterly_022013
Paris live eddiesatterly_022013
 
Splunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of ThingsSplunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of Things
 
Taking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkTaking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to Splunk
 
Ei Presentation on analytics
Ei Presentation on analyticsEi Presentation on analytics
Ei Presentation on analytics
 
Deck from Cap Gemini Conference
Deck from Cap Gemini ConferenceDeck from Cap Gemini Conference
Deck from Cap Gemini Conference
 

Similar to Taking Splunk to the Next Level - Management

Taking Splunk to the Next Level – Management - Advanced
Taking Splunk to the Next Level – Management - AdvancedTaking Splunk to the Next Level – Management - Advanced
Taking Splunk to the Next Level – Management - AdvancedSplunk
 
Taking Splunk to the Next Level - Management
Taking Splunk to the Next Level - ManagementTaking Splunk to the Next Level - Management
Taking Splunk to the Next Level - ManagementSplunk
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionSplunk
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionSplunk
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionSplunk
 
Profitabilty, Analytics, and Exalytics
Profitabilty, Analytics, and ExalyticsProfitabilty, Analytics, and Exalytics
Profitabilty, Analytics, and ExalyticsAlithya
 
Succes Services - Top tips for better adoption
Succes Services - Top tips for better adoptionSucces Services - Top tips for better adoption
Succes Services - Top tips for better adoptionSalesforce_Benelux
 
Managed Services Using SLAs and KPIs
Managed Services Using SLAs and KPIsManaged Services Using SLAs and KPIs
Managed Services Using SLAs and KPIsProlifics
 
Ultimate guide to performance measurement
Ultimate guide to performance measurementUltimate guide to performance measurement
Ultimate guide to performance measurementRebecca Manjra
 
Business Agility And Software Development Alan Chedalawada
Business Agility And Software Development   Alan ChedalawadaBusiness Agility And Software Development   Alan Chedalawada
Business Agility And Software Development Alan ChedalawadaValtech UK
 
La Importancia del Análisis de la Información
La Importancia del Análisis de la InformaciónLa Importancia del Análisis de la Información
La Importancia del Análisis de la InformaciónNexolution
 
The Path Forward: Getting started with Analytics Quotient
The Path Forward: Getting started with Analytics QuotientThe Path Forward: Getting started with Analytics Quotient
The Path Forward: Getting started with Analytics QuotientJulie Severance
 
Making Money Out of Data
Making Money Out of DataMaking Money Out of Data
Making Money Out of DataDigital Vidya
 
APM Center of Excellence Drives Improved Business Results at Itau Unibanco
APM Center of Excellence Drives Improved Business Results at Itau UnibancoAPM Center of Excellence Drives Improved Business Results at Itau Unibanco
APM Center of Excellence Drives Improved Business Results at Itau UnibancoCA Technologies
 
Run Learning Like a Business
Run Learning Like a BusinessRun Learning Like a Business
Run Learning Like a BusinessWilliam West
 
Draft - Digital Transformation Rough Plan.pdf
Draft - Digital Transformation Rough Plan.pdfDraft - Digital Transformation Rough Plan.pdf
Draft - Digital Transformation Rough Plan.pdfEnricoJohanes1
 
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...ESEM 2014
 
Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability Robert Max
 

Similar to Taking Splunk to the Next Level - Management (20)

Taking Splunk to the Next Level – Management - Advanced
Taking Splunk to the Next Level – Management - AdvancedTaking Splunk to the Next Level – Management - Advanced
Taking Splunk to the Next Level – Management - Advanced
 
Taking Splunk to the Next Level - Management
Taking Splunk to the Next Level - ManagementTaking Splunk to the Next Level - Management
Taking Splunk to the Next Level - Management
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout Session
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout Session
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout Session
 
Profitabilty, Analytics, and Exalytics
Profitabilty, Analytics, and ExalyticsProfitabilty, Analytics, and Exalytics
Profitabilty, Analytics, and Exalytics
 
Succes Services - Top tips for better adoption
Succes Services - Top tips for better adoptionSucces Services - Top tips for better adoption
Succes Services - Top tips for better adoption
 
Managed Services Using SLAs and KPIs
Managed Services Using SLAs and KPIsManaged Services Using SLAs and KPIs
Managed Services Using SLAs and KPIs
 
Ultimate guide to performance measurement
Ultimate guide to performance measurementUltimate guide to performance measurement
Ultimate guide to performance measurement
 
Business Agility And Software Development Alan Chedalawada
Business Agility And Software Development   Alan ChedalawadaBusiness Agility And Software Development   Alan Chedalawada
Business Agility And Software Development Alan Chedalawada
 
La Importancia del Análisis de la Información
La Importancia del Análisis de la InformaciónLa Importancia del Análisis de la Información
La Importancia del Análisis de la Información
 
The Path Forward: Getting started with Analytics Quotient
The Path Forward: Getting started with Analytics QuotientThe Path Forward: Getting started with Analytics Quotient
The Path Forward: Getting started with Analytics Quotient
 
Making Money Out of Data
Making Money Out of DataMaking Money Out of Data
Making Money Out of Data
 
APM Center of Excellence Drives Improved Business Results at Itau Unibanco
APM Center of Excellence Drives Improved Business Results at Itau UnibancoAPM Center of Excellence Drives Improved Business Results at Itau Unibanco
APM Center of Excellence Drives Improved Business Results at Itau Unibanco
 
Run Learning Like a Business
Run Learning Like a BusinessRun Learning Like a Business
Run Learning Like a Business
 
Building Reports That Fly
Building Reports That FlyBuilding Reports That Fly
Building Reports That Fly
 
Draft - Digital Transformation Rough Plan.pdf
Draft - Digital Transformation Rough Plan.pdfDraft - Digital Transformation Rough Plan.pdf
Draft - Digital Transformation Rough Plan.pdf
 
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
 
Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability
 
ROI-Institute-Brochure1
ROI-Institute-Brochure1ROI-Institute-Brochure1
ROI-Institute-Brochure1
 

More from Splunk

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routineSplunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTVSplunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank InternationalSplunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College LondonSplunk
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSplunk
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - KeynoteSplunk
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform SessionSplunk
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 
Inside SecOps at bet365
Inside SecOps at bet365 Inside SecOps at bet365
Inside SecOps at bet365 Splunk
 
Best of .conf22 Session Recommendations
Best of .conf22 Session RecommendationsBest of .conf22 Session Recommendations
Best of .conf22 Session RecommendationsSplunk
 

More from Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 
Inside SecOps at bet365
Inside SecOps at bet365 Inside SecOps at bet365
Inside SecOps at bet365
 
Best of .conf22 Session Recommendations
Best of .conf22 Session RecommendationsBest of .conf22 Session Recommendations
Best of .conf22 Session Recommendations
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Taking Splunk to the Next Level - Management

  • 1. Taking Splunk to the Next Level for Management Doug May Director, Global Business Value Consulting Splunk> May 7, 2015
  • 2.
  • 3. Help Splunk customers, prospects, and partners document the projected and already realized business value of making machine data accessible, usable, and valuable for everyone Common Deliverables: › CFO-Ready Business Cases › Value Realization Studies › Adoption Roadmaps and Maturity Assessments › Customer and Use Case Benchmarks Business Value Consulting @Splunk 3
  • 4. Focusing on Value Takes it to the Next Level 4 Your process requires it Create and maintain visibility Replicate success across the organization Accelerate enterprise adoption Maximize business results
  • 5. Splunk is a Hidden Gem 5 Way cool, dude. What business value do I get? I’m invincible!
  • 6. Top Challenges to Documenting Value Lack of Splunk and Industry Benchmarks x Data Lack of Tools to Make Value Measurement Easy x Tools Not Enough Time to Assess Your Value x Time
  • 7. Splunk Can Help Documenting Value All Splunk Tools Are Available to All of You ToolsTime Tools, Content and Team Will Save You Time Access to Splunk and Industry Benchmarks Data
  • 8. Best Practices for Documenting & Positioning Value Taking your Splunk deployment to the next level 4 Measure and Track Your Success 1 Align with Key Business Objectives Qualify and Quantify Business Value 2 3 Incremental Steps with a Big Picture Plan
  • 9. Value is in the Eye of the Beholder 1 Align with Key Business Objectives Did you know you can save 15% on your car insurance when you call Geico? Is that important to you? Maybe it’s not.
  • 10. Link your project to important goals and strategies to prioritize your project REAL EXAMPLE -Aligning with Company Priorities 10 Profit Double revenues while increasing margins Productivity Design and implement to most effective and efficient business system People Attract, engage, and retain the best talent Partners Become a critical part of our customers’ growth strategies Portfolio Double servings per day and be #1 provider Planet Create advantage by fulfilling our Live Positively commitments “We also launched a productivity and reinvestment program to create $550 million to $650 million in annual savings by 2015. By freeing up resources via supply- chain optimization, improved marketing effectiveness, operational excellence and systems standardization, we can invest more in innovation, marketing and additional “feet on the street” to drive our growth.” - CEO From investor presentations, annual reports, and executive presentations
  • 11. Steps to Qualify Value • Align your project with something strategic • Talk with influential and knowledgeable people • Document why something should change or be added • Describe the current challenges or barriers • Identify the “desired” state • Summarize and socialize - gain support Qualify and Quantify Business Value 2
  • 12. Qualifying Value Example 12 Visibility to Environment Health & User Exp.  Brute force approach providing visibility to key processes isn’t working and won’t scale  Operations still lacks complete end-to-end visibility to the environment’s health, use and trends  Blinds spots still exist in monitoring and data access for Operations which could help improve troubleshooting and uptime / availability Incident / Issue Notification  Brute force approach to proactive monitoring isn’t working consistently and won’t scale  There’s a “Waterfall effect” – small issues go without broader notification triggering other issues eventually leading to a bigger incident  Users are aware of issues before Operations and call the helpdesk  All the lights are “green” but still ~65% of incidents overall are reported first by the business Troubleshooting Incidents / Issues  Operations troubleshooting is cumbersome and suboptimal  It’s still manual across IT silos  It’s difficult to find root cause of incidents quickly  Performance issues are difficult to resolve  Outages and impact are elongated due to manual efforts and silos  Teams are distracted from their core work when they’re troubleshooting Recurring Incidents / Issues  The Problem Management process isn’t working because there are many high severity incidents still without root cause determined  As a result, Operations is solving the same problems again and again  Opportunities exist to improve on incident avoidance since @25%+ of incidents are repeats DESIRED STATE VISION: Complete visibility to environment health & trends across full application stack for all stakeholders Proactively avoid issues before the business is impacted Reduce MTTR with rapid root cause analysis
  • 13. Quantifying Value with Splunk Tools Financial Analysis Made Easy • Over 40 Value Calculators • Driven by Actual Customer Results • Complete Financial Analysis • Best Practice TCO Models Don’t Forget • Follow the Impact • Capture All the Value • Summarize and Socialize 13
  • 14. Interactive Value Assessment (IVA) Highlights ThepowerofSplunkvalueinasimplepackage Target your business case Calculate value seamlessly Be credible Deliver value on the spot! Choose 1 or many Groups 45 Value Calculators Automatically surface those that are relevant Built-in Industry Benchmarks and Customer Case Studies Presentation options of benefit summaries & financial analysis
  • 16. ExecuteAgainst a Strategy Take directional, incremental steps • Avoid being reactive – don’t drive by data source • Develop a plan to expand Splunk • Link the plan to strategic company goals • Use Splunk tools and benchmarks to document and quantify the anticipated value • Set baselines for success • Commit to measure value realized post deployment 3 Incremental Steps with a Big Picture Plan
  • 17. What Your Splunk Strategy Might Look Like
  • 18. Measuring & Tracking Success Helping you take it to the next level • Demonstrating success will help further the cause • Tell the story of your Splunk usage • Compare your success against Splunk customer benchmarks • Assess your usage and staffing maturity • Then bring it all together 4 Measure and Track Your Success Value Realization Usage Maturity Skills Readiness
  • 19. Measure Success with Value Realization “Money follows money well spent” • Summarize BEFORE and AFTER Splunk • Capture metrics of improvement • Socialize your success
  • 20. Usage Maturity Assessment – IT OPS Drive expansion through highlighting value opportunities 20 Groups % Data Indexed Log Collection Incident Investigation Root Cause Analysis Proactive Alerting Operational Dashboards Business Analytic s Capacity PlanningLevel 1 Triage Level 2 & 3 Escalation Virtualization 0% OS - Unix 25% OS - Windows 0% Storage 33% Network 100% = Splunk fully in use = Splunk partially in use = Splunk not in use
  • 21. Usage Maturity Assessments – APP DEV Drive expansion through highlighting value opportunities 21 Top Apps % Indexed Evaluate and Assess Needs Develop and Release Data Collection Business Insight Test Failure Analysis Defect Investigation SAP 0% Warehouse Mgt 0% E-Commerce Website 50% Call Center 80% = Splunk fully in use = Splunk partially in use = Splunk not in use
  • 22. Usage Maturity Assessments – SECURITY Drive expansion through highlighting value opportunities 22 Data Sources % Indexed Log Collection Level 1 Triage Monitoring / Alerting Investigations Incident Response Compliance Reporting Routine Log Reviews Threat Intel: (3rd Party) 70% Threat Intel: (OS Blacklist) 70% Network: (Firewall) 90% Network: (IDS/IPS) 90% Endpoint: (PCLM) 80% Access & Identity Mgt 75% = Splunk fully in use = Splunk partially in use = Splunk not in use CurrentlyhandledbyMSSP
  • 23. Usage Maturity Assessments – SECURITY CONTROLS Drive expansion through highlighting value opportunities 23 Critical Control In Place? Monitor unauthorized devices or software Monitor unmanaged devices or software Monitor configuration compliance Monitor patch compliance Monitor malware defense Monitor application software security Monitor wireless access control Analyze audit logs with time-based correlation Critical Control In Place? Monitor use of ports, protocols, and services Monitor controlled use of admin privileges Monitor perimeter IDS Monitor controlled / uncontrolled access Monitor orphan, expired, miss use of accounts Monitor potential exfiltration of information Monitor secure IP restriction policies Maintain data going back months = Splunk fully in use = Splunk partially in use = Splunk not in use
  • 24. AReal Customer Example - Operations MostcommonusesofSplunkdeliveringvalue Business Service Components % of Data Indexed Log / Data Collection Incident Investigation Root Cause Analysis Proactive Alerting Operational Dashboards Business AnalyticsLevel 1 Triage Level 2 & 3 Escalation Custom Web Apps 80% 3rd Party Web-Apps 100% Apps 75% Web Server 50% Database 100% OS 100% Network 95% = Splunk fully in use = Splunk partially in use = Splunk not in use E-Commerce Site
  • 25. Splunk IT Operations Benchmarks Know what toproject and/or compare how you’re doing 25 Reduced Sev1 and Sev2 incidents by 43% Reduced MTTR by 95% and reduced escalations by 50% Improved capacity utilization and avoided $200k in infrastructure 15% to 45% reduction in system incidents 70% to 90% faster investigation of system incidents 67% to 82% reduction in financial impact from outages 5% to 20% optimization with server capacity allocation
  • 26. Splunk Application Support/Dev Benchmarks Know what toproject and/or compare how you’re doing 26 15% to 45% reduction in application incidents 70% to 90% faster investigation of QA defects and incidents 10% to 50% faster time to market 10% to 50% increase in value for key projects Went from 1 release/day to 8 because of Splunk Shortened their development cycles by 30% Reduced the number of incidents leading to 9M Euro per year in revenue recaptured
  • 27. Splunk Security & Compliance Benchmarks Know what toproject and/or compare how you’re doing 27 70% to 90% improvement with detection and research of events 70% to 90% faster investigation of security incidents 10% to 50% lower risks with data breaches, fraud and IP theft 70% to 90% reduction in compliance labor Reduced investigation effort by more than 75% Reduced the time to report on SAS70 compliance by 83% Reduced the number of security incidents by 80%
  • 28. Map Your Progressvs. Benchmarks Estimates based on Value Realization and Usage Maturity 28 Incident Avoidance Incident/Problem Investigation 15% 45%Splunk Benchmark 70% 90%Splunk Benchmark 35% 20% 10% 0% 0% 75% 50% 25% 25% 25% Groups Infrastructure Inventory Manufacturing Payroll Collaboration
  • 29. Splunk Staffing Readiness Be sure you have the staff and skills to maximize value 29 A successful and scalable deployment of Splunk relies on the orchestration of key roles and responsibilities, primarily centered around:  Architecture  Administration  User adoption (Power User)  Application development
  • 30. Basic Communication Framework 30 Architect Admin Works with power users to determine which data sources should be indexed to meet each department’s needs Scales the Splunk architecture to meet business demand Power Users Department Users Adds data sources to the Splunk platform according to business needs Assist power users with the development of advanced dashboards, alerting and reporting Maintains the Splunk SW and it’s infrastructure for optimal performance 1 Power user per department Provides basic support for new and existing reports and dashboards Works with their group to identify opportunities where Splunk can provide value
  • 31. Splunk Roles & Recommended Training 31 Splunk Roles Using Splunk Splunk Administration Searching and Reporting Creating Knowledge Objects Advanced Searching & Reporting Developing Apps with Splunk Developing with Splunk SDKs Architect Required Required Optional Optional Optional Optional Optional Admin Required Required Optional Optional Power User Required Required Required Optional Developer Required Optional Required Required Optional Required Optional for Splunk on-premises
  • 32. Splunk Power User Status Recommendation: 1power-user pergroup 32 Splunk Power User(s) Using Splunk Splunk Administration Searching and Reporting Creating Knowledge Objects Advanced Searching & Reporting Developing Apps with Splunk Developing with Splunk SDKs • Web • Anurag D. • Security • Josh H. • Infrastructure • Mike G. = Splunk training completed= Required = Optional = Training required but not completed = Optional training not completed Responsibilities • Works with their group to identify opportunities where Splunk can provide value • Collaborates with the Splunk admin(s) to add new data sources to address their requirements • Provides basic support for new and existing reports and dashboards to their group
  • 33. Map Your Roles & Highlight Training Gaps 33 Splunk Admin #name Splunk Developer #name Security Power User #name Collaboration Power User #name Database Power User #name CRM Power User #name Network Power User #name Financial Apps Power User #name Splunk Architect #name = Fully Trained = Partially Trained = Not assigned Web Power User #name Server Power User #name Your Company
  • 34. Bringing it all together
  • 35. Position Value in Expansion Area Taking it to the Next Level Value Opportunity: • faster detection, • faster investigation, • faster root cause analysis of application incidents • fewer developer escalation After 3 to 6 months After 3 to 6 months Document Success for Server & Network teams Document Success for App & DB teams Position Value in Expansion Area Application Development Value Opportunity: • faster test analysis, • faster investigation of pre- production bugs, • faster releases cycles Position Value in Expansion Area Security & Compliance Value Opportunity: • faster detection, faster triage, • faster investigation of security incidents Value Realized: • faster detection, • faster investigation, • faster root cause analysis of system incidents IT Operations Application Support
  • 36. Success from Current Use PositiveROIachievedon~$1.7Mspendtodate Proactively monitoring a $1.5B revenue platform entirely with Splunk. Reducing manual effort and impact Avoiding revenue displacement and loss “We almost had an outage today. We saw some things in Splunk. That saved us a 1.5 hour incident and almost $300,000.” Opportunities: Get full stack of data in for additional efficiencies (network, VM, storage, DB) Web & Mobile 42% reduction in business impact Avoiding revenue loss of $2.3M/year Value $2.5M/year | 2,445 hours/year Rapid search and investigation of security incidents. Went from reactive to proactive. Reducing manual effort, impact and risk Innovating – search to alert to IDS “If we didn’t have Splunk, I am not sure what we would have done with the April incident.” Opportunities: Apply to PCI readiness saving GRC team effort, enabling continuous compliance. 50% reduction in incident investigation Avoiding 16k+ hours/year Value $1.3M/year | 16,380 hours/year Security 20,414 Yearly Hours 50% reduction in incident investigation (when leveraged) Value $124,102/yr* | 1,589 hours/yr* Infrastructure Resolving complex issues rapidly; opportunity for even more value. Reducing manual effort and impact Realizing only partial benefits today “When there’s a problem, it’s tricky to figure out where it is. Splunk’s a helpful tool to have.” Opportunities: Get full environment data in. Use more consistently across team to capture value. $3.92M Yearly Value See detailed calculations of value, usage adoption, and staffing maturity schedules in the Appendix. Benchmarks Used for Infrastructure Calcs From a real Splunk customer
  • 37. Functional Adoption Summary Comparing[customer]’s currentusageagainstthemostcommonSplunkusesdrivingvalue IT & APPLICATION OPERATIONS % Usable Data Indexed Log Collection Incident Investigation Root Cause Analysis Proactive Alerting Operational Dashboards Business Analytics Capacity PlanningLevel 1 Triage Level 2 & 3 Escalation Web & Mobile 75% NW*, VM, DB, Storage Infrastructure 20% DB, VM, Windows, Storage = Splunk fully in use = Splunk partially being used = Splunk not being used SECURITY & COMPLIANCE % Data Indexed Log Collection Level 1 Triage Monitoring / Alerting Investigations Incident Response Compliance Reporting Routine Log Reviews Security 80% 3rd party intel, AIM MSSP Refer to adoption charts for each team in the Appendix for more details From a real Splunk customer
  • 38. NOTE: VMware data not ingested. Storage visibility is limited to VM instance. Host and SAN would be beneficial. * Network data is being collected today but in a separate Splunk instance due to be joined later this year. Functional Adoption – Web Team .Com Business Service % Data Indexed Log Collection Incident Investigation Root Cause Analysis Proactive Alerting Operational Dashboards Business Analytics Capacity Plannin gLevel 1 Triage Level 2 & 3 Escalation Web/App Server 100% Database 0% Virtualization 10% OS 100% Storage 20% Network* 90% = Splunk fully in use = Splunk partially being used = Splunk not being used From a real Splunk customer
  • 39. Functional Adoption – Security Controls 39 Critical Control In Place? Monitor unauthorized devices or software Monitor unmanaged devices or software Monitor configuration compliance Monitor patch compliance Monitor malware defense Monitor application software security Monitor wireless access control Analyze audit logs with time-based correlation Critical Control In Place? Monitor use of ports, protocols, and services Monitor controlled use of admin privileges Monitor perimeter IDS Monitor controlled / uncontrolled access Monitor orphan, expired, miss use of accounts Monitor potential exfiltration of information Monitor secure IP restriction policies Maintain data going back months = Splunk fully in use = Splunk partially in use = Splunk not in use Current assessment of Splunk usage at [customer] for the SANS 20 security controls. From a real Splunk customer
  • 40. [customer]’s Splunk Team 40 = Fully Trained Splunk Architect #name Splunk Admin #name Splunk Developer #name Security Power User #name Collaboration Power User #name Labor Power User #name Mobile CRM Power User #name Infrastructure Power User #name GSIT Power User #name Splunk Architect #name = Partially Trained = Not assigned Splunk Admin #name Web/Mobile Power User #name Warehouse Power User #name From a real Splunk customer
  • 41. Sempra Energy Mitigates Security Risk 41 • One of the largest utilities in the US, serving 20M+ customers • Headquartered in San Diego, CA • 17,000+ employees Splunk Use: – Rapid search capabilities for high volume logs – Consumption of any type of data (structured, unstructured) from hundreds of applications – Event correlation complementing SIEM Value Delivered: – Reduced MTTR for identifying threats to minutes – Saved $1.2M in help desk charges – faster MTTR for BYOD account logins – Avoided fines by maintaining NERC compliance – Tracked anomalous incidents across several systems to identify Advanced Threats
  • 42. Splunk Security & Compliance Benchmarks Know what toproject and/or compare how you’re doing 42 70% to 90% improvement with detection and research of events 70% to 90% faster investigation of security incidents 10% to 50% lower risks with data breaches, fraud and IP theft 70% to 90% reduction in compliance labor Reduced investigation effort by more than 75% Reduced the time to report on SAS70 compliance by 83% Reduced the number of security incidents by 80%
  • 43. Future Value Opportunities(1of2) AProactiveOperations approachwillreduceimpacthours Collaboration toavoid171,348employeehours/year Basic monitoring puts Collaboration at risk as it grows from ~6k to 200k+ users and becomes the portal to key apps Proactively monitor to avoid incidents and employee productivity loss (171k hrs) Speed incident investigation and resolution, reducing manual effort “We expect 20% more issues as we go from @6,000 to 200,000+ users.” Incidents reduced by 25% | Impact 67% Avoiding 34 hours/year of BII time Value $5.2M/year | 1,501 IT hours/year Collaboration Shift from reactive to proactive improving Labor stability and availability enabling maximum scheduling efficiency Proactively monitor to avoid incidents and protect Partner productivity Speed incident investigation and resolution, reducing manual effort “Last Tuesday if we got a heads up from Splunk we could have resolved it in 1 hour instead of 5.” 70% reduction in incident investigation Sev1 time reduced 96 hours/year Value $433,544/year | 5,549 hours/year Labor Scheduling Become more proactive further leveraging centralized, real-time data to avoid and reduce impact time Proactively monitor to avoid incidents and business impact Further reduce investigation effort over current, isolated log search solution “If we had a dashboard showing us the app, database, server, and network health, we could get ahead of potential issues and resolve them before impact.” 25% reduction in incidents Avoiding 12 hours/year impact time Value $1.0M/year | 828 hours/year Warehouse 19,725 Yearly Hours $7.5M Yearly Value From a real Splunk customer
  • 44. Best Practices for Documenting & Positioning Value Taking your Splunk deployment to the next level 4 Measure and Track Your Success 1 Align with Key Business Objectives Qualify and Quantify Business Value 2 3 Incremental Steps with a Big Picture Plan
  • 45. Ask Me or Your Account Team For… • The Interactive Value Assessment (IVA) Excel ROI model • Usage adoption maturity templates • Splunk staff readiness templates • Common benefits of Splunk and customer benchmarks
  • 46. Copyright © 2014 Splunk Inc. Questions? Thank you! Doug May dmay@splunk.com

Editor's Notes

  1. Your process requires it 85% of investments over 50,000 USD require a formal business case (IDC) Create or maintain visibility to Splunk’s strategic importance Prioritize Splunk investment over other projects Facilitate continued support and resources (FTE, maintenance, etc) Ease approval of future resource requests People, infrastructure, Splunk license, professional services Supporting renewals; staff departures Eliminate any doubt of Splunk’s value to your organization Help Other Succeed in your organization If they understand what you’ve done and what value you’ve received, they can do the same thing Promote yourself or your team Show your success to help promote your people and your own accomplishments
  2. You all know what a great platform Splunk is. So if it’s so great, why does our team exist? Well…Users love Splunk and clearly understand the value it delivers to them operationally, but they struggle with articulating it to their senior management in business terms. This leaves executives asking what THEY get from Splunk. They understand their people love it, but can’t put dollars, euros, yuan, or yen on it easily. The Value that Splunk brings to the business is a hidden gem for most executives. When they are able to understand the business value it delivers for them, in most cases it’s priceless.
  3. Sempra Energy is one of the largest utilities in the US, serving over 20 million customers in Southern California. They were looking to gain more visibility into security issues and comply with NERC, yet Sempra had limited reporting capabilities, which made it difficult to let management know about the scope of security problems. Search queries took 4 – 5 hours and required custom Perl scriptsm and Correlating data proved to be challenging. In addition, Sempra wanted to mitigate BYOD (bring your own device) risks. Many of Sempra’s employees were using their own mobile devices, which raised additional security risks. Lockouts were common due to password synchronization issues. Using Splunk, Sempra consumed and indexed data coming from hundreds of applications, which enabled them to search more rapidly, and create dashboards and reports to be used by management and for compliance purposes. They could track security incidents across several systems, and build a library of security relevant searches which complemented their SIEM. Investigating security incidents went from hours to minutes. With BYOD, Sempra built a dashboard for the helpdesk to quickly identify the source of the failed logins. In addition, Sempra used Splunk to identify the number of active users that their help desk vendor was supporting. Sempra pays the help desk vendor based on the number of user accounts, and getting an accurate number of active user accounts allowed them to save $1.2 million /year. For NERC review purposes, Sempra captured and retained firewall and domain authentication logs. NERC-designated cyber assets log need to be collected and retained for 90 days. If an asset did not generate a log daily, Splunk would generate a missing source alert so that IT can investigate and remediate quickly, thereby avoiding any fines related to NERC.