SlideShare a Scribd company logo
1 of 46
Taking Splunk to the
Next Level for Management
Doug May
Director, Global Business Value Consulting
Splunk>
May 7, 2015
Help Splunk customers, prospects, and partners
document the projected and already realized
business value of making machine data accessible,
usable, and valuable for everyone
Common Deliverables:
› CFO-Ready Business Cases
› Value Realization Studies
› Adoption Roadmaps and Maturity Assessments
› Customer and Use Case Benchmarks
Business Value Consulting @Splunk
3
Focusing on Value Takes it to the Next Level
4
Your process requires it
Create and maintain visibility
Replicate success across the organization
Accelerate enterprise adoption
Maximize business results
Splunk is a Hidden Gem
5
Way cool,
dude.
What business
value do I get?
I’m invincible!
Top Challenges to Documenting Value
Lack of Splunk
and Industry
Benchmarks
x
Data
Lack of Tools to
Make Value
Measurement Easy
x
Tools
Not Enough
Time to Assess
Your Value
x
Time
Splunk Can Help Documenting Value
All Splunk Tools
Are Available to
All of You
ToolsTime
Tools, Content
and Team Will
Save You Time
Access to Splunk
and Industry
Benchmarks
Data
Best Practices for Documenting & Positioning Value
Taking your Splunk deployment to the next level
4
Measure and
Track Your
Success
1
Align with Key
Business
Objectives
Qualify and
Quantify
Business Value
2 3
Incremental
Steps with a Big
Picture Plan
Value is in the Eye of the Beholder
1
Align with Key
Business
Objectives
Did you know you can save
15% on your car insurance
when you call Geico?
Is that important to you?
Maybe it’s not.
Link your project to important goals and strategies to prioritize your project
REAL EXAMPLE -Aligning with Company Priorities
10
Profit
Double revenues while
increasing margins
Productivity
Design and implement to
most effective and
efficient business system
People
Attract, engage, and
retain the best talent
Partners
Become a critical part of
our customers’ growth
strategies
Portfolio
Double servings per day
and be #1 provider
Planet
Create advantage by
fulfilling our Live
Positively commitments
“We also launched a productivity and
reinvestment program to create $550
million to $650 million in annual savings by
2015. By freeing up resources via supply-
chain optimization, improved marketing
effectiveness, operational excellence and
systems standardization, we can invest more
in innovation, marketing and additional
“feet on the street” to drive our growth.” -
CEO
From investor presentations, annual reports,
and executive presentations
Steps to Qualify Value
• Align your project with something strategic
• Talk with influential and knowledgeable people
• Document why something should change or be added
• Describe the current challenges or barriers
• Identify the “desired” state
• Summarize and socialize - gain support
Qualify and
Quantify
Business Value
2
Qualifying Value Example
12
Visibility to Environment Health & User Exp.
 Brute force approach providing visibility to key
processes isn’t working and won’t scale
 Operations still lacks complete end-to-end visibility
to the environment’s health, use and trends
 Blinds spots still exist in monitoring and data access
for Operations which could help improve
troubleshooting and uptime / availability
Incident / Issue Notification
 Brute force approach to proactive monitoring isn’t
working consistently and won’t scale
 There’s a “Waterfall effect” – small issues go
without broader notification triggering other issues
eventually leading to a bigger incident
 Users are aware of issues before Operations and
call the helpdesk
 All the lights are “green” but still ~65% of incidents
overall are reported first by the business
Troubleshooting Incidents / Issues
 Operations troubleshooting is cumbersome and
suboptimal
 It’s still manual across IT silos
 It’s difficult to find root cause of incidents quickly
 Performance issues are difficult to resolve
 Outages and impact are elongated due to manual
efforts and silos
 Teams are distracted from their core work when
they’re troubleshooting
Recurring Incidents / Issues
 The Problem Management process isn’t working
because there are many high severity incidents still
without root cause determined
 As a result, Operations is solving the same problems
again and again
 Opportunities exist to improve on incident avoidance
since @25%+ of incidents are repeats
DESIRED STATE VISION:
Complete visibility to
environment health & trends
across full application stack for all
stakeholders
Proactively avoid issues before
the business is impacted
Reduce MTTR with rapid root
cause analysis
Quantifying Value with Splunk Tools
Financial Analysis Made Easy
• Over 40 Value Calculators
• Driven by Actual Customer Results
• Complete Financial Analysis
• Best Practice TCO Models
Don’t Forget
• Follow the Impact
• Capture All the Value
• Summarize and Socialize
13
Interactive Value Assessment (IVA) Highlights
ThepowerofSplunkvalueinasimplepackage
Target your business case Calculate value seamlessly
Be credible Deliver value on the spot!
Choose 1 or many
Groups
45 Value Calculators
Automatically surface
those that are relevant
Built-in Industry
Benchmarks and
Customer Case Studies
Presentation options
of benefit summaries
& financial analysis
IVA Demo
ExecuteAgainst a Strategy
Take directional, incremental steps
• Avoid being reactive – don’t drive by data source
• Develop a plan to expand Splunk
• Link the plan to strategic company goals
• Use Splunk tools and benchmarks to document and
quantify the anticipated value
• Set baselines for success
• Commit to measure value realized post deployment
3
Incremental
Steps with a Big
Picture Plan
What Your Splunk Strategy Might Look Like
Measuring & Tracking Success
Helping you take it to the next level
• Demonstrating success will help further the cause
• Tell the story of your Splunk usage
• Compare your success against Splunk customer
benchmarks
• Assess your usage and staffing maturity
• Then bring it all together
4
Measure and
Track Your
Success
Value
Realization
Usage
Maturity
Skills
Readiness
Measure Success with Value Realization
“Money follows money well spent”
• Summarize
BEFORE and
AFTER Splunk
• Capture
metrics of
improvement
• Socialize your
success
Usage Maturity Assessment – IT OPS
Drive expansion through highlighting value opportunities
20
Groups
% Data
Indexed
Log
Collection
Incident
Investigation
Root Cause
Analysis
Proactive
Alerting
Operational
Dashboards
Business
Analytic
s
Capacity
PlanningLevel 1
Triage
Level 2 &
3
Escalation
Virtualization 0%
OS - Unix 25%
OS - Windows 0%
Storage 33%
Network 100%
= Splunk fully in use = Splunk partially in use = Splunk not in use
Usage Maturity Assessments – APP DEV
Drive expansion through highlighting value opportunities
21
Top Apps
%
Indexed
Evaluate and Assess Needs Develop and Release
Data Collection Business Insight
Test Failure
Analysis
Defect
Investigation
SAP 0%
Warehouse Mgt 0%
E-Commerce Website 50%
Call Center 80%
= Splunk fully in use = Splunk partially in use = Splunk not in use
Usage Maturity Assessments – SECURITY
Drive expansion through highlighting value opportunities
22
Data
Sources
%
Indexed
Log
Collection
Level 1
Triage
Monitoring /
Alerting
Investigations
Incident
Response
Compliance
Reporting
Routine
Log
Reviews
Threat Intel:
(3rd Party)
70%
Threat Intel:
(OS Blacklist)
70%
Network:
(Firewall)
90%
Network:
(IDS/IPS)
90%
Endpoint:
(PCLM)
80%
Access &
Identity Mgt
75%
= Splunk fully in use = Splunk partially in use = Splunk not in use
CurrentlyhandledbyMSSP
Usage Maturity Assessments – SECURITY CONTROLS
Drive expansion through highlighting value opportunities
23
Critical Control In Place?
Monitor unauthorized devices or software
Monitor unmanaged devices or software
Monitor configuration compliance
Monitor patch compliance
Monitor malware defense
Monitor application software security
Monitor wireless access control
Analyze audit logs with time-based correlation
Critical Control In Place?
Monitor use of ports, protocols, and services
Monitor controlled use of admin privileges
Monitor perimeter IDS
Monitor controlled / uncontrolled access
Monitor orphan, expired, miss use of accounts
Monitor potential exfiltration of information
Monitor secure IP restriction policies
Maintain data going back months
= Splunk fully in use = Splunk partially in use = Splunk not in use
AReal Customer Example - Operations
MostcommonusesofSplunkdeliveringvalue
Business
Service
Components
% of
Data
Indexed
Log / Data
Collection
Incident Investigation
Root Cause
Analysis
Proactive
Alerting
Operational
Dashboards
Business
AnalyticsLevel 1
Triage
Level 2 & 3
Escalation
Custom Web Apps 80%
3rd Party Web-Apps 100%
Apps 75%
Web Server 50%
Database 100%
OS 100%
Network 95%
= Splunk fully in use = Splunk partially in use = Splunk not in use
E-Commerce Site
Splunk IT Operations Benchmarks
Know what toproject and/or compare how you’re doing
25
Reduced Sev1 and
Sev2 incidents by 43%
Reduced MTTR by
95% and reduced
escalations by 50%
Improved capacity
utilization and avoided
$200k in infrastructure
15% to 45% reduction in system incidents
70% to 90% faster investigation of system incidents
67% to 82% reduction in financial impact from outages
5% to 20% optimization with server capacity allocation
Splunk Application Support/Dev Benchmarks
Know what toproject and/or compare how you’re doing
26
15% to 45% reduction in application incidents
70% to 90% faster investigation of QA defects and incidents
10% to 50% faster time to market
10% to 50% increase in value for key projects
Went from 1
release/day to 8
because of Splunk
Shortened their
development
cycles by 30%
Reduced the number of
incidents leading to 9M
Euro per year in revenue
recaptured
Splunk Security & Compliance Benchmarks
Know what toproject and/or compare how you’re doing
27
70% to 90% improvement with detection and research of events
70% to 90% faster investigation of security incidents
10% to 50% lower risks with data breaches, fraud and IP theft
70% to 90% reduction in compliance labor
Reduced investigation
effort by more than 75%
Reduced the time to
report on SAS70
compliance by 83%
Reduced the number of
security incidents by 80%
Map Your Progressvs. Benchmarks
Estimates based on Value Realization and Usage Maturity
28
Incident Avoidance Incident/Problem Investigation
15% 45%Splunk Benchmark 70% 90%Splunk Benchmark
35%
20%
10%
0%
0%
75%
50%
25%
25%
25%
Groups
Infrastructure
Inventory
Manufacturing
Payroll
Collaboration
Splunk Staffing Readiness
Be sure you have the staff and skills to maximize value
29
A successful and scalable deployment of
Splunk relies on the orchestration of key
roles and responsibilities, primarily
centered around:
 Architecture
 Administration
 User adoption (Power User)
 Application development
Basic Communication Framework
30
Architect
Admin
Works with power users to determine
which data sources should be indexed
to meet each department’s needs
Scales the Splunk architecture to meet
business demand
Power Users Department Users
Adds data sources to the Splunk
platform according to business needs
Assist power users with the
development of advanced dashboards,
alerting and reporting
Maintains the Splunk SW and it’s
infrastructure for optimal performance
1 Power user per department
Provides basic support for new and existing reports
and dashboards
Works with their group to identify opportunities
where Splunk can provide value
Splunk Roles & Recommended Training
31
Splunk
Roles
Using
Splunk
Splunk
Administration
Searching
and
Reporting
Creating
Knowledge
Objects
Advanced
Searching &
Reporting
Developing
Apps with
Splunk
Developing
with Splunk
SDKs
Architect Required Required Optional Optional Optional Optional Optional
Admin Required Required Optional Optional
Power User Required Required Required Optional
Developer Required Optional Required Required Optional Required Optional
for Splunk on-premises
Splunk Power User Status
Recommendation: 1power-user pergroup
32
Splunk
Power User(s)
Using
Splunk
Splunk
Administration
Searching and
Reporting
Creating
Knowledge
Objects
Advanced
Searching &
Reporting
Developing
Apps with
Splunk
Developing
with Splunk
SDKs
• Web
• Anurag D.
• Security
• Josh H.
• Infrastructure
• Mike G.
= Splunk training completed= Required = Optional = Training required but not completed = Optional training not completed
Responsibilities
• Works with their group to identify opportunities where Splunk can provide value
• Collaborates with the Splunk admin(s) to add new data sources to address their requirements
• Provides basic support for new and existing reports and dashboards to their group
Map Your Roles & Highlight Training Gaps
33
Splunk Admin
#name
Splunk
Developer
#name
Security
Power User
#name
Collaboration
Power User
#name
Database
Power User
#name
CRM
Power User
#name
Network
Power User
#name
Financial Apps
Power User
#name
Splunk Architect
#name
= Fully Trained = Partially Trained = Not assigned
Web
Power User
#name
Server
Power User
#name
Your Company
Bringing it all together
Position Value in
Expansion Area
Taking it to the Next Level
Value Opportunity:
• faster detection,
• faster investigation,
• faster root cause
analysis of application
incidents
• fewer developer
escalation
After 3 to 6
months
After 3 to 6
months
Document Success for
Server & Network teams
Document Success for
App & DB teams
Position Value in
Expansion Area
Application
Development
Value Opportunity:
• faster test analysis,
• faster investigation of pre-
production bugs,
• faster releases cycles
Position Value in
Expansion Area
Security &
Compliance
Value Opportunity:
• faster detection, faster triage,
• faster investigation of security incidents
Value Realized:
• faster detection,
• faster investigation,
• faster root cause
analysis of system
incidents
IT Operations
Application
Support
Success from Current Use
PositiveROIachievedon~$1.7Mspendtodate
Proactively monitoring a $1.5B revenue
platform entirely with Splunk.
Reducing manual effort and impact
Avoiding revenue displacement and loss
“We almost had an outage today. We saw
some things in Splunk. That saved us a 1.5
hour incident and almost $300,000.”
Opportunities:
Get full stack of data in for additional
efficiencies (network, VM, storage, DB)
Web & Mobile
42% reduction in business impact
Avoiding revenue loss of $2.3M/year
Value $2.5M/year | 2,445 hours/year
Rapid search and investigation of security
incidents. Went from reactive to proactive.
Reducing manual effort, impact and risk
Innovating – search to alert to IDS
“If we didn’t have Splunk, I am not sure what
we would have done with the April incident.”
Opportunities:
Apply to PCI readiness saving GRC team
effort, enabling continuous compliance.
50% reduction in incident investigation
Avoiding 16k+ hours/year
Value $1.3M/year | 16,380 hours/year
Security
20,414
Yearly Hours
50% reduction in incident
investigation (when leveraged)
Value $124,102/yr* | 1,589 hours/yr*
Infrastructure
Resolving complex issues rapidly;
opportunity for even more value.
Reducing manual effort and impact
Realizing only partial benefits today
“When there’s a problem, it’s tricky to
figure out where it is. Splunk’s a helpful
tool to have.”
Opportunities:
Get full environment data in. Use more
consistently across team to capture value.
$3.92M
Yearly Value
See detailed calculations of value, usage adoption, and staffing maturity schedules in the Appendix. Benchmarks Used for Infrastructure Calcs
From a real Splunk
customer
Functional Adoption Summary
Comparing[customer]’s currentusageagainstthemostcommonSplunkusesdrivingvalue
IT &
APPLICATION
OPERATIONS
% Usable
Data
Indexed
Log
Collection
Incident Investigation
Root Cause
Analysis
Proactive
Alerting
Operational
Dashboards
Business
Analytics
Capacity
PlanningLevel 1
Triage
Level 2 & 3
Escalation
Web & Mobile
75%
NW*, VM,
DB, Storage
Infrastructure
20%
DB, VM,
Windows,
Storage
= Splunk fully in use = Splunk partially being used = Splunk not being used
SECURITY &
COMPLIANCE
% Data
Indexed
Log
Collection
Level 1
Triage
Monitoring /
Alerting
Investigations
Incident
Response
Compliance
Reporting
Routine Log
Reviews
Security
80%
3rd party
intel, AIM
MSSP
Refer to adoption charts for each team
in the Appendix for more details
From a real Splunk
customer
NOTE: VMware data not ingested. Storage visibility is limited to VM instance. Host and SAN would be beneficial.
* Network data is being collected today but in a separate Splunk instance due to be joined later this year.
Functional Adoption – Web Team
.Com Business
Service
% Data
Indexed
Log
Collection
Incident Investigation Root
Cause
Analysis
Proactive
Alerting
Operational
Dashboards
Business
Analytics
Capacity
Plannin
gLevel 1
Triage
Level 2 & 3
Escalation
Web/App Server 100%
Database 0%
Virtualization 10%
OS 100%
Storage 20%
Network* 90%
= Splunk fully in use = Splunk partially being used = Splunk not being used
From a real Splunk
customer
Functional Adoption – Security Controls
39
Critical Control In Place?
Monitor unauthorized devices or software
Monitor unmanaged devices or software
Monitor configuration compliance
Monitor patch compliance
Monitor malware defense
Monitor application software security
Monitor wireless access control
Analyze audit logs with time-based correlation
Critical Control In Place?
Monitor use of ports, protocols, and services
Monitor controlled use of admin privileges
Monitor perimeter IDS
Monitor controlled / uncontrolled access
Monitor orphan, expired, miss use of accounts
Monitor potential exfiltration of information
Monitor secure IP restriction policies
Maintain data going back months
= Splunk fully in use = Splunk partially in use = Splunk not in use
Current assessment of Splunk usage at [customer] for the SANS 20 security controls.
From a real Splunk
customer
[customer]’s Splunk Team
40
= Fully Trained
Splunk Architect
#name
Splunk Admin
#name
Splunk
Developer
#name
Security
Power User
#name
Collaboration
Power User
#name
Labor
Power User
#name
Mobile CRM
Power User
#name
Infrastructure
Power User
#name
GSIT
Power User
#name
Splunk Architect
#name
= Partially Trained = Not assigned
Splunk Admin
#name
Web/Mobile
Power User
#name
Warehouse
Power User
#name
From a real Splunk
customer
Sempra Energy Mitigates Security Risk
41
• One of the largest utilities in the US,
serving 20M+ customers
• Headquartered in San Diego, CA
• 17,000+ employees
Splunk Use:
– Rapid search capabilities for high volume logs
– Consumption of any type of data (structured,
unstructured) from hundreds of applications
– Event correlation complementing SIEM
Value Delivered:
– Reduced MTTR for identifying threats to minutes
– Saved $1.2M in help desk charges – faster MTTR for
BYOD account logins
– Avoided fines by maintaining NERC compliance
– Tracked anomalous incidents across several systems to
identify Advanced Threats
Splunk Security & Compliance Benchmarks
Know what toproject and/or compare how you’re doing
42
70% to 90% improvement with detection and research of events
70% to 90% faster investigation of security incidents
10% to 50% lower risks with data breaches, fraud and IP theft
70% to 90% reduction in compliance labor
Reduced investigation
effort by more than 75%
Reduced the time to
report on SAS70
compliance by 83%
Reduced the number of
security incidents by 80%
Future Value Opportunities(1of2)
AProactiveOperations approachwillreduceimpacthours
Collaboration toavoid171,348employeehours/year
Basic monitoring puts Collaboration at risk
as it grows from ~6k to 200k+ users and
becomes the portal to key apps
Proactively monitor to avoid incidents and
employee productivity loss (171k hrs)
Speed incident investigation and resolution,
reducing manual effort
“We expect 20% more issues as we go from
@6,000 to 200,000+ users.”
Incidents reduced by 25% | Impact 67%
Avoiding 34 hours/year of BII time
Value $5.2M/year | 1,501 IT hours/year
Collaboration
Shift from reactive to proactive improving
Labor stability and availability enabling
maximum scheduling efficiency
Proactively monitor to avoid incidents and
protect Partner productivity
Speed incident investigation and
resolution, reducing manual effort
“Last Tuesday if we got a heads up from
Splunk we could have resolved it in 1 hour
instead of 5.”
70% reduction in incident investigation
Sev1 time reduced 96 hours/year
Value $433,544/year | 5,549 hours/year
Labor Scheduling
Become more proactive further leveraging
centralized, real-time data to avoid and
reduce impact time
Proactively monitor to avoid incidents
and business impact
Further reduce investigation effort over
current, isolated log search solution
“If we had a dashboard showing us the
app, database, server, and network health,
we could get ahead of potential issues and
resolve them before impact.”
25% reduction in incidents
Avoiding 12 hours/year impact time
Value $1.0M/year | 828 hours/year
Warehouse
19,725
Yearly Hours
$7.5M
Yearly Value
From a real Splunk
customer
Best Practices for Documenting & Positioning Value
Taking your Splunk deployment to the next level
4
Measure and
Track Your
Success
1
Align with Key
Business
Objectives
Qualify and
Quantify
Business Value
2 3
Incremental
Steps with a Big
Picture Plan
Ask Me or Your Account Team For…
• The Interactive Value Assessment
(IVA) Excel ROI model
• Usage adoption maturity templates
• Splunk staff readiness templates
• Common benefits of Splunk and
customer benchmarks
Copyright © 2014 Splunk Inc.
Questions? Thank you!
Doug May
dmay@splunk.com

More Related Content

What's hot

Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market OverviewOkta-Inc
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)Robert Crane
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportCAST
 
Introduction to Azure
Introduction to AzureIntroduction to Azure
Introduction to AzureRobert Crane
 
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature MappingMicrosoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature MappingIlyas F ☁☁☁
 
SharePoint Site Architecture: Flat, Deep or somewhere in the middle?
SharePoint Site Architecture: Flat, Deep or somewhere in the middle?SharePoint Site Architecture: Flat, Deep or somewhere in the middle?
SharePoint Site Architecture: Flat, Deep or somewhere in the middle?Joanne Klein
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing riskssripriya78
 
2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀 2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀 Wales Chen
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Project
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with MicrosoftFIDO Alliance
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP MarketSolarwinds N-able
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 

What's hot (20)

Azure Hybid
Azure HybidAzure Hybid
Azure Hybid
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market Overview
 
Azure governance
Azure governanceAzure governance
Azure governance
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)
 
Power Automate
Power AutomatePower Automate
Power Automate
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary Report
 
Introduction to Azure
Introduction to AzureIntroduction to Azure
Introduction to Azure
 
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature MappingMicrosoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
 
SharePoint Site Architecture: Flat, Deep or somewhere in the middle?
SharePoint Site Architecture: Flat, Deep or somewhere in the middle?SharePoint Site Architecture: Flat, Deep or somewhere in the middle?
SharePoint Site Architecture: Flat, Deep or somewhere in the middle?
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing risks
 
2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀 2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by Design
 
The Benefits of Cloud Computing
The Benefits of Cloud ComputingThe Benefits of Cloud Computing
The Benefits of Cloud Computing
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP Market
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Azure Sentinel.pptx
Azure Sentinel.pptxAzure Sentinel.pptx
Azure Sentinel.pptx
 

Viewers also liked

Organizing for Digital: Why Digital Dexterity Matters
Organizing for Digital: Why Digital Dexterity MattersOrganizing for Digital: Why Digital Dexterity Matters
Organizing for Digital: Why Digital Dexterity MattersRick Bouter
 
Splunk Discovery Brussels - September 2017
Splunk Discovery Brussels - September 2017Splunk Discovery Brussels - September 2017
Splunk Discovery Brussels - September 2017Splunk
 
Big Data and Digital Analytics presentation for NMIMS
Big Data and Digital Analytics presentation for NMIMSBig Data and Digital Analytics presentation for NMIMS
Big Data and Digital Analytics presentation for NMIMSAnees Merchant
 
Business Value Breakfast Presentation
Business Value Breakfast PresentationBusiness Value Breakfast Presentation
Business Value Breakfast PresentationSplunk
 
Taking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerTaking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerSplunk
 
Leading Digital Turning Tech into Business Transformation
Leading Digital Turning Tech into Business TransformationLeading Digital Turning Tech into Business Transformation
Leading Digital Turning Tech into Business TransformationCapgemini
 
Keynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi Conference
Keynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi ConferenceKeynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi Conference
Keynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi ConferenceRoss Dawson
 
Splunk company overview april. 2015
Splunk company overview   april. 2015Splunk company overview   april. 2015
Splunk company overview april. 2015Timur Bagirov
 
Drive more value through data source and use case optimization
Drive more value through data source and use case optimization Drive more value through data source and use case optimization
Drive more value through data source and use case optimization Splunk
 
Explain the Value of your Splunk Deployment Breakout Session
Explain the Value of your Splunk Deployment Breakout SessionExplain the Value of your Splunk Deployment Breakout Session
Explain the Value of your Splunk Deployment Breakout SessionSplunk
 
Didier Bonnet: Oracle Open World Presentation on #LeadingDigital
Didier Bonnet: Oracle Open World Presentation on #LeadingDigitalDidier Bonnet: Oracle Open World Presentation on #LeadingDigital
Didier Bonnet: Oracle Open World Presentation on #LeadingDigitalCapgemini
 
Paris live eddiesatterly_022013
Paris live eddiesatterly_022013Paris live eddiesatterly_022013
Paris live eddiesatterly_022013jenny_splunk
 
Splunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of ThingsSplunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of ThingsAruj Thirawat
 
Taking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkTaking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkSplunk
 
Ei Presentation on analytics
Ei Presentation on analyticsEi Presentation on analytics
Ei Presentation on analyticsLar Veale
 
Deck from Cap Gemini Conference
Deck from Cap Gemini ConferenceDeck from Cap Gemini Conference
Deck from Cap Gemini ConferenceGeoffrey Moore
 

Viewers also liked (16)

Organizing for Digital: Why Digital Dexterity Matters
Organizing for Digital: Why Digital Dexterity MattersOrganizing for Digital: Why Digital Dexterity Matters
Organizing for Digital: Why Digital Dexterity Matters
 
Splunk Discovery Brussels - September 2017
Splunk Discovery Brussels - September 2017Splunk Discovery Brussels - September 2017
Splunk Discovery Brussels - September 2017
 
Big Data and Digital Analytics presentation for NMIMS
Big Data and Digital Analytics presentation for NMIMSBig Data and Digital Analytics presentation for NMIMS
Big Data and Digital Analytics presentation for NMIMS
 
Business Value Breakfast Presentation
Business Value Breakfast PresentationBusiness Value Breakfast Presentation
Business Value Breakfast Presentation
 
Taking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerTaking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - Manager
 
Leading Digital Turning Tech into Business Transformation
Leading Digital Turning Tech into Business TransformationLeading Digital Turning Tech into Business Transformation
Leading Digital Turning Tech into Business Transformation
 
Keynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi Conference
Keynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi ConferenceKeynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi Conference
Keynote: Profiting from Accelerating Change - MegaTrends Abu Dhabi Conference
 
Splunk company overview april. 2015
Splunk company overview   april. 2015Splunk company overview   april. 2015
Splunk company overview april. 2015
 
Drive more value through data source and use case optimization
Drive more value through data source and use case optimization Drive more value through data source and use case optimization
Drive more value through data source and use case optimization
 
Explain the Value of your Splunk Deployment Breakout Session
Explain the Value of your Splunk Deployment Breakout SessionExplain the Value of your Splunk Deployment Breakout Session
Explain the Value of your Splunk Deployment Breakout Session
 
Didier Bonnet: Oracle Open World Presentation on #LeadingDigital
Didier Bonnet: Oracle Open World Presentation on #LeadingDigitalDidier Bonnet: Oracle Open World Presentation on #LeadingDigital
Didier Bonnet: Oracle Open World Presentation on #LeadingDigital
 
Paris live eddiesatterly_022013
Paris live eddiesatterly_022013Paris live eddiesatterly_022013
Paris live eddiesatterly_022013
 
Splunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of ThingsSplunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of Things
 
Taking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkTaking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to Splunk
 
Ei Presentation on analytics
Ei Presentation on analyticsEi Presentation on analytics
Ei Presentation on analytics
 
Deck from Cap Gemini Conference
Deck from Cap Gemini ConferenceDeck from Cap Gemini Conference
Deck from Cap Gemini Conference
 

Similar to Taking Splunk to the Next Level - Management

Taking Splunk to the Next Level – Management - Advanced
Taking Splunk to the Next Level – Management - AdvancedTaking Splunk to the Next Level – Management - Advanced
Taking Splunk to the Next Level – Management - AdvancedSplunk
 
Taking Splunk to the Next Level - Management
Taking Splunk to the Next Level - ManagementTaking Splunk to the Next Level - Management
Taking Splunk to the Next Level - ManagementSplunk
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionSplunk
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionSplunk
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionSplunk
 
Profitabilty, Analytics, and Exalytics
Profitabilty, Analytics, and ExalyticsProfitabilty, Analytics, and Exalytics
Profitabilty, Analytics, and ExalyticsAlithya
 
Succes Services - Top tips for better adoption
Succes Services - Top tips for better adoptionSucces Services - Top tips for better adoption
Succes Services - Top tips for better adoptionSalesforce_Benelux
 
Managed Services Using SLAs and KPIs
Managed Services Using SLAs and KPIsManaged Services Using SLAs and KPIs
Managed Services Using SLAs and KPIsProlifics
 
Ultimate guide to performance measurement
Ultimate guide to performance measurementUltimate guide to performance measurement
Ultimate guide to performance measurementRebecca Manjra
 
Business Agility And Software Development Alan Chedalawada
Business Agility And Software Development   Alan ChedalawadaBusiness Agility And Software Development   Alan Chedalawada
Business Agility And Software Development Alan ChedalawadaValtech UK
 
La Importancia del Análisis de la Información
La Importancia del Análisis de la InformaciónLa Importancia del Análisis de la Información
La Importancia del Análisis de la InformaciónNexolution
 
The Path Forward: Getting started with Analytics Quotient
The Path Forward: Getting started with Analytics QuotientThe Path Forward: Getting started with Analytics Quotient
The Path Forward: Getting started with Analytics QuotientJulie Severance
 
Making Money Out of Data
Making Money Out of DataMaking Money Out of Data
Making Money Out of DataDigital Vidya
 
APM Center of Excellence Drives Improved Business Results at Itau Unibanco
APM Center of Excellence Drives Improved Business Results at Itau UnibancoAPM Center of Excellence Drives Improved Business Results at Itau Unibanco
APM Center of Excellence Drives Improved Business Results at Itau UnibancoCA Technologies
 
Run Learning Like a Business
Run Learning Like a BusinessRun Learning Like a Business
Run Learning Like a BusinessWilliam West
 
Draft - Digital Transformation Rough Plan.pdf
Draft - Digital Transformation Rough Plan.pdfDraft - Digital Transformation Rough Plan.pdf
Draft - Digital Transformation Rough Plan.pdfEnricoJohanes1
 
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...ESEM 2014
 
Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability Robert Max
 

Similar to Taking Splunk to the Next Level - Management (20)

Taking Splunk to the Next Level – Management - Advanced
Taking Splunk to the Next Level – Management - AdvancedTaking Splunk to the Next Level – Management - Advanced
Taking Splunk to the Next Level – Management - Advanced
 
Taking Splunk to the Next Level - Management
Taking Splunk to the Next Level - ManagementTaking Splunk to the Next Level - Management
Taking Splunk to the Next Level - Management
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout Session
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout Session
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout Session
 
Profitabilty, Analytics, and Exalytics
Profitabilty, Analytics, and ExalyticsProfitabilty, Analytics, and Exalytics
Profitabilty, Analytics, and Exalytics
 
Succes Services - Top tips for better adoption
Succes Services - Top tips for better adoptionSucces Services - Top tips for better adoption
Succes Services - Top tips for better adoption
 
Managed Services Using SLAs and KPIs
Managed Services Using SLAs and KPIsManaged Services Using SLAs and KPIs
Managed Services Using SLAs and KPIs
 
Ultimate guide to performance measurement
Ultimate guide to performance measurementUltimate guide to performance measurement
Ultimate guide to performance measurement
 
Business Agility And Software Development Alan Chedalawada
Business Agility And Software Development   Alan ChedalawadaBusiness Agility And Software Development   Alan Chedalawada
Business Agility And Software Development Alan Chedalawada
 
La Importancia del Análisis de la Información
La Importancia del Análisis de la InformaciónLa Importancia del Análisis de la Información
La Importancia del Análisis de la Información
 
The Path Forward: Getting started with Analytics Quotient
The Path Forward: Getting started with Analytics QuotientThe Path Forward: Getting started with Analytics Quotient
The Path Forward: Getting started with Analytics Quotient
 
Making Money Out of Data
Making Money Out of DataMaking Money Out of Data
Making Money Out of Data
 
APM Center of Excellence Drives Improved Business Results at Itau Unibanco
APM Center of Excellence Drives Improved Business Results at Itau UnibancoAPM Center of Excellence Drives Improved Business Results at Itau Unibanco
APM Center of Excellence Drives Improved Business Results at Itau Unibanco
 
Run Learning Like a Business
Run Learning Like a BusinessRun Learning Like a Business
Run Learning Like a Business
 
Building Reports That Fly
Building Reports That FlyBuilding Reports That Fly
Building Reports That Fly
 
Draft - Digital Transformation Rough Plan.pdf
Draft - Digital Transformation Rough Plan.pdfDraft - Digital Transformation Rough Plan.pdf
Draft - Digital Transformation Rough Plan.pdf
 
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
 
Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability
 
ROI-Institute-Brochure1
ROI-Institute-Brochure1ROI-Institute-Brochure1
ROI-Institute-Brochure1
 

More from Splunk

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routineSplunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTVSplunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank InternationalSplunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College LondonSplunk
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSplunk
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability SessionSplunk
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - KeynoteSplunk
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform SessionSplunk
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 

More from Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Taking Splunk to the Next Level - Management

  • 1. Taking Splunk to the Next Level for Management Doug May Director, Global Business Value Consulting Splunk> May 7, 2015
  • 2.
  • 3. Help Splunk customers, prospects, and partners document the projected and already realized business value of making machine data accessible, usable, and valuable for everyone Common Deliverables: › CFO-Ready Business Cases › Value Realization Studies › Adoption Roadmaps and Maturity Assessments › Customer and Use Case Benchmarks Business Value Consulting @Splunk 3
  • 4. Focusing on Value Takes it to the Next Level 4 Your process requires it Create and maintain visibility Replicate success across the organization Accelerate enterprise adoption Maximize business results
  • 5. Splunk is a Hidden Gem 5 Way cool, dude. What business value do I get? I’m invincible!
  • 6. Top Challenges to Documenting Value Lack of Splunk and Industry Benchmarks x Data Lack of Tools to Make Value Measurement Easy x Tools Not Enough Time to Assess Your Value x Time
  • 7. Splunk Can Help Documenting Value All Splunk Tools Are Available to All of You ToolsTime Tools, Content and Team Will Save You Time Access to Splunk and Industry Benchmarks Data
  • 8. Best Practices for Documenting & Positioning Value Taking your Splunk deployment to the next level 4 Measure and Track Your Success 1 Align with Key Business Objectives Qualify and Quantify Business Value 2 3 Incremental Steps with a Big Picture Plan
  • 9. Value is in the Eye of the Beholder 1 Align with Key Business Objectives Did you know you can save 15% on your car insurance when you call Geico? Is that important to you? Maybe it’s not.
  • 10. Link your project to important goals and strategies to prioritize your project REAL EXAMPLE -Aligning with Company Priorities 10 Profit Double revenues while increasing margins Productivity Design and implement to most effective and efficient business system People Attract, engage, and retain the best talent Partners Become a critical part of our customers’ growth strategies Portfolio Double servings per day and be #1 provider Planet Create advantage by fulfilling our Live Positively commitments “We also launched a productivity and reinvestment program to create $550 million to $650 million in annual savings by 2015. By freeing up resources via supply- chain optimization, improved marketing effectiveness, operational excellence and systems standardization, we can invest more in innovation, marketing and additional “feet on the street” to drive our growth.” - CEO From investor presentations, annual reports, and executive presentations
  • 11. Steps to Qualify Value • Align your project with something strategic • Talk with influential and knowledgeable people • Document why something should change or be added • Describe the current challenges or barriers • Identify the “desired” state • Summarize and socialize - gain support Qualify and Quantify Business Value 2
  • 12. Qualifying Value Example 12 Visibility to Environment Health & User Exp.  Brute force approach providing visibility to key processes isn’t working and won’t scale  Operations still lacks complete end-to-end visibility to the environment’s health, use and trends  Blinds spots still exist in monitoring and data access for Operations which could help improve troubleshooting and uptime / availability Incident / Issue Notification  Brute force approach to proactive monitoring isn’t working consistently and won’t scale  There’s a “Waterfall effect” – small issues go without broader notification triggering other issues eventually leading to a bigger incident  Users are aware of issues before Operations and call the helpdesk  All the lights are “green” but still ~65% of incidents overall are reported first by the business Troubleshooting Incidents / Issues  Operations troubleshooting is cumbersome and suboptimal  It’s still manual across IT silos  It’s difficult to find root cause of incidents quickly  Performance issues are difficult to resolve  Outages and impact are elongated due to manual efforts and silos  Teams are distracted from their core work when they’re troubleshooting Recurring Incidents / Issues  The Problem Management process isn’t working because there are many high severity incidents still without root cause determined  As a result, Operations is solving the same problems again and again  Opportunities exist to improve on incident avoidance since @25%+ of incidents are repeats DESIRED STATE VISION: Complete visibility to environment health & trends across full application stack for all stakeholders Proactively avoid issues before the business is impacted Reduce MTTR with rapid root cause analysis
  • 13. Quantifying Value with Splunk Tools Financial Analysis Made Easy • Over 40 Value Calculators • Driven by Actual Customer Results • Complete Financial Analysis • Best Practice TCO Models Don’t Forget • Follow the Impact • Capture All the Value • Summarize and Socialize 13
  • 14. Interactive Value Assessment (IVA) Highlights ThepowerofSplunkvalueinasimplepackage Target your business case Calculate value seamlessly Be credible Deliver value on the spot! Choose 1 or many Groups 45 Value Calculators Automatically surface those that are relevant Built-in Industry Benchmarks and Customer Case Studies Presentation options of benefit summaries & financial analysis
  • 16. ExecuteAgainst a Strategy Take directional, incremental steps • Avoid being reactive – don’t drive by data source • Develop a plan to expand Splunk • Link the plan to strategic company goals • Use Splunk tools and benchmarks to document and quantify the anticipated value • Set baselines for success • Commit to measure value realized post deployment 3 Incremental Steps with a Big Picture Plan
  • 17. What Your Splunk Strategy Might Look Like
  • 18. Measuring & Tracking Success Helping you take it to the next level • Demonstrating success will help further the cause • Tell the story of your Splunk usage • Compare your success against Splunk customer benchmarks • Assess your usage and staffing maturity • Then bring it all together 4 Measure and Track Your Success Value Realization Usage Maturity Skills Readiness
  • 19. Measure Success with Value Realization “Money follows money well spent” • Summarize BEFORE and AFTER Splunk • Capture metrics of improvement • Socialize your success
  • 20. Usage Maturity Assessment – IT OPS Drive expansion through highlighting value opportunities 20 Groups % Data Indexed Log Collection Incident Investigation Root Cause Analysis Proactive Alerting Operational Dashboards Business Analytic s Capacity PlanningLevel 1 Triage Level 2 & 3 Escalation Virtualization 0% OS - Unix 25% OS - Windows 0% Storage 33% Network 100% = Splunk fully in use = Splunk partially in use = Splunk not in use
  • 21. Usage Maturity Assessments – APP DEV Drive expansion through highlighting value opportunities 21 Top Apps % Indexed Evaluate and Assess Needs Develop and Release Data Collection Business Insight Test Failure Analysis Defect Investigation SAP 0% Warehouse Mgt 0% E-Commerce Website 50% Call Center 80% = Splunk fully in use = Splunk partially in use = Splunk not in use
  • 22. Usage Maturity Assessments – SECURITY Drive expansion through highlighting value opportunities 22 Data Sources % Indexed Log Collection Level 1 Triage Monitoring / Alerting Investigations Incident Response Compliance Reporting Routine Log Reviews Threat Intel: (3rd Party) 70% Threat Intel: (OS Blacklist) 70% Network: (Firewall) 90% Network: (IDS/IPS) 90% Endpoint: (PCLM) 80% Access & Identity Mgt 75% = Splunk fully in use = Splunk partially in use = Splunk not in use CurrentlyhandledbyMSSP
  • 23. Usage Maturity Assessments – SECURITY CONTROLS Drive expansion through highlighting value opportunities 23 Critical Control In Place? Monitor unauthorized devices or software Monitor unmanaged devices or software Monitor configuration compliance Monitor patch compliance Monitor malware defense Monitor application software security Monitor wireless access control Analyze audit logs with time-based correlation Critical Control In Place? Monitor use of ports, protocols, and services Monitor controlled use of admin privileges Monitor perimeter IDS Monitor controlled / uncontrolled access Monitor orphan, expired, miss use of accounts Monitor potential exfiltration of information Monitor secure IP restriction policies Maintain data going back months = Splunk fully in use = Splunk partially in use = Splunk not in use
  • 24. AReal Customer Example - Operations MostcommonusesofSplunkdeliveringvalue Business Service Components % of Data Indexed Log / Data Collection Incident Investigation Root Cause Analysis Proactive Alerting Operational Dashboards Business AnalyticsLevel 1 Triage Level 2 & 3 Escalation Custom Web Apps 80% 3rd Party Web-Apps 100% Apps 75% Web Server 50% Database 100% OS 100% Network 95% = Splunk fully in use = Splunk partially in use = Splunk not in use E-Commerce Site
  • 25. Splunk IT Operations Benchmarks Know what toproject and/or compare how you’re doing 25 Reduced Sev1 and Sev2 incidents by 43% Reduced MTTR by 95% and reduced escalations by 50% Improved capacity utilization and avoided $200k in infrastructure 15% to 45% reduction in system incidents 70% to 90% faster investigation of system incidents 67% to 82% reduction in financial impact from outages 5% to 20% optimization with server capacity allocation
  • 26. Splunk Application Support/Dev Benchmarks Know what toproject and/or compare how you’re doing 26 15% to 45% reduction in application incidents 70% to 90% faster investigation of QA defects and incidents 10% to 50% faster time to market 10% to 50% increase in value for key projects Went from 1 release/day to 8 because of Splunk Shortened their development cycles by 30% Reduced the number of incidents leading to 9M Euro per year in revenue recaptured
  • 27. Splunk Security & Compliance Benchmarks Know what toproject and/or compare how you’re doing 27 70% to 90% improvement with detection and research of events 70% to 90% faster investigation of security incidents 10% to 50% lower risks with data breaches, fraud and IP theft 70% to 90% reduction in compliance labor Reduced investigation effort by more than 75% Reduced the time to report on SAS70 compliance by 83% Reduced the number of security incidents by 80%
  • 28. Map Your Progressvs. Benchmarks Estimates based on Value Realization and Usage Maturity 28 Incident Avoidance Incident/Problem Investigation 15% 45%Splunk Benchmark 70% 90%Splunk Benchmark 35% 20% 10% 0% 0% 75% 50% 25% 25% 25% Groups Infrastructure Inventory Manufacturing Payroll Collaboration
  • 29. Splunk Staffing Readiness Be sure you have the staff and skills to maximize value 29 A successful and scalable deployment of Splunk relies on the orchestration of key roles and responsibilities, primarily centered around:  Architecture  Administration  User adoption (Power User)  Application development
  • 30. Basic Communication Framework 30 Architect Admin Works with power users to determine which data sources should be indexed to meet each department’s needs Scales the Splunk architecture to meet business demand Power Users Department Users Adds data sources to the Splunk platform according to business needs Assist power users with the development of advanced dashboards, alerting and reporting Maintains the Splunk SW and it’s infrastructure for optimal performance 1 Power user per department Provides basic support for new and existing reports and dashboards Works with their group to identify opportunities where Splunk can provide value
  • 31. Splunk Roles & Recommended Training 31 Splunk Roles Using Splunk Splunk Administration Searching and Reporting Creating Knowledge Objects Advanced Searching & Reporting Developing Apps with Splunk Developing with Splunk SDKs Architect Required Required Optional Optional Optional Optional Optional Admin Required Required Optional Optional Power User Required Required Required Optional Developer Required Optional Required Required Optional Required Optional for Splunk on-premises
  • 32. Splunk Power User Status Recommendation: 1power-user pergroup 32 Splunk Power User(s) Using Splunk Splunk Administration Searching and Reporting Creating Knowledge Objects Advanced Searching & Reporting Developing Apps with Splunk Developing with Splunk SDKs • Web • Anurag D. • Security • Josh H. • Infrastructure • Mike G. = Splunk training completed= Required = Optional = Training required but not completed = Optional training not completed Responsibilities • Works with their group to identify opportunities where Splunk can provide value • Collaborates with the Splunk admin(s) to add new data sources to address their requirements • Provides basic support for new and existing reports and dashboards to their group
  • 33. Map Your Roles & Highlight Training Gaps 33 Splunk Admin #name Splunk Developer #name Security Power User #name Collaboration Power User #name Database Power User #name CRM Power User #name Network Power User #name Financial Apps Power User #name Splunk Architect #name = Fully Trained = Partially Trained = Not assigned Web Power User #name Server Power User #name Your Company
  • 34. Bringing it all together
  • 35. Position Value in Expansion Area Taking it to the Next Level Value Opportunity: • faster detection, • faster investigation, • faster root cause analysis of application incidents • fewer developer escalation After 3 to 6 months After 3 to 6 months Document Success for Server & Network teams Document Success for App & DB teams Position Value in Expansion Area Application Development Value Opportunity: • faster test analysis, • faster investigation of pre- production bugs, • faster releases cycles Position Value in Expansion Area Security & Compliance Value Opportunity: • faster detection, faster triage, • faster investigation of security incidents Value Realized: • faster detection, • faster investigation, • faster root cause analysis of system incidents IT Operations Application Support
  • 36. Success from Current Use PositiveROIachievedon~$1.7Mspendtodate Proactively monitoring a $1.5B revenue platform entirely with Splunk. Reducing manual effort and impact Avoiding revenue displacement and loss “We almost had an outage today. We saw some things in Splunk. That saved us a 1.5 hour incident and almost $300,000.” Opportunities: Get full stack of data in for additional efficiencies (network, VM, storage, DB) Web & Mobile 42% reduction in business impact Avoiding revenue loss of $2.3M/year Value $2.5M/year | 2,445 hours/year Rapid search and investigation of security incidents. Went from reactive to proactive. Reducing manual effort, impact and risk Innovating – search to alert to IDS “If we didn’t have Splunk, I am not sure what we would have done with the April incident.” Opportunities: Apply to PCI readiness saving GRC team effort, enabling continuous compliance. 50% reduction in incident investigation Avoiding 16k+ hours/year Value $1.3M/year | 16,380 hours/year Security 20,414 Yearly Hours 50% reduction in incident investigation (when leveraged) Value $124,102/yr* | 1,589 hours/yr* Infrastructure Resolving complex issues rapidly; opportunity for even more value. Reducing manual effort and impact Realizing only partial benefits today “When there’s a problem, it’s tricky to figure out where it is. Splunk’s a helpful tool to have.” Opportunities: Get full environment data in. Use more consistently across team to capture value. $3.92M Yearly Value See detailed calculations of value, usage adoption, and staffing maturity schedules in the Appendix. Benchmarks Used for Infrastructure Calcs From a real Splunk customer
  • 37. Functional Adoption Summary Comparing[customer]’s currentusageagainstthemostcommonSplunkusesdrivingvalue IT & APPLICATION OPERATIONS % Usable Data Indexed Log Collection Incident Investigation Root Cause Analysis Proactive Alerting Operational Dashboards Business Analytics Capacity PlanningLevel 1 Triage Level 2 & 3 Escalation Web & Mobile 75% NW*, VM, DB, Storage Infrastructure 20% DB, VM, Windows, Storage = Splunk fully in use = Splunk partially being used = Splunk not being used SECURITY & COMPLIANCE % Data Indexed Log Collection Level 1 Triage Monitoring / Alerting Investigations Incident Response Compliance Reporting Routine Log Reviews Security 80% 3rd party intel, AIM MSSP Refer to adoption charts for each team in the Appendix for more details From a real Splunk customer
  • 38. NOTE: VMware data not ingested. Storage visibility is limited to VM instance. Host and SAN would be beneficial. * Network data is being collected today but in a separate Splunk instance due to be joined later this year. Functional Adoption – Web Team .Com Business Service % Data Indexed Log Collection Incident Investigation Root Cause Analysis Proactive Alerting Operational Dashboards Business Analytics Capacity Plannin gLevel 1 Triage Level 2 & 3 Escalation Web/App Server 100% Database 0% Virtualization 10% OS 100% Storage 20% Network* 90% = Splunk fully in use = Splunk partially being used = Splunk not being used From a real Splunk customer
  • 39. Functional Adoption – Security Controls 39 Critical Control In Place? Monitor unauthorized devices or software Monitor unmanaged devices or software Monitor configuration compliance Monitor patch compliance Monitor malware defense Monitor application software security Monitor wireless access control Analyze audit logs with time-based correlation Critical Control In Place? Monitor use of ports, protocols, and services Monitor controlled use of admin privileges Monitor perimeter IDS Monitor controlled / uncontrolled access Monitor orphan, expired, miss use of accounts Monitor potential exfiltration of information Monitor secure IP restriction policies Maintain data going back months = Splunk fully in use = Splunk partially in use = Splunk not in use Current assessment of Splunk usage at [customer] for the SANS 20 security controls. From a real Splunk customer
  • 40. [customer]’s Splunk Team 40 = Fully Trained Splunk Architect #name Splunk Admin #name Splunk Developer #name Security Power User #name Collaboration Power User #name Labor Power User #name Mobile CRM Power User #name Infrastructure Power User #name GSIT Power User #name Splunk Architect #name = Partially Trained = Not assigned Splunk Admin #name Web/Mobile Power User #name Warehouse Power User #name From a real Splunk customer
  • 41. Sempra Energy Mitigates Security Risk 41 • One of the largest utilities in the US, serving 20M+ customers • Headquartered in San Diego, CA • 17,000+ employees Splunk Use: – Rapid search capabilities for high volume logs – Consumption of any type of data (structured, unstructured) from hundreds of applications – Event correlation complementing SIEM Value Delivered: – Reduced MTTR for identifying threats to minutes – Saved $1.2M in help desk charges – faster MTTR for BYOD account logins – Avoided fines by maintaining NERC compliance – Tracked anomalous incidents across several systems to identify Advanced Threats
  • 42. Splunk Security & Compliance Benchmarks Know what toproject and/or compare how you’re doing 42 70% to 90% improvement with detection and research of events 70% to 90% faster investigation of security incidents 10% to 50% lower risks with data breaches, fraud and IP theft 70% to 90% reduction in compliance labor Reduced investigation effort by more than 75% Reduced the time to report on SAS70 compliance by 83% Reduced the number of security incidents by 80%
  • 43. Future Value Opportunities(1of2) AProactiveOperations approachwillreduceimpacthours Collaboration toavoid171,348employeehours/year Basic monitoring puts Collaboration at risk as it grows from ~6k to 200k+ users and becomes the portal to key apps Proactively monitor to avoid incidents and employee productivity loss (171k hrs) Speed incident investigation and resolution, reducing manual effort “We expect 20% more issues as we go from @6,000 to 200,000+ users.” Incidents reduced by 25% | Impact 67% Avoiding 34 hours/year of BII time Value $5.2M/year | 1,501 IT hours/year Collaboration Shift from reactive to proactive improving Labor stability and availability enabling maximum scheduling efficiency Proactively monitor to avoid incidents and protect Partner productivity Speed incident investigation and resolution, reducing manual effort “Last Tuesday if we got a heads up from Splunk we could have resolved it in 1 hour instead of 5.” 70% reduction in incident investigation Sev1 time reduced 96 hours/year Value $433,544/year | 5,549 hours/year Labor Scheduling Become more proactive further leveraging centralized, real-time data to avoid and reduce impact time Proactively monitor to avoid incidents and business impact Further reduce investigation effort over current, isolated log search solution “If we had a dashboard showing us the app, database, server, and network health, we could get ahead of potential issues and resolve them before impact.” 25% reduction in incidents Avoiding 12 hours/year impact time Value $1.0M/year | 828 hours/year Warehouse 19,725 Yearly Hours $7.5M Yearly Value From a real Splunk customer
  • 44. Best Practices for Documenting & Positioning Value Taking your Splunk deployment to the next level 4 Measure and Track Your Success 1 Align with Key Business Objectives Qualify and Quantify Business Value 2 3 Incremental Steps with a Big Picture Plan
  • 45. Ask Me or Your Account Team For… • The Interactive Value Assessment (IVA) Excel ROI model • Usage adoption maturity templates • Splunk staff readiness templates • Common benefits of Splunk and customer benchmarks
  • 46. Copyright © 2014 Splunk Inc. Questions? Thank you! Doug May dmay@splunk.com

Editor's Notes

  1. Your process requires it 85% of investments over 50,000 USD require a formal business case (IDC) Create or maintain visibility to Splunk’s strategic importance Prioritize Splunk investment over other projects Facilitate continued support and resources (FTE, maintenance, etc) Ease approval of future resource requests People, infrastructure, Splunk license, professional services Supporting renewals; staff departures Eliminate any doubt of Splunk’s value to your organization Help Other Succeed in your organization If they understand what you’ve done and what value you’ve received, they can do the same thing Promote yourself or your team Show your success to help promote your people and your own accomplishments
  2. You all know what a great platform Splunk is. So if it’s so great, why does our team exist? Well…Users love Splunk and clearly understand the value it delivers to them operationally, but they struggle with articulating it to their senior management in business terms. This leaves executives asking what THEY get from Splunk. They understand their people love it, but can’t put dollars, euros, yuan, or yen on it easily. The Value that Splunk brings to the business is a hidden gem for most executives. When they are able to understand the business value it delivers for them, in most cases it’s priceless.
  3. Sempra Energy is one of the largest utilities in the US, serving over 20 million customers in Southern California. They were looking to gain more visibility into security issues and comply with NERC, yet Sempra had limited reporting capabilities, which made it difficult to let management know about the scope of security problems. Search queries took 4 – 5 hours and required custom Perl scriptsm and Correlating data proved to be challenging. In addition, Sempra wanted to mitigate BYOD (bring your own device) risks. Many of Sempra’s employees were using their own mobile devices, which raised additional security risks. Lockouts were common due to password synchronization issues. Using Splunk, Sempra consumed and indexed data coming from hundreds of applications, which enabled them to search more rapidly, and create dashboards and reports to be used by management and for compliance purposes. They could track security incidents across several systems, and build a library of security relevant searches which complemented their SIEM. Investigating security incidents went from hours to minutes. With BYOD, Sempra built a dashboard for the helpdesk to quickly identify the source of the failed logins. In addition, Sempra used Splunk to identify the number of active users that their help desk vendor was supporting. Sempra pays the help desk vendor based on the number of user accounts, and getting an accurate number of active user accounts allowed them to save $1.2 million /year. For NERC review purposes, Sempra captured and retained firewall and domain authentication logs. NERC-designated cyber assets log need to be collected and retained for 90 days. If an asset did not generate a log daily, Splunk would generate a missing source alert so that IT can investigate and remediate quickly, thereby avoiding any fines related to NERC.