SlideShare a Scribd company logo
Legacy SIEM to Splunk,
How to Conquer Migration
and Not Die Trying
Michel Oosterhof | Staff Sales Engineer
During the course of this presentation, we may make forward-looking statements regarding future events or
the expected performance of the company. We caution you that such statements reflect our current
expectations and estimates based on factors currently known to us and that actual events or results could
differ materially. For important factors that may cause actual results to differ from those contained in our
forward-looking statements, please review our filings with the SEC.
The forward-looking statements made in this presentation are being made as of the time and date of its live
presentation. If reviewed after its live presentation, this presentation may not contain current or accurate
information. We do not assume any obligation to update any forward looking statements we may make. In
addition, any information about our roadmap outlines our general product direction and is subject to change
at any time without notice. It is for informational purposes only and shall not be incorporated into any contract
or other commitment. Splunk undertakes no obligation either to develop the features or functionality
described or to include any such feature or functionality in a future release.
Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in
the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. ©2018 Splunk Inc. All rights reserved.
Forward-Looking Statements
THIS SLIDE IS REQUIRED FOR ALL 3 PARTY PRESENTATIONS.
Agenda
What Will We Be Talking About Today?
You Got This
Things you can do today, to get
“ready” for a SIEM replacement
SIEM Replacement
Methodology
Splunk PS best practices
Use Cases
These drive migrations
Data Sources &
Data Onboarding
Parsers / connectors / TAs
Architecture
Measure twice, cut once
Third Party Integrations
Smart? Great! But do you play
well with others?
© 2018 SPLUNK INC.
How Did We Get
Here?
I’m done.
I’m replacing this SIEM!
▶ Worthy reasons:
• Limited security data type
• Inability to effectively ingest data
• Slow investigations
• Instability and scalability
• End-of-life or uncertain roadmap
• Closed ecosystem
• Limited to on-premises
• Limted to Vendor Cloud
▶ Splunk’s a great product, why not?
Most Common Reasons for Replacement
SIEM Migration
Methodology
Splunk Professional Services (PS) Best Practices –
Based on Real World Experience
SIEM replacements can be complex, but if the following things are taken into
account, you won’t lose your job | shirt over it:
▶ Use cases matter:
• Audit & prioritize use cases
• Planned response ... do something!
▶ Know your data / datasources
• Identify datasources & owners
• Audit datasources
• Identify enrichment requirements
▶ Current / future state integrations
▶ Research & preparation is key
▶ Assets & identities
▶ Partner with Splunk + PS
Things You Should Know About Legacy SIEM
Replacement and Splunk Best Practices
Use Cases
These Drive Replacements…Use Cases, Use Cases, USE CASES!
▶ Document describing a single
detection activity.
• What is the condition to detect?
• What is the event data required?
• What enrichment is required to scope
down events?
• What enrichment will reduce noise
(false positives)?
• Point to the response plan
• What are your current use cases?
• Which ones provide value?
• Which ones don’t?
What Is a Use Case?
Spiral
Analysis
Planning
Evaluation
Development
Waterfall
Prototyping
Determine Objectives Test Implement
Requirements
Design
Implementation
Verification
Maintenance
DEVE
LOP
DEMONSTRATE
REFI
NE
▶ Document describing a single
response activity
• For a response what event data is required
to triage
• What actions should be taken
• Escalation communication and do we need
to order pizza
• Can we reduce the cost of pizza by
providing better data for response
decisions?
What Is a Response Plan?
▶ The first step in embarking on a SIEM replacement initiative is
• Identifying and prioritizing high value use cases, response plans and compliance reports:
• Splunk PS has a 1-2 week SIEM replacement workshop where we come
in and help customers:
− Identify and develop high-fidelity use cases slated for migration/development
− Datasources and enrichment identified via use case prioritization process
− Plan the solution architecture
• We typically see a 30-60% reduction in use cases selected for migration generally due to:
− Old and/or stale rules
− Housekeeping rules no longer needed
− Rule consolidation due to advanced Splunk Query Language
So no, you don’t have to migrate ALL your old funky rules!
Putting the Horse Before the Cart…
Datasources & Data
Onboarding
Parsers / Connectors / TAs (Technology Add-ons)
▶ Use case analysis determines in-scope datasources
▶ Why you don’t need to migrate your historical data from Legacy SIEM
▶ Data Source Onboarding via:
How Do You Migrate Datasources to Splunk?
• Universal Forwarder (UF)
Deployed alongside existing
parsers/connectors
• UF deployed on syslog
aggregator to read and ship
logs into Splunk
• Modern HTTP Event
Collection
• Database Tables (DBX)
• Never forget: Splunk Stream!
• Fields from raw data
• Data Normalization
• Splunkbase
- splunkbase.com
- Easy Button: Custom TAs via
“Splunk Add-on Builder” App
Splunk Log Forwarding:
Syslog Aggregation
TAs (Technology Add-ons)Other Common Methods
ES Architecture
Measure Twice, Cut Once
▶ Plan for modern data collection,
deprecate legacy log collection
infrastructure and stop accepting log
loss today
▶ Plan for disaster recovery and
availability
▶ Plan to remediate logging policies and
source configuration
Plan the Architecture
Now that we know what we want to do, how will we execute it?
© 2018 SPLUNK INC.
Components >
• Collection layer (connectors /
parsers vs. UF's / HF's )
• Parsing layer (Technology Add-ons)
• Storage layer (indexers)
• Presentation layer (search head +
Splunk Enterprise Security)
• Security analytics (Splunk Enterprise
Security)
• Management layer (deployment
server, cluster master, license
server, deployer)
Data source will determine what
components are needed—your
network determines where they
should be
Splunk
Architecture
Third Party
Integrations
Smart? Great! But Do You Play Well with Others?
Smart? Great! But Do You Play Well With Others?
“At this point in the interview, Johnson, we would like to see
how well you play with others.”
– Richard Stevens, Penfield, NY
© 2018 SPLUNK INC.
Identify current / future state
third-party integration points
Third Party
Integrations
We Support Integration With Most Third Party Systems:
▶ Case Management / Ticketing Systems
• (ServiceNow, Remedy, etc)
▶ Threat Intelligence Feeds
• (STIX, TAXII, Internal, etc)
▶ Database Integration
• (Oracle, MySQL, etc)
▶ Microsoft Active Directory
▶ REST API support
▶ Custom Code
▶ Others
© 2017 SPLUNK INC.
Cloud Security Endpoints
Orchestration
WAF & App
Security
Threat Intelligence
Network
Web Proxy
Firewall
Identity and Access
You Got This!
Things You Can Do Today, to Get Prepared
for Your SIEM Replacement
▶ Identify/audit and prioritize use cases
for migrations
▶ Identify/audit and prioritize datasources
for migration
▶ Identify datasource owners
▶ Research Splunk Technology Add-ons for
datasource at splunkbase.com
▶ Assets and identities: identify CMDB sources
▶ Third-party integrations
▶ Develop logging standards
Replacement Checklist:
What Do “You” Do Next?
Splunk as
Your SIEM
Splunk Security Portfolio for SIEM
Enterprise Security600+ Partner Apps User Behavior Analytics
Platform for Operational Intelligence
Network data
Exchange data
ES Content Update
PCI Compliance
Search and
Investigate
Monitoring &
Alerting
Dashboards
and Reports
Incident &
Breach Response
Splunk Security Apps
App for AWS
ML Toolkit
Google Cloud
Microsoft Cloud
Discover
Anomalous
Behavior
Detect Unknown
Threats
Automation &
Orchestration
Threat
Detection
Security
Operations
Threat Intel
Email
EDR/ETDR
DLP
Splunk Enterprise
Security Demo
ES : Security Posture
Endpoint : Malware Center
Endpoint : System Center
Endpoint : Update Center
Endpoint : Endpoint Changes
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk
Enterprise Security
Investigations Demo
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
1
2
3
1
2
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
1
2
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
2
1
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying
SIEM Replacement
Customer Success
© 2018 SPLUNK INC.
▶ Improved visibility over hybrid infrastructure
▶ Gained ability to detect and respond to complex
cyberthreats
▶ Reduced IT costs due to more efficient resourcing
Analytics-Driven SIEM to Enable
Hybrid Cloud Transition
© 2018 SPLUNK INC.
▶ Improve the speed of security event detection by at
least 70 percent
▶ Accelerate investigation of high-priority security
incidents by at least 70 percent
▶ Decrease the overall financial impact of security
outages by at least 50 percent
Speeding Detection, Investigation
and Resolution With Splunk SIEM
“With Splunk ES, our IT team can gain visibility across thousands
of endpoints continuously – including servers, network devices,
security scans and threat feeds – enabling faster threat detection
and resolution for our customers.”
– Vice President and Chief Information Security Officer, Rackspace
© 2018 SPLUNK INC.
▶ An estimated 30 percent lower cost of ownership
compared to on-premises alternatives
▶ A dramatic reduction in security investigation and
resolution times
▶ Protection against threats, breaches and malware;
ensuring regulatory compliance
Biopharma Leader Gets Ahead of Security
Threats With Analytics-Driven SIEM in the Cloud
“ With Splunk the organization now has a security solution that is flexible
and scalable to ingest all of its data ubiquitously and that enables the
security team to draw conclusions from its data in near real time.”Biopharma
Next Steps
▶ Contact your Account
Executive
▶ Contact an Expert
▶ Bi-weekly security
demos
▶ Schedule a pre-
assessment session
with a Sales Engineer
Transform Your Security: Next Steps
© 2018 SPLUNK INC.
Don't forget to rate this session in the
SplunkLive! mobile app
Thank You
© 2018 SPLUNK INC.
October 1-4, 2018
▶ 8,750+ Splunk Enthusiasts
▶ 300+ Sessions
▶ 100+ Customer Speakers
Plus Splunk University:
▶ Three Days: September 29-October 1, 2018
▶ Get Splunk Certified for FREE!
▶ Get CPE credits for CISSP, CAP, SSCP
Walt Disney World Swan and Dolphin Resort in Orlando
c o n f.s p lu n k .c o m
SAVE THE DATE!

More Related Content

PPTX
Splunk Discovery: Warsaw 2018 - IT Operations Track
PPTX
Splunk Discovery: Milan 2018 - Splunk Overview
PPTX
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
PPTX
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
PPTX
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
PDF
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
PPTX
SplunkLive! Zurich 2018: Intro to Security Analytics Methods
PPTX
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...
Splunk Discovery: Warsaw 2018 - IT Operations Track
Splunk Discovery: Milan 2018 - Splunk Overview
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
SplunkLive! Zurich 2018: Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...

What's hot (20)

PPTX
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
PPTX
SplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AI
PPTX
SplunkLive! Zurich 2018: Event Analytics
PPTX
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
PPTX
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
PPTX
SplunkLive! Munich 2018: Getting Started with Splunk Enterprise
PPTX
SplunkLive! Zurich 2018: Integrating Metrics and Logs
PPTX
SplunkLive! Paris 2018: Splunk And AI 101
PPTX
SplunkLive! Frankfurt 2018 - Predictive, Proactive, and Collaborative ML with...
PPTX
SplunkLive! Munich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
PPTX
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
PPTX
SplunkLive! Frankfurt 2018 - Data Onboarding Overview
PPTX
SplunkLive! Frankfurt 2018 - Monitoring the End User Experience with Splunk
PPTX
SplunkLive! Zurich 2018: Monitoring the End User Experience with Splunk
PPTX
SplunkLive! Paris 2018: Splunk Overview
PPTX
SplunkLive! Paris 2018: Event Management Is Dead
PPTX
Wie erkenne ich die Auswirkungen von IT Ausfallen auf meine Produktion?
PPTX
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
PPTX
SplunkLive! Paris 2018: Plenary Session
PPTX
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
SplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AI
SplunkLive! Zurich 2018: Event Analytics
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
SplunkLive! Munich 2018: Getting Started with Splunk Enterprise
SplunkLive! Zurich 2018: Integrating Metrics and Logs
SplunkLive! Paris 2018: Splunk And AI 101
SplunkLive! Frankfurt 2018 - Predictive, Proactive, and Collaborative ML with...
SplunkLive! Munich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
SplunkLive! Frankfurt 2018 - Data Onboarding Overview
SplunkLive! Frankfurt 2018 - Monitoring the End User Experience with Splunk
SplunkLive! Zurich 2018: Monitoring the End User Experience with Splunk
SplunkLive! Paris 2018: Splunk Overview
SplunkLive! Paris 2018: Event Management Is Dead
Wie erkenne ich die Auswirkungen von IT Ausfallen auf meine Produktion?
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Plenary Session
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
Ad

Similar to Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying (20)

PPTX
SplunkLive! Paris 2018: Legacy SIEM to Splunk
PPTX
PPT-Splunk-LegacySIEM-101_FINAL
PDF
Splunk-Presentation
PPTX
Travis Perkins at Gartner Risk and Security Management Summit Europe
PDF
Splunk, SIEMs, and Big Data - The Undercroft - November 2019
PPTX
Make Your SOC Work Smarter, Not Harder
PPTX
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
PPTX
Learn how to use an Analytics-Driven SIEM for your Security Operations
PPTX
SplunkLive! - Splunk for Security
PPTX
Splunk for Security Breakout Session
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
PPTX
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
PPTX
Splunk Enterprise Security
PPTX
Exploring Frameworks of Splunk Enterprise Security
PPTX
Exploring Frameworks of Splunk Enterprise Security
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
PPTX
Customer Presentation with a Healthcare Company
PPTX
SplunkLive! Customer Presentation – HCA
PPTX
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
PPTX
Customer Presentation - Financial Services Organization
SplunkLive! Paris 2018: Legacy SIEM to Splunk
PPT-Splunk-LegacySIEM-101_FINAL
Splunk-Presentation
Travis Perkins at Gartner Risk and Security Management Summit Europe
Splunk, SIEMs, and Big Data - The Undercroft - November 2019
Make Your SOC Work Smarter, Not Harder
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
Learn how to use an Analytics-Driven SIEM for your Security Operations
SplunkLive! - Splunk for Security
Splunk for Security Breakout Session
Splunk Discovery Day Dubai 2017 - Security Keynote
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
Splunk for Enterprise Security featuring UBA Breakout Session
Customer Presentation with a Healthcare Company
SplunkLive! Customer Presentation – HCA
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
Customer Presentation - Financial Services Organization
Ad

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Cloud computing and distributed systems.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Weekly Chronicles - August'25 Week I

Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying

  • 1. Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying Michel Oosterhof | Staff Sales Engineer
  • 2. During the course of this presentation, we may make forward-looking statements regarding future events or the expected performance of the company. We caution you that such statements reflect our current expectations and estimates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward-looking statements, please review our filings with the SEC. The forward-looking statements made in this presentation are being made as of the time and date of its live presentation. If reviewed after its live presentation, this presentation may not contain current or accurate information. We do not assume any obligation to update any forward looking statements we may make. In addition, any information about our roadmap outlines our general product direction and is subject to change at any time without notice. It is for informational purposes only and shall not be incorporated into any contract or other commitment. Splunk undertakes no obligation either to develop the features or functionality described or to include any such feature or functionality in a future release. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. ©2018 Splunk Inc. All rights reserved. Forward-Looking Statements THIS SLIDE IS REQUIRED FOR ALL 3 PARTY PRESENTATIONS.
  • 3. Agenda What Will We Be Talking About Today? You Got This Things you can do today, to get “ready” for a SIEM replacement SIEM Replacement Methodology Splunk PS best practices Use Cases These drive migrations Data Sources & Data Onboarding Parsers / connectors / TAs Architecture Measure twice, cut once Third Party Integrations Smart? Great! But do you play well with others?
  • 4. © 2018 SPLUNK INC. How Did We Get Here? I’m done. I’m replacing this SIEM!
  • 5. ▶ Worthy reasons: • Limited security data type • Inability to effectively ingest data • Slow investigations • Instability and scalability • End-of-life or uncertain roadmap • Closed ecosystem • Limited to on-premises • Limted to Vendor Cloud ▶ Splunk’s a great product, why not? Most Common Reasons for Replacement
  • 6. SIEM Migration Methodology Splunk Professional Services (PS) Best Practices – Based on Real World Experience
  • 7. SIEM replacements can be complex, but if the following things are taken into account, you won’t lose your job | shirt over it: ▶ Use cases matter: • Audit & prioritize use cases • Planned response ... do something! ▶ Know your data / datasources • Identify datasources & owners • Audit datasources • Identify enrichment requirements ▶ Current / future state integrations ▶ Research & preparation is key ▶ Assets & identities ▶ Partner with Splunk + PS Things You Should Know About Legacy SIEM Replacement and Splunk Best Practices
  • 8. Use Cases These Drive Replacements…Use Cases, Use Cases, USE CASES!
  • 9. ▶ Document describing a single detection activity. • What is the condition to detect? • What is the event data required? • What enrichment is required to scope down events? • What enrichment will reduce noise (false positives)? • Point to the response plan • What are your current use cases? • Which ones provide value? • Which ones don’t? What Is a Use Case? Spiral Analysis Planning Evaluation Development Waterfall Prototyping Determine Objectives Test Implement Requirements Design Implementation Verification Maintenance DEVE LOP DEMONSTRATE REFI NE
  • 10. ▶ Document describing a single response activity • For a response what event data is required to triage • What actions should be taken • Escalation communication and do we need to order pizza • Can we reduce the cost of pizza by providing better data for response decisions? What Is a Response Plan?
  • 11. ▶ The first step in embarking on a SIEM replacement initiative is • Identifying and prioritizing high value use cases, response plans and compliance reports: • Splunk PS has a 1-2 week SIEM replacement workshop where we come in and help customers: − Identify and develop high-fidelity use cases slated for migration/development − Datasources and enrichment identified via use case prioritization process − Plan the solution architecture • We typically see a 30-60% reduction in use cases selected for migration generally due to: − Old and/or stale rules − Housekeeping rules no longer needed − Rule consolidation due to advanced Splunk Query Language So no, you don’t have to migrate ALL your old funky rules! Putting the Horse Before the Cart…
  • 12. Datasources & Data Onboarding Parsers / Connectors / TAs (Technology Add-ons)
  • 13. ▶ Use case analysis determines in-scope datasources ▶ Why you don’t need to migrate your historical data from Legacy SIEM ▶ Data Source Onboarding via: How Do You Migrate Datasources to Splunk? • Universal Forwarder (UF) Deployed alongside existing parsers/connectors • UF deployed on syslog aggregator to read and ship logs into Splunk • Modern HTTP Event Collection • Database Tables (DBX) • Never forget: Splunk Stream! • Fields from raw data • Data Normalization • Splunkbase - splunkbase.com - Easy Button: Custom TAs via “Splunk Add-on Builder” App Splunk Log Forwarding: Syslog Aggregation TAs (Technology Add-ons)Other Common Methods
  • 15. ▶ Plan for modern data collection, deprecate legacy log collection infrastructure and stop accepting log loss today ▶ Plan for disaster recovery and availability ▶ Plan to remediate logging policies and source configuration Plan the Architecture Now that we know what we want to do, how will we execute it?
  • 16. © 2018 SPLUNK INC. Components > • Collection layer (connectors / parsers vs. UF's / HF's ) • Parsing layer (Technology Add-ons) • Storage layer (indexers) • Presentation layer (search head + Splunk Enterprise Security) • Security analytics (Splunk Enterprise Security) • Management layer (deployment server, cluster master, license server, deployer) Data source will determine what components are needed—your network determines where they should be Splunk Architecture
  • 17. Third Party Integrations Smart? Great! But Do You Play Well with Others?
  • 18. Smart? Great! But Do You Play Well With Others? “At this point in the interview, Johnson, we would like to see how well you play with others.” – Richard Stevens, Penfield, NY
  • 19. © 2018 SPLUNK INC. Identify current / future state third-party integration points Third Party Integrations We Support Integration With Most Third Party Systems: ▶ Case Management / Ticketing Systems • (ServiceNow, Remedy, etc) ▶ Threat Intelligence Feeds • (STIX, TAXII, Internal, etc) ▶ Database Integration • (Oracle, MySQL, etc) ▶ Microsoft Active Directory ▶ REST API support ▶ Custom Code ▶ Others
  • 20. © 2017 SPLUNK INC. Cloud Security Endpoints Orchestration WAF & App Security Threat Intelligence Network Web Proxy Firewall Identity and Access
  • 21. You Got This! Things You Can Do Today, to Get Prepared for Your SIEM Replacement
  • 22. ▶ Identify/audit and prioritize use cases for migrations ▶ Identify/audit and prioritize datasources for migration ▶ Identify datasource owners ▶ Research Splunk Technology Add-ons for datasource at splunkbase.com ▶ Assets and identities: identify CMDB sources ▶ Third-party integrations ▶ Develop logging standards Replacement Checklist:
  • 23. What Do “You” Do Next?
  • 25. Splunk Security Portfolio for SIEM Enterprise Security600+ Partner Apps User Behavior Analytics Platform for Operational Intelligence Network data Exchange data ES Content Update PCI Compliance Search and Investigate Monitoring & Alerting Dashboards and Reports Incident & Breach Response Splunk Security Apps App for AWS ML Toolkit Google Cloud Microsoft Cloud Discover Anomalous Behavior Detect Unknown Threats Automation & Orchestration Threat Detection Security Operations Threat Intel Email EDR/ETDR DLP
  • 27. ES : Security Posture
  • 46. 1 2 3
  • 47. 1 2
  • 49. 1 2
  • 54. 2 1
  • 57. © 2018 SPLUNK INC. ▶ Improved visibility over hybrid infrastructure ▶ Gained ability to detect and respond to complex cyberthreats ▶ Reduced IT costs due to more efficient resourcing Analytics-Driven SIEM to Enable Hybrid Cloud Transition
  • 58. © 2018 SPLUNK INC. ▶ Improve the speed of security event detection by at least 70 percent ▶ Accelerate investigation of high-priority security incidents by at least 70 percent ▶ Decrease the overall financial impact of security outages by at least 50 percent Speeding Detection, Investigation and Resolution With Splunk SIEM “With Splunk ES, our IT team can gain visibility across thousands of endpoints continuously – including servers, network devices, security scans and threat feeds – enabling faster threat detection and resolution for our customers.” – Vice President and Chief Information Security Officer, Rackspace
  • 59. © 2018 SPLUNK INC. ▶ An estimated 30 percent lower cost of ownership compared to on-premises alternatives ▶ A dramatic reduction in security investigation and resolution times ▶ Protection against threats, breaches and malware; ensuring regulatory compliance Biopharma Leader Gets Ahead of Security Threats With Analytics-Driven SIEM in the Cloud “ With Splunk the organization now has a security solution that is flexible and scalable to ingest all of its data ubiquitously and that enables the security team to draw conclusions from its data in near real time.”Biopharma
  • 61. ▶ Contact your Account Executive ▶ Contact an Expert ▶ Bi-weekly security demos ▶ Schedule a pre- assessment session with a Sales Engineer Transform Your Security: Next Steps
  • 62. © 2018 SPLUNK INC. Don't forget to rate this session in the SplunkLive! mobile app Thank You
  • 63. © 2018 SPLUNK INC. October 1-4, 2018 ▶ 8,750+ Splunk Enthusiasts ▶ 300+ Sessions ▶ 100+ Customer Speakers Plus Splunk University: ▶ Three Days: September 29-October 1, 2018 ▶ Get Splunk Certified for FREE! ▶ Get CPE credits for CISSP, CAP, SSCP Walt Disney World Swan and Dolphin Resort in Orlando c o n f.s p lu n k .c o m SAVE THE DATE!