SlideShare a Scribd company logo
Enabling Dynamic Application Access while
Preventing Application Level Attacks
Splunk App for F5
F A C T S H E E T
For users with these advanced needs, F5 has partnered with
Splunk to offer a solution specifically tailored to ASM.
Why Splunk for F5
Splunk is the data engine for IT. It collects, indexes and
harnesses the fast-moving IT data generated by your IT systems
and infra-structure—whether physical, virtual or in the cloud.
Splunk scales to accept tens of terabytes of data per day and,
using a proprietary search and analysis language, can correlate
disparate data sources to provide new views and new insights.
The Splunk App for F5 presents ASM data with FirePass data
that allows for a comprehensive view of application access
and attacks. Here are four examples of how Splunk and F5 can
enhance security:
•	 Correlate access attempts by an unapproved device with
correct credentials in FirePass and see attacks from the
same IP address in the ASM data
•	 Get a more complete view of user behavior over time to
understand and profile behaviors that can lead to theft of
sensitive data
•	 View long-term user behaviors to determine access
patterns and watch for outliers
•	 Correlate network access from geographies with FirePass
data and local AD log data to pinpoint fraudulent activity
Splunk gives your security team access to virtually all IT data
for investigations and root cause analysis. Comprehensive
security dashboards can be created to deliver the essential
metrics or key performance indicators (KPIs) that you need to
maintain security best practices. Splunk also has the unique
ability to augment data from FirePass and ASM by connecting
to and gather data from Active Directory or LDAP and asset
management databases that can highlight asset or application
owner information.
The Challenges
Businesses are faced with competing challenges when it comes
to granting their mobile workforce access to company data. The
data must be readily accessible to users on the go but at the
same time companies must protect their internal systems that
contain sensitive information. From intellectual property and
financial data to business processes and customer information,
this data needs to be safeguarded. Robust monitoring controls
are “a must” for maintaining auditing access and preventing
data loss and availability issues. The network infrastructure
supporting web service-based business service deployments
needs to be constantly monitored in today’s always-on
business. Availability, often overlooked as a security issue, needs
to be constantly monitored and linked to user access and system
identities. 
F5 Solutions
The F5 BIG-IP® Access Policy Manager™ (APM) is a flexible, high-
performance access and security solution that runs as a module
on BIG-IP® Local Traffic Manager™ (LTM). With BIG-IP APM
you can provide policy-based, context-aware access to users
while simplifying authentication, authorization, and accounting
management. Reports are grouped into geo-location, session
and access categories.
BIG-IP ASM delivers comprehensive protection for Web
applications and operational infrastructure. BIG-IP ASM employs
an auto-adaptive approach to application delivery security,
where the security policy is automatically updated based on
observed traffic patterns. This automatic policy-building feature
makes it easier to implement and maintain security policies and
reduces the total cost of ownership.
The F5 FirePass SSL VPN provides both security and ease of use.
It grants users secure remote access to corporate applications
using a technology that everyone understands: a Web browser.
Users have secure access from any Internet connection—while
FirePass ensures that connected computers are fully patched
and protected. FirePass provides robust, secure SSL VPN remote
access to business applications from a wide range of client
devices, including Apple iPhone and Windows Mobile devices.
Using full-tunnel SSL technology and client access policies
defined by system administrators, remote clients can log on
to corporate business applications under pre-defined access
permissions and client directory control. In the course of
protecting web applications and providing robust SSL VPN
capabilities, ASM and FirePass respectively produce detailed
log files about each transaction. While both products come with
detailed reporting capabilities, you may need to conduct even
more advanced searches, reports and alerts on the data using a
specially-designed analysis tool.
Incident response, threat analysis, event correlation from
multiple network devices or compliance audits are common
examples of activities that can require advanced investigation.
www.splunk.comlisten to your data
250 Brannan St, San Francisco, CA, 94107 info@splunk.com | sales@splunk.com 866-438-7758 | 415-848-8400 www.splunkbase.com
F A C T S H E E T
Copyright © 2012 Splunk Inc. All rights reserved. Splunk Enterprise is protected by U.S. and international copyright and intellectual property laws.
Splunk is a registered trademark or trademark of Splunk Inc. in the United States and/or other jurisdictions. All other marks and names mentioned
herein may be trademarks of their respective companies. Item # FS-Splunk-F5-101
The Splunk App for F5
The Splunk App for F5 provides real-time dashboards for
monitoring key performance metrics. Reports from Splunk
support long-term trending and can be downloaded in PDF or
Excel formats. Reports can also be scheduled for email delivery.
The Splunk App for F5 supports core Splunk functionality such
as deep drill-down from graphical elements, robust role-based
access controls and Splunk’s award-winning search capabilities.
The following are a sample of the reports available in this version
of Splunk for F5 using ASM, APM and FirePass data:
•	 Request Status Over Time
•	 Top Attacker
•	 Top Sites
•	 Top Violations
•	 Active Sync by Device Type
•	 Top Device Type
•	 Top User
•	 Geo-location Reports
•	 Session Duration and Throughput
•	 Authentication Success/Failure
•	 Connections by User
•	 Failed Connections by User
•	 All Connections Over Time
Features
•	 Visualize key performance indicators (KPIs) using prebuilt
dashboards for monitoring configuration changes,
malicious websites and bandwidth usage
•	 Leverage the Splunk scheduled reporting service
•	 Add and create your own graphics and dashboards
•	 Search and investigate with Splunk’s award-winning IT
data engine for universal real-time data collection and
indexing across application, server, network or security
devices
•	 Utilize an intuitive, easy-to-use interface that facilitates
the communication of status and issues across your
infrastructure
•	 Deploy with flexibility across a scalable distributed
architecture
F A C T S H E E T
Free Download
Download Splunk for free. You’ll get a Splunk Enterprise
license for 60 days and you can index up to 500 megabytes
of data per day. After 60 days, or anytime before then, you
can convert to a perpetual Free license or purchase an
Enterprise license by contacting sales@splunk.com.

More Related Content

PPTX
Salesforce shield by manish
PPTX
PaaS security challenges and solutions (salesforce vision)
PPTX
How to Secure Your IaaS and PaaS Environments
PDF
Cloud security monitoring
PPTX
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
PDF
Asp for sap_data_sheet___appsian_application_security_platform_2019
PDF
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
PDF
Top Five Security Must-Haves for Office 365
Salesforce shield by manish
PaaS security challenges and solutions (salesforce vision)
How to Secure Your IaaS and PaaS Environments
Cloud security monitoring
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
Asp for sap_data_sheet___appsian_application_security_platform_2019
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
Top Five Security Must-Haves for Office 365

What's hot (20)

PPTX
Secure File Sharing Basics - What Every File Sharing Provider Should Have
PDF
Soteria Cybersecurity Healthcheck-FB01
PDF
Splunk for palo_alto
PDF
SOC-as-a-Service - comSpark 2019
PDF
Microsoft Cloud App Security
PDF
Workshop: Threat Intelligence - Part 1
PDF
How to protect your corporate from advanced attacks
PDF
Azure Information Protection
PDF
Protect your business with identity and access management in the cloud
PPTX
The Inconvenient Truth About API Security
PPTX
Security and Compliance for Enterprise Cloud Infrastructure
PDF
Azure Security Center
PPTX
SplunkLive! Customer Presentation - SSA
PPTX
Token Management using Stormpath inside Mule
PDF
ESM_101_6.9.0.pdf
PPTX
Rethinking Security: The Cloud Infrastructure Effect
PDF
Information Security Whitepaper
PDF
Security and Compliance
PPTX
Application visibility across the security estate the value and the vision ...
PPTX
Put out audit security fires, pass audits -every time
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Soteria Cybersecurity Healthcheck-FB01
Splunk for palo_alto
SOC-as-a-Service - comSpark 2019
Microsoft Cloud App Security
Workshop: Threat Intelligence - Part 1
How to protect your corporate from advanced attacks
Azure Information Protection
Protect your business with identity and access management in the cloud
The Inconvenient Truth About API Security
Security and Compliance for Enterprise Cloud Infrastructure
Azure Security Center
SplunkLive! Customer Presentation - SSA
Token Management using Stormpath inside Mule
ESM_101_6.9.0.pdf
Rethinking Security: The Cloud Infrastructure Effect
Information Security Whitepaper
Security and Compliance
Application visibility across the security estate the value and the vision ...
Put out audit security fires, pass audits -every time
Ad

Similar to Splunk for f5 (20)

PPTX
Get more versatile and scalable protection with F5 BIG-IP
PDF
F5 Networks: architecture and risk management
PPTX
SplunkLive! Denver - Nov 2012 - Interac
PDF
Rapidly Improving Security Posture - CanDeal
PPTX
F5 Networks: миграция c Microsoft TMG
PDF
Splunk for security
PDF
Getting Started with Splunk Enterprise
PDF
Splunk for big_data
PDF
Splunk Enterprise 6.1 Solutions Brief
PPTX
Splunk for Security Breakout Session
PPTX
SplunkLive! Cincinnati - E.W. Scripps - Oct 2012
PDF
Splunk app for_enterprise_security
PPTX
Josh Diakun - Cust Pres - Splunk Partner Event
PPTX
SplunkLive! London 2017 - Splunk Enterprise for IT Troubleshooting
PPTX
Splunk at Weill Cornell Medical College
PPTX
Splunk
PDF
Webinar: Neues zur Splunk App for Enterprise Security
PDF
Splunk for fisma
PPTX
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
PDF
Splunk Webinar Best Practices für Incident Investigation
Get more versatile and scalable protection with F5 BIG-IP
F5 Networks: architecture and risk management
SplunkLive! Denver - Nov 2012 - Interac
Rapidly Improving Security Posture - CanDeal
F5 Networks: миграция c Microsoft TMG
Splunk for security
Getting Started with Splunk Enterprise
Splunk for big_data
Splunk Enterprise 6.1 Solutions Brief
Splunk for Security Breakout Session
SplunkLive! Cincinnati - E.W. Scripps - Oct 2012
Splunk app for_enterprise_security
Josh Diakun - Cust Pres - Splunk Partner Event
SplunkLive! London 2017 - Splunk Enterprise for IT Troubleshooting
Splunk at Weill Cornell Medical College
Splunk
Webinar: Neues zur Splunk App for Enterprise Security
Splunk for fisma
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Splunk Webinar Best Practices für Incident Investigation
Ad

More from Greg Hanchin (20)

PDF
NUTANIX and SPLUNK
PDF
Splunk for exchange
PDF
Splunk for cyber_threat
PDF
Splunk for compliance
PDF
Splunk Searching and reporting 43course
PDF
Advanced Splunk 50 administration
PDF
Advanced searching and reporting 50 course
PDF
Administering splunk 43 course
PDF
Using splunk43course
PDF
Using Splunk course outline
PDF
Advanced Splunk Administration
PDF
Splunk Advanced searching and reporting Class description
PDF
Administering Splunk course
PDF
Splunk Searching and Reporting Class Details
PPTX
Splunk FISMA for Continuous Monitoring
PDF
Splunk forwarders tech_brief
PDF
Splunk and map_reduce
PDF
Splunk for xen_desktop
PDF
Splunk for ibtrm
PDF
Splunk for db_connect
NUTANIX and SPLUNK
Splunk for exchange
Splunk for cyber_threat
Splunk for compliance
Splunk Searching and reporting 43course
Advanced Splunk 50 administration
Advanced searching and reporting 50 course
Administering splunk 43 course
Using splunk43course
Using Splunk course outline
Advanced Splunk Administration
Splunk Advanced searching and reporting Class description
Administering Splunk course
Splunk Searching and Reporting Class Details
Splunk FISMA for Continuous Monitoring
Splunk forwarders tech_brief
Splunk and map_reduce
Splunk for xen_desktop
Splunk for ibtrm
Splunk for db_connect

Recently uploaded (20)

PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Tartificialntelligence_presentation.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Programs and apps: productivity, graphics, security and other tools
Network Security Unit 5.pdf for BCA BBA.
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectroscopy.pptx food analysis technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
A Presentation on Artificial Intelligence
A comparative analysis of optical character recognition models for extracting...
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
MYSQL Presentation for SQL database connectivity
Building Integrated photovoltaic BIPV_UPV.pdf
Tartificialntelligence_presentation.pptx

Splunk for f5

  • 1. Enabling Dynamic Application Access while Preventing Application Level Attacks Splunk App for F5 F A C T S H E E T For users with these advanced needs, F5 has partnered with Splunk to offer a solution specifically tailored to ASM. Why Splunk for F5 Splunk is the data engine for IT. It collects, indexes and harnesses the fast-moving IT data generated by your IT systems and infra-structure—whether physical, virtual or in the cloud. Splunk scales to accept tens of terabytes of data per day and, using a proprietary search and analysis language, can correlate disparate data sources to provide new views and new insights. The Splunk App for F5 presents ASM data with FirePass data that allows for a comprehensive view of application access and attacks. Here are four examples of how Splunk and F5 can enhance security: • Correlate access attempts by an unapproved device with correct credentials in FirePass and see attacks from the same IP address in the ASM data • Get a more complete view of user behavior over time to understand and profile behaviors that can lead to theft of sensitive data • View long-term user behaviors to determine access patterns and watch for outliers • Correlate network access from geographies with FirePass data and local AD log data to pinpoint fraudulent activity Splunk gives your security team access to virtually all IT data for investigations and root cause analysis. Comprehensive security dashboards can be created to deliver the essential metrics or key performance indicators (KPIs) that you need to maintain security best practices. Splunk also has the unique ability to augment data from FirePass and ASM by connecting to and gather data from Active Directory or LDAP and asset management databases that can highlight asset or application owner information. The Challenges Businesses are faced with competing challenges when it comes to granting their mobile workforce access to company data. The data must be readily accessible to users on the go but at the same time companies must protect their internal systems that contain sensitive information. From intellectual property and financial data to business processes and customer information, this data needs to be safeguarded. Robust monitoring controls are “a must” for maintaining auditing access and preventing data loss and availability issues. The network infrastructure supporting web service-based business service deployments needs to be constantly monitored in today’s always-on business. Availability, often overlooked as a security issue, needs to be constantly monitored and linked to user access and system identities.  F5 Solutions The F5 BIG-IP® Access Policy Manager™ (APM) is a flexible, high- performance access and security solution that runs as a module on BIG-IP® Local Traffic Manager™ (LTM). With BIG-IP APM you can provide policy-based, context-aware access to users while simplifying authentication, authorization, and accounting management. Reports are grouped into geo-location, session and access categories. BIG-IP ASM delivers comprehensive protection for Web applications and operational infrastructure. BIG-IP ASM employs an auto-adaptive approach to application delivery security, where the security policy is automatically updated based on observed traffic patterns. This automatic policy-building feature makes it easier to implement and maintain security policies and reduces the total cost of ownership. The F5 FirePass SSL VPN provides both security and ease of use. It grants users secure remote access to corporate applications using a technology that everyone understands: a Web browser. Users have secure access from any Internet connection—while FirePass ensures that connected computers are fully patched and protected. FirePass provides robust, secure SSL VPN remote access to business applications from a wide range of client devices, including Apple iPhone and Windows Mobile devices. Using full-tunnel SSL technology and client access policies defined by system administrators, remote clients can log on to corporate business applications under pre-defined access permissions and client directory control. In the course of protecting web applications and providing robust SSL VPN capabilities, ASM and FirePass respectively produce detailed log files about each transaction. While both products come with detailed reporting capabilities, you may need to conduct even more advanced searches, reports and alerts on the data using a specially-designed analysis tool. Incident response, threat analysis, event correlation from multiple network devices or compliance audits are common examples of activities that can require advanced investigation.
  • 2. www.splunk.comlisten to your data 250 Brannan St, San Francisco, CA, 94107 info@splunk.com | sales@splunk.com 866-438-7758 | 415-848-8400 www.splunkbase.com F A C T S H E E T Copyright © 2012 Splunk Inc. All rights reserved. Splunk Enterprise is protected by U.S. and international copyright and intellectual property laws. Splunk is a registered trademark or trademark of Splunk Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item # FS-Splunk-F5-101 The Splunk App for F5 The Splunk App for F5 provides real-time dashboards for monitoring key performance metrics. Reports from Splunk support long-term trending and can be downloaded in PDF or Excel formats. Reports can also be scheduled for email delivery. The Splunk App for F5 supports core Splunk functionality such as deep drill-down from graphical elements, robust role-based access controls and Splunk’s award-winning search capabilities. The following are a sample of the reports available in this version of Splunk for F5 using ASM, APM and FirePass data: • Request Status Over Time • Top Attacker • Top Sites • Top Violations • Active Sync by Device Type • Top Device Type • Top User • Geo-location Reports • Session Duration and Throughput • Authentication Success/Failure • Connections by User • Failed Connections by User • All Connections Over Time Features • Visualize key performance indicators (KPIs) using prebuilt dashboards for monitoring configuration changes, malicious websites and bandwidth usage • Leverage the Splunk scheduled reporting service • Add and create your own graphics and dashboards • Search and investigate with Splunk’s award-winning IT data engine for universal real-time data collection and indexing across application, server, network or security devices • Utilize an intuitive, easy-to-use interface that facilitates the communication of status and issues across your infrastructure • Deploy with flexibility across a scalable distributed architecture F A C T S H E E T Free Download Download Splunk for free. You’ll get a Splunk Enterprise license for 60 days and you can index up to 500 megabytes of data per day. After 60 days, or anytime before then, you can convert to a perpetual Free license or purchase an Enterprise license by contacting sales@splunk.com.