Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Splunk Launches “Splunk Storm” Cloud Service Offering

Splunk, the recently gone public provider of software that helps organizations gather and make use of machine data from a diverse set of sources, today launched Splunk Storm, a cloud service based on its flagship Splunk software.

Splunk, the recently gone public provider of software that helps organizations gather and make use of machine data from a diverse set of sources, today launched Splunk Storm, a cloud service based on its flagship Splunk software.

Designed for organizations that run applications in public cloud environments such as Amazon Web Services (AWS), Heroku, Google App Engine, Rackspace, and others, users can diagnose and troubleshoot application problems, gain visibility and insight into cloud-based applications, and monitor important metrics.

Splunk Storm“As more organizations and developers move their projects to the cloud, we want to be there with them,” said Godfrey Sullivan, Chairman and CEO, Splunk. “Customers run Splunk Enterprise on premises and in clouds today, and now, Splunk Storm provides developers with an easy-to-use, subscription version of our software.”

Splunk Storm runs as a fully managed, multi-tenant service on AWS and dynamically provisions the resources needed to store and analyze data.

Key Features in Splunk Storm include:

Store Machine Data from Any Source –Index and store machine data in real-time from any source, format, platform, or cloud provider without needing custom parsers or connectors.

Search, Investigate, Correlate –Use the Splunk search language to search real-time and historical machine data, filter events, correlate information across various data types, link transactions across multiple application components, and trend critical operational parameters.

Report and Analyze – Extract the precise information you need out of your machine data and generate reports dynamically and iteratively.

Collaborate and Share – Share projects with others in your organization to generate cross-functional views of the data.

Advertisement. Scroll to continue reading.

Splunk Storm does not require installation or maintenance of hardware or software, and can to scale storage up or down as needed.

Pricing for Splunk Storm starts with a free option that lets users store and analyze up to 1GB of data. Moving up, pricing runs from $20.00 per month for 2GB of storage, to $3,000.00 per month for up to 1TB of storage.

Additionally, users can set up a policy to delete data older than a specified time period. For example, users can set up a policy to automatically delete any data older than 30 days. Old or un-needed data can be manually deleted as well.

San Francisco-based Splunk has more than 600 employees worldwide, 14 offices around the world, and claims more than 4,000 organizations as customers.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.