IT Central Station is now PeerSpot: Here's why

What is your primary use case for Splunk?

Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)

Hi Everyone,

What is your primary use case for Splunk?

Thanks for sharing your thoughts with the community!

PeerSpot user
9898 Answers

Jairo Willian Pereira - PeerSpot reviewer
Top 5LeaderboardReal User

Business indicators (KPIs) for specific (and limited) purpose together IT area, some tests with security build-in "use-cases" and like a correlation tool using pre-defined SPL (Search Processing Language).

reviewer1331706 - PeerSpot reviewer
Top 5LeaderboardReal User

We use Splunk to monitor our private cloud, data center, and other applications.

reviewer1795125 - PeerSpot reviewer
Top 10Real User

I use Splunk for testing purposes. It is used for school research and to learn how to use Splunk. Splunk is mainly used for collecting logs and dashboards.

Avraham Sonenthal - PeerSpot reviewer
Top 5LeaderboardReal User

I work for a government agency and we use Splunk to monitor our Cisco equipment. I'm a senior network engineer and we are customers of Splunk.

Marcelo Canedo - PeerSpot reviewer
Top 20MSP

Our company is an IT service provider. We are resellers of Splunk. One of our clients that we monitor is a laboratory that uses this solution. Splunk is a change management solution. We use the solution as a log collector, and to analyze and provide alerts from the IT instructor.

reviewer1086690 - PeerSpot reviewer

We use it for security operations and management.

Chris Danshaw - PeerSpot reviewer
Top 20Real User

We are using it for information assurance, system alerting, and compliance. We are using its latest version.

Rajiv Warrier - PeerSpot reviewer
Top 5LeaderboardReal User

The solution is primarily a SIEM tool and it basically helps companies with security.

reviewer971370 - PeerSpot reviewer
Top 5LeaderboardReal User

We are resellers. We provide solutions to our clients. Splunk is primarily used for developing CM solutions that are based on the Splunk platform for future security operation center development. We are concentrating on assisting in the development of a security monitor as well as analysis. If I am not mistaken, it's a standard CM system for identification, security verification, and event monitoring.

Robert Cheruiyot - PeerSpot reviewer
Top 5Real User

I have some experience with the solution, since I am working with customers who are interested in part time help monitoring their network and have been helping them fine-tune the rules in the solution's platform. The way the primary task works is to watch for and then respond to the threat. Should there be a need, I usually work with a team in fine-tuning the rules on this platform. We are providing the products. I recently started working primarily on the Playbooks of the Splunk Phantom, so I've been creating some of these to help the customer automate the process of responding to the threats.

reviewer946224 - PeerSpot reviewer

We typically use it for centralized log management and SIEM functionality. I am using the most recent version of it.

reviewer1689987 - PeerSpot reviewer
Top 5LeaderboardReal User

We use the solution for monitoring systems. We also use it with servers and CG routers from the data center, as well as for collecting the ADL from all networks which are located in our regions of the country.

Ali Tamimi - PeerSpot reviewer
Top 20LeaderboardReal User

We primarily use the solution for security and operations monitoring.

reviewer1655130 - PeerSpot reviewer
Top 20Real User

We typically use Splunk to collect and check all the logs and events around the diverse network environment which includes, firewall, switches, and routers. For example, we have traffic that needs to go from one part of the network to another and if we think there is a firewall blocking it along the path, rather than log in to all the firewalls to see what is happening, we simply go into Splunk and the check traffic going across the parts of the network to see where it is being dropped and what is the likely reason it has been dropped.

reviewer1630161 - PeerSpot reviewer
Top 5Real User

We're using the solution to try to build a virtual network and put Splunk inside it and do some kind of transcentralization with a log server. Our aim is to track connections, network traffic and some personal databases. I'm the founder of the company and we are customers of Splunk.

reviewer1605462 - PeerSpot reviewer

I use this solution for data visualization.

reviewer1367535 - PeerSpot reviewer
Top 20Real User

We are using it for security information and event management (SIEM). We have started to use Splunk recently, and we are in the implementation phase as of now.

reviewer1521537 - PeerSpot reviewer
Top 5Real User

We are using Splunk for cybersecurity operations.

Md. Iqbal Karim - PeerSpot reviewer
Top 20Reseller

We primarily use the solution for monitoring and security. We can use the solution to try to find some correlational data. For example, in banks, there is usually a protocol whereby users cannot withdraw more than a certain amount of money from an ATM. However, we find that, when people are on holiday, they are trying to withdraw more than the allowed amount. It's a use case we can deploy in our country. You can set certain rules and watch the data in order to gain insights.

reviewer1524594 - PeerSpot reviewer
Top 5LeaderboardReal User

We are a solution provider and Splunk is something that we provide as a service to our customers.

reviewer1505082 - PeerSpot reviewer
Top 10Real User

We are using Splunk as a SIEM tool. We're using it for monitoring.

reviewer1404306 - PeerSpot reviewer
Top 5Real User

We have multiple use cases, almost 200 plus use cases. An example, travel activities where you log in.

Steffen Klein - PeerSpot reviewer
Top 5LeaderboardConsultant

My reason for implementing it was just to learn more about the product. I wanted to learn about the Splunk programming language, how to pipe searches, add logs, verify the logs, create fields, extract data into fields, build dashboards, and to get hands-on experience with the product.

reviewer1478619 - PeerSpot reviewer
Real User

The primary use case of this solution is to monitor Cyber Mission databases. I create the diagrams to create an architecture that is then implemented. However, creating these diagrams are for my own learnings since these implementations are usually already available in the cloud office logs.

reviewer1470723 - PeerSpot reviewer
Top 20Real User

We primarily use the solution for monitoring our infrastructure.

reviewer1453023 - PeerSpot reviewer
Top 5MSP

I'm the CSSP manager and we are customers of Splunk.

Julio Ortiz - PeerSpot reviewer
Top 20Reseller

We use Splunk for security and also PCI compliance. We have installed and implemented this solution for several clients in Bolivia with our team. We have received training from Splunk directly, and we have also provided training to our clients. We deploy two versions: one for on-premise and one for the cloud. Most of our customers purchase Splunk because they required a tool for gathering and collecting all of the logs from the infrastructure in order to make a correlation between data and to spot patterns surrounding security incidents.

reviewer1062186 - PeerSpot reviewer
Top 5LeaderboardReal User

We are using Splunk to look at the logs, and see what is happening.

Matheus Nery - PeerSpot reviewer
Top 10Real User

We use a lot of sales metrics. We use machine learning models to provide sales forecasting. We create database connections and run a query on the database. The next step is to place the data into Splunk. We create indexes to get the data into the Splunk dashboard.

reviewer1062186 - PeerSpot reviewer
Top 5LeaderboardReal User

We use Splunk for log analysis and security monitoring.

reviewer1454661 - PeerSpot reviewer
Top 20Real User

I use Splunk on-and-off — I started with in-house projects, then moved up to commercial projects.

reviewer1463439 - PeerSpot reviewer
Top 20Real User

We use Splunk on-premise. We mostly use it for log analysis and fraud detection. We are also testing using it in machine learning and other solutions. We have 10 people managing Splunk and we have approximately 150 people using the product in total.

reviewer1317924 - PeerSpot reviewer
Real User

The solution is primarily used to monitor the operating system for threats, specifically related to login threats. If someone trying to log-in, or somebody trying to break into the system, the idea is it will check that and catch things. It's mainly for external threats to the operating system.

HimanshuTejwani - PeerSpot reviewer
Top 5LeaderboardReal User

Our primary use case of Splunk is for log monitoring and infrastructure monitoring. If we want to diagnose any issue in our application, we just push our application logs. This is on any client server using the universal forwarder logs on the Splunk server. After indexing, we can create a base log, and create attractive dashboards that are simple to understand and use. I'm a system administrator and we are customers of Splunk.

reviewer1200885 - PeerSpot reviewer
Top 20Real User

It's the primary place where I'd go to do an investigation if I want to see what's going on within an endpoint, or on a network, or with a user.

Praful Bhatnagar - PeerSpot reviewer
Top 5Real User

We are a software development company and Splunk is one of the products that we have implemented for our clients. It is used for log analytics as well as the mobile SDK for checking the stability of mobile applications.

Balamurali Vellalath - PeerSpot reviewer
Top 20MSP

Since we have an IT services company, we have been using Splunk for the deployment to the customer locations as well. Sometimes the customer will come back to us and say that we need to have a SIEM tool, and when we do the benchmarking, we'll do a couple of deployments on the Splunk side and at the customer's locations as well. As an example use case, we deployed Splunk to a banking institution a few years ago. There the use case was basically this: the customer wanted to set up a security operation center, and they wanted to have a pretty large deployment in terms of the number of endpoints and number of switches and routers. There were many regional branch offices and they have data centers and therefore, many assets in terms of endpoints. They had 30% of their assets are running on the cloud and they needed a complete solution from an incident monitoring and management perspective. That's why we deployed Splunk. They wanted to reduce the MTTR, and meantime resolution, and maintain detection. They didn't want to add more SOC analysts into their SOC as the organization scaled up. They have a plan to scale from 5,000 endpoints into 15-20,000 endpoints. They're very particular about deploying the SOC operation center. Splunk has since acquired Phantom as a SOAR platform. Therefore, we have tried to manage the security automation using Phantom with the help of Splunk deployments. It helps us meet the customer's requirements.

Praful Bhatnagar - PeerSpot reviewer
Top 5Real User

We are using the mobile SDK to check the stability of mobile applications.

Gregg Woodcock - PeerSpot reviewer
Top 10Real User

#1 is InfoSec
#2 is BI
#3 is IoT

Dawid Van Der Merwe - PeerSpot reviewer
Top 5LeaderboardVendor

Focused on log collection and analysis.
IT Operations - Predict and prevent problems with log (trap/syslog/Windows Events/ AD logs/etc.) monitoring experience
Security - Assists with threat detection, investigation and response
IoT - Minimize unplanned downtime and avoid high costs by centralising logs from a variety of IoT devices/appliances.
Business Analytics - Explore and visualize business processes for increased transparency

reviewer1285209 - PeerSpot reviewer
Top 5LeaderboardReal User

Information Security Solution with Log management (Primary)
Analytics (Secondary)

M Ghuyoor Syed - PeerSpot reviewer
Real User

Log collection and search.

reviewer1048674 - PeerSpot reviewer
Real User

Testing for insider threat behavior.

Engineer9887 - PeerSpot reviewer
Real User

Our primary use case is for monitoring and cybersecurity.

Rudi Wicaksono - PeerSpot reviewer
Real User

We were using Splunk for our networking to know exactly what kind of the traffic was going from one network to another network because we had a lot of the connections on other sites.

Mui Tran - PeerSpot reviewer
Real User

We need something to collect all our logs in a centralized solution. We have several servers but we don't have any log collection system.

Emad Ul Haq - PeerSpot reviewer
Real User

* Log collection and analysis * Reporting for the whole enterprise environment.

Luiz Fernandes - PeerSpot reviewer
Real User

We use it to do SIEM.

Seyfallah Tagrerout - PeerSpot reviewer

Our primary use case is reporting from the Windows administration. We have SCCM that configures the manager to update every PC workstation and server in the company. We have a lot of PCs and servers in our environment and we use Splunk for the gathering of the PCs and Windows service. We also use it to collect information from the security tools, for example, to provide the management information about how the everyday connection is.

it_user762567 - PeerSpot reviewer
Real User

* SIEM * Security information * Event management

Shaveta Datta - PeerSpot reviewer
Real User

Our primary use case was really as a client organization, like the government and the IT industries, we are in the telecoms sector. We analyze security reports. We use Splunk to order them and put them in a system and we use the various kinds of integration with Oracle Cloud which is helpful.

Presal0998 - PeerSpot reviewer

We use it for security incident event management and for IT service intermediates.

Marc Chan - PeerSpot reviewer
Real User

Our primary use case of this solution is as a centralized lab collection.

SenNetwork4433 - PeerSpot reviewer
Real User

Splunk is our central locale for cybersecurity and protection.

Director158d - PeerSpot reviewer
Real User

* Log mining * Log analysis

Enterpri4059 - PeerSpot reviewer
Real User

We use it for log aggregation. If you have a large number of devices, you need to aggregate log data to make more sense of it for parsing, troubleshooting, and metrics. This is all we use it for. If I need to track logs for certain application, I will push all of those logs to Splunk so I can run reports on those logs. It is more about what you are trying to do with it and what you need from it.

Tony Fabrikant - PeerSpot reviewer
Real User

We use it for logging and troubleshooting.

Gavan McLaughlin - PeerSpot reviewer
Real User

The primary use case is for log analytics. Although, we have been using it as a hammer which hits all the nails. We have sort of overused it in some areas where it doesn't need to be used.

Kenn Brodhagen - PeerSpot reviewer
Real User

We use it for application log monitoring. It is a logging product. Our application generates log files, then we upload them to Splunk. We run their agent on our EC2 instances in AWS, then we view the logs through their product, and it is all stored on their infrastructure.

Tomi Juslin - PeerSpot reviewer
Real User

We use it mostly for log monitoring, and also for trying to raise alarms.

Engineercb47 - PeerSpot reviewer
Real User

It is mostly centralized logging, a whole bunch of BI metrics, and an aggregation point, which we have adulterated for some PCI data. It does meet our use case for the most part.

Roman Burdakov - PeerSpot reviewer
Real User

We use it for logging, essentially for auditing and troubleshooting errors in production and finding out what happened. I have used the product personally for five years and at my current company for a year and a half.

Jerry Castille - PeerSpot reviewer
Real User

We primarily use it for SIEM.

Sam Osborn - PeerSpot reviewer
Real User

We use it for searching logs in a production environment.

Security1747 - PeerSpot reviewer
Real User

We use it for log analysis and alerting, and our stock analysts use it. I have used the product for more than five years. Then, in the cloud, I have used it for probably a year. It scales better in the cloud than on-premise.

reviewer718113 - PeerSpot reviewer
Real User

In the beginning, we just wanted to collect the logs from the different devices, like the nano storage, Linux, Windows, and VMware. We tried to get the uniform solution to collect and analyze all of the system logs.

Reviewer4612 - PeerSpot reviewer
Real User

It helps increase our productivity.

Reviewer0932 - PeerSpot reviewer
Real User

My primary use case for Splunk is for log file visualization and monitoring alert management.

Omar Sánchez (Mr.Tech) - PeerSpot reviewer

I work in the HIPAA industry. I work at a healthcare company in Puerto Rico. HIPAA requires us to go over security risks. Our use case right now is to be compliant. In our hierarchy, we have 1000 servers and 16,000 endpoints. We also have 100 entry points and 3000 VPN connections. It's huge.

reviewer905577 - PeerSpot reviewer

* Cybersecurity defense * Web app monitoring * VMware monitoring

Yosef Tavin - PeerSpot reviewer
Top 20Vendor

We use Splunk for a few different use cases: * We package it as part of one of our on-premise software offerings which includes our in-house customized dashboards. * We use it for Application Monitoring of many of our back-end systems. Monitoring is done completely through Splunk by forwarding application and other logs to Splunk and many configured customized alerts and dashboards for the Ops, Dev, product, and management teams. * We created a custom anomaly detection data model to monitor the activity of our back-end services on an hourly basis relative to the past three months of activity.

it_user782697 - PeerSpot reviewer
Real User

Splunk is a SIEM, a Security Information and Event Management solution. It is used, for example, for monitoring security logs and security information in companies and organizations. It is also used for correlation, meaning making policies, for detecting/monitoring attacks, and the like; for monitoring security logs, security events, preventing hackers from attacking. It's really for business continuity.

it_user872772 - PeerSpot reviewer

We use Splunk for infrastructure monitoring, application monitoring and in the security space for our organization as well as for our customers.

it_user870792 - PeerSpot reviewer

* IT Ops * Security * Compliance Many IT groups and non-IT groups use the product to gain insights into their environments.

it_user867936 - PeerSpot reviewer
Real User

With the use of Splunk, we were able to identify a brute force attack against a "switch" network device. An external attacker attempted to connect multiple times using multiple usernames. Splunk was able to detect these attempts and immediately blocked these attempts.

it_user867087 - PeerSpot reviewer
Real User

We primarily use it to correlate logs throughout the enterprise for both searching and use in investigations.

it_user865365 - PeerSpot reviewer
Real User

I work with Splunk, as a contractor, so I use it in many different areas. Most often it is used to get performance insights on applications or servers. Recently, I have used it in more of an endpoint security mindset.

it_user865026 - PeerSpot reviewer
Real User

Splunk provided me a platform to analyze both infrastructure loads and application performance for quick troubleshooting saving a load of time. Versatile apps at Splunkbase helped me to better configure and enhance visualization of the KPIs in my application.

reviewer860955 - PeerSpot reviewer
Real User

* Log monitoring and alerts * Looking up information * Dashboards for nice, fast information about various application servers.

it_user861630 - PeerSpot reviewer
Real User

Although my company uses Splunk extensively, my use case is primarily the Enterprise Security add-on.

Clara Merriman - PeerSpot reviewer
Real User

Primary use is business intelligence.

Christopher Mooney - PeerSpot reviewer
Real User

We started using Splunk to serve as a SIEM. In addition to correlating security information, we have begun to use it as a developer and customer advocate by analyzing user behaviors and system response times.

Michael Kaericher - PeerSpot reviewer
Real User

Security analysis to identify issues and for use in incident handling. Correlating logs across over 1000 servers with different operating systems and applications logs to provide security insights.

Rajesh Mandale - PeerSpot reviewer
Real User

The primary use case is to analyse and monitor big data, creating various dashboards, alerts, etc.

it_user860487 - PeerSpot reviewer
Real User

* Monitoring IT and other processes for a large university. * Leveraging alerts and dashboards to detect and predict security breaches and other events.

Gangikunta Somanath - PeerSpot reviewer
Real User

Security and incident management, which is helpful when organizing the data from different systems and running analysis on all the data together.

Gregg Woodcock - PeerSpot reviewer
Top 10Real User

Security. We have built SIEM solutions three times from the ground up (not ES) using Splunk for some of the largest companies in the world.

Robert Pollard - PeerSpot reviewer
Real User

We primary use Splunk for log aggregation and search across multiple systems with Splunk Enterprise Security layered on top.

it_user859770 - PeerSpot reviewer

We use Splunk for both monitoring and SIEM. Our security operations group uses Splunk to track user accounts which may have been compromised as well as follow those accounts through the organization.

it_user859668 - PeerSpot reviewer
Real User

We use Splunk primarily to provide our security and ops groups with important insights to more efficiently make decisions and take action.

it_user859650 - PeerSpot reviewer
Real User

IT service analytics: * Server machine data * Monitoring data * Alerting data * ITSI KPIs * Real-time reporting * Month-over-month reporting.

Colin Jackson, CISSP, MMIS, GMON - PeerSpot reviewer
Real User

We use Splunk for operations, application monitoring, and security. We are both cloud and on-premise based, so it has been very versatile for us.

Mick - PeerSpot reviewer

Operational intelligence monitoring for several different systems. We collect logs from applications and performance data from hardware, as well as information pulled from databases.

it_user859464 - PeerSpot reviewer

Splunk is our monitoring and investigating Swiss Army knife for key applications and systems. If we run it, we Splunk it.

it_user859446 - PeerSpot reviewer
Real User

Central repository for log collection and analysis in a complex environment. We have used it for a variety of use cases involving SIEM and operational support.

Enterprise677 - PeerSpot reviewer
Real User

We used it to create a full security operations center (SOC) for our IT department by adding all network and security devices, the AD, and mail servers to it. Then Splunk started to receive their logs, it analyzed them, and provided useful reports.

MS Alam - PeerSpot reviewer
Real User

* Searches the logs for all network devices and server. * Monitors clients' hardware, networking, and security operations. * It is good for the administrator to use it when maintaining the whole IT Infrastructure.

it_user340983 - PeerSpot reviewer
Real User

Our primary use case of Splunk has been on the implementation side for clients. Splunk has proven, on multiple occasions, to be extremely useful in the proactive monitoring of clients' hardware, networking, and security operations. Some use cases that we have implemented include, but are not limited to, proactive account lockouts based on machine learning of a typical person's average number of failed login attempts, aggregation of a servers logs in order to predict downtime/maintenance/hardware failures quite accurately, as well as helping administrators of all sorts to gain a full picture of their environments under a single screen.

Buyer's Guide
June 2022
Learn what your peers think about Splunk. Get advice and tips from experienced pros sharing their opinions. Updated: June 2022.
610,229 professionals have used our research since 2012.