top of page

Splunk Demo Battle Card 2014

  • Writer: Pavan Raja
    Pavan Raja
  • Apr 9
  • 3 min read

Summary:

The document presents six use cases designed to demonstrate the capabilities of Logger and Express – Security Manager (ESM) by HP ArcSight compared to Splunk in terms of log management and SIEM functionalities. Specifically, Logger focuses on log management with three demos, while ESM specializes in SIEM with three more demos. For Logger: 1. **IT Ops Use Case**: Demonstrates how Logger can manage IT operations similar to Splunk by managing a web server down event and identifying configuration changes causing the issue. 2. **Netflow Use Case**: Shows Logger's capability to handle data pipelines and searches, connecting all sources to Microsoft SQL Servers, mirroring Splunk’s search-based approach but within Logger's platform. 3. **Raw Data Use Case**: Highlights Logger's ability to store not only structured data but also raw or unstructured data, with the capability to parse such data into a structured format for searches. For ESM (Express – Security Manager): 1. **Privileged User Monitoring Use Case**: Features IdentityView within ESM, emphasizing its strengths in tracking user activities and addressing Splunk’s weaknesses in IAM and RBAC. 2. **RepSM Use Case**: Demonstrates how DVLabs provides real-time updates on security threats like malicious IPs, domains, reputation scores, and exploit types, outperforming Splunk's less robust handling of such information. 3. **Worm Outbreak Use Case**: Highlights ESM’s ability to correlate data in real-time and through historic analysis, surpassing Splunk’s search capability and alerting system for deeper security insights. These use cases aim to showcase the competitive advantages of Logger and ESM by comparing their functionalities with those of Splunk in managing log data and providing SIEM solutions.

Details:

The document outlines six use cases designed to showcase how Logger and Express – Security Manager (ESM) by HP ArcSight perform against Splunk, emphasizing their respective strengths in log management and SIEM functionalities. For Logger, which focuses on log management, there are three demos tailored for this purpose: 1. **IT Ops Use Case**: This demo highlights the ability of Logger to manage IT operations similar to how Splunk handles such scenarios by demonstrating a web server down event and the configuration change that led to the issue. 2. **Netflow Use Case**: It demonstrates how Logger can efficiently handle data pipelines and searches, showcasing its capability to connect all sources talking to Microsoft SQL Servers, mimicking Splunk’s search-based approach but within Logger's platform. 3. **Raw Data Use Case**: This use case showcases Logger's ability to store not only structured data but also raw or unstructured data. It shows how raw data can be parsed into a structured format upon search, contradicting Splunk's claim that Logger cannot handle such data types. For ESM (Express – Security Manager), which is focused on SIEM functionalities, there are also three demos: 1. **Privileged User Monitoring Use Case**: This demo showcases the IdentityView feature within ESM, highlighting its ability to track user activities and exploit Splunk's weaknesses in identity and access management (IAM) and role-based access control (RBAC). 2. **RepSM Use Case**: It emphasizes the differentiators of ESM by showcasing how DVLabs provides real-time updates on malicious IPs, domains, reputation scores, and exploit types through ESM. This contrasts with Splunk's less robust handling of such security information. 3. **Worm Outbreak Use Case**: This demo demonstrates ESM’s strong correlation capabilities, both in real-time and through historic analysis, which are not fully realized by Splunk’s search capability and alerting system. It also shows the ability to correlate on pre-existing events for deeper security insights. These use cases collectively aim to highlight Logger's and ESM's strengths in handling various log management and SIEM tasks that are central to both Splunk and their respective platforms, thereby providing a competitive edge based on functionality comparisons.

Disclaimer:
The content in this post is for informational and educational purposes only. It may reference technologies, configurations, or products that are outdated or no longer supported. If there are any comments or feedback, kindly leave a message and will be responded.

Recent Posts

See All
Zeus Bot Use Case

Summary: "Zeus Bot Version 5.0" is a document detailing ArcSight's enhancements to its Zeus botnet detection capabilities within the...

 
 
 
Windows Unified Connector

Summary: The document "iServe_Demo_System_Usage_for_HP_ESP_Canada_Solution_Architects_v1.1" outlines specific deployment guidelines for...

 
 
 

Comments


@2021 Copyrights reserved.

bottom of page