Splunk Named a Leader in the 2022 IDC MarketScape for SIEM

Security Olivia Henderson

Splunk has been named a Leader in the IDC MarketScape: Worldwide SIEM 2022 Vendor Assessment (doc #US49029922, November 2022).

We believe this recognition is a testament to our commitment to delivering a best-in-class, data-centric security analytics solution that helps our customers accelerate threat detection and investigations, and achieve cybersecurity resilience.

(IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of ICT suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor’s position within a given market. The Capabilities score measures vendor product, go-to-market and business execution in the short-term. The Strategy score measures alignment of vendor strategies with customer requirements in a 3-5-year timeframe. Vendor market share is represented by the size of the icons.)

In order to address the myriad of pain points the SOC faces, Splunk Enterprise Security is habitually delivering new features and capabilities to strengthen cybersecurity. Some recent innovations include:

The IDC MarketScape report recognized specific strengths for Splunk, including:

To our customers and partners, thank you again for making this recognition possible. Download your complimentary excerpt copy of the 2022 IDC MarketScape for SIEM today to learn more about Splunk Enterprise Security, visit our website or take a tour.

Related Articles

Splunk BOTS 4.0: A New Hope
Security
3 Minute Read

Splunk BOTS 4.0: A New Hope

From the basics, to new data, to registration information, discover all you need to know about Splunk BOTS 4.0 at .conf19.
MSHTA and MSBuild Cat Jam: Threat Research Release January 2021
Security
4 Minute Read

MSHTA and MSBuild Cat Jam: Threat Research Release January 2021

Splunk's Security Research team was busy this past quarter generating attack data for 80% of all our detections. A step forward in validating and testing our security content and ensuring we can continually test detections via continuous integration and continuous delivery (CI/CD).
A Deeper Dive into TruSTAR Intel Workflows
Security
4 Minute Read

A Deeper Dive into TruSTAR Intel Workflows

Learn about TruSTAR's API 2.0, featuring TruSTAR Intel Workflows. This blog post provides a look at some technical aspects of the Indicator Prioritization Intel Workflow.