In today’s information-oriented economy, the crown jewels of an organization are its data. Machine data includes configurations, data from APIs, message queues, change events, output of diagnostic commands, call detail records, and more. It is valuable because it contains a definitive record of all the activity and behavior of your customers, users, transactions, applications, servers, networks, and mobile devices. Some of the most important insights enterprises can gain— where things went wrong, how to optimize the customer experience, the fingerprints of fraud—are hidden in the machine data that is generated by the normal operations of your organization. The challenge with leveraging machine data is it comes in an array of unpredictable formats, and traditional monitoring and analysis tools were not designed for the variety, velocity, volume or variability of this data. Splunk provides industry-leading software to consolidate and index any log and machine data. It is an enterprise ready, fully integrated solution for log management, data collection, storage, and visualization.
The joint white paper examines how Vormetric Transparent Encryption (VTE) secures the Splunk log repositories and databases and then shows how Live Data Transformation, an extension of VTE, can encrypt Splunk buckets seamlessly with zero-downtime. Whether the deployment is physical or virtual, the joint solution can alert when unusual or improper data access is detected, and can offer detailed user and process information to help investigation.