Cribl puts your IT and Security data at the center of your data management strategy and provides a one-stop shop for analyzing, collecting, processing, and routing it all at any scale. Try the Cribl suite of products and start building your data engine today!
Learn more ›Evolving demands placed on IT and Security teams are driving a new architecture for how observability data is captured, curated, and queried. This new architecture provides flexibility and control while managing the costs of increasing data volumes.
Read white paper ›Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure.
Learn more ›Cribl Edge provides an intelligent, highly scalable edge-based data collection system for logs, metrics, and application data.
Learn more ›Cribl Search turns the traditional search process on its head, allowing users to search data in place without having to collect/store first.
Learn more ›Cribl Lake is a turnkey data lake solution that takes just minutes to get up and running — no data expertise needed. Leverage open formats, unified security with rich access controls, and centralize access to all IT and security data.
Learn more ›The Cribl.Cloud platform gets you up and running fast without the hassle of running infrastructure.
Learn more ›Cribl.Cloud Solution Brief
The fastest and easiest way to realize the value of an observability ecosystem.
Read Solution Brief ›AppScope gives operators the visibility they need into application behavior, metrics and events with no configuration and no agent required.
Learn more ›Explore Cribl’s Solutions by Use Cases:
Explore Cribl’s Solutions by Integrations:
Explore Cribl’s Solutions by Industry:
April 24 | 10am PT / 1pm ET
3 ways to fast-track your data lake strategy without being a data expert
REGISTER ›Try Your Own Cribl Sandbox
Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now ›Get inspired by how our customers are innovating IT, security and observability. They inspire us daily!
Read Customer Stories ›Sally Beauty Holdings
Sally Beauty Swaps LogStash and Syslog-ng with Cribl.Cloud for a Resilient Security and Observability Pipeline
Read Case Study ›Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now ›Transform data management with Cribl, the Data Engine for IT and Security
Learn More ›Cribl Corporate Overview
Cribl makes open observability a reality, giving you the freedom and flexibility to make choices instead of compromises.
Get the Guide ›Stay up to date on all things Cribl and observability.
Visit the Newsroom ›Cribl’s leadership team has built and launched category-defining products for some of the most innovative companies in the technology sector, and is supported by the world’s most elite investors.
Meet our Leaders ›Join the Cribl herd! The smartest, funniest, most passionate goats you’ll ever meet.
Learn More ›Whether you’re just getting started or scaling up, the Cribl for Startups program gives you the tools and resources your company needs to be successful at every stage.
Learn More ›Want to learn more about Cribl from our sales experts? Send us your contact information and we’ll be in touch.
Talk to an Expert ›June 22, 2022
It’s common for most CISOs to lead off a security conversation by comparing what other companies in the industry are spending on cybersecurity and simply matching that. After all, regardless of the results, the CISO can always tell the board of directors they’re following industry guidelines around security budgets. The problem is security outcomes are bad regardless of budgets. It’s not what you spend. It’s the results you get that matter.
This shift from spending to outcomes was a constant theme at Gartner’s Security & Risk Summit, finally back in person in National Harbor, Washington DC. The event highlighted some major trends for security and risk leaders, including the loss of control and boards demanding value from their security investments.
Despite years of reigning in users with draconian policies and getting creative to scale teams, CISOs face three major challenges to their effectiveness. The first is the acceleration of citizen computing. If you haven’t noticed, the pandemic forced many workers into roles as their own IT and security teams, to the point where 20% of workers consider themselves technology experts. Experts don’t need meddling from pesky CISOs trying to manage risk, making reining in these users all but impossible. They’re going to do what they want, even if that means clicking on a suspicious link or giving out a few passwords.
Next up is the number of third parties in use. From conversations with Cribl customers, the average corporate security team interacts with two dozen third parties and suppliers. Continuously monitoring these entities is a full-time job for multiple people, which is why only 17% of CISOs claim to do it in real-time. There’s too much complexity and too much data, leaving them little choice but to forgo monitoring entirely. A number of people stopped by the Cribl booth after learning how their peers use Cribl Stream to manage security data for compliance and software supply chain oversight.
Lastly, everyone wants to tell security and risk leaders how to do their jobs. Half of CISOs must cope with unrealistic expectations after board members read one too many articles on preventing ransomware attacks or managing effective patching strategies. The apparent simplicity in preventing attacks makes CISOs look ineffective when a breach does occur, eroding trust in security and risk management programs.
A frequent statistic repeated at the event is that 88% of boards consider security a business risk rather than a technology risk. They’re getting serious about it: one in ten organizations are creating board-level security committees. Companies are also increasing educational efforts on the importance of security.
This sudden interest in security isn’t holistic. Boards didn’t wake up one day with the realization of, “Gee, all that data we use for product development, marketing, and customer intimacy might be a risk.” The federal government is responding to the rapid rise in breaches with new policies and directives. The SEC has proposed new rules around disclosing security breaches, as well as accounting for the security expertise of board members and risk strategies.
The event highlighted the changing nature of the CISO’s role, including bringing customers to the forefront of security efforts, engaging and building relationships with business and marketing leaders, as well as building a range of competencies instead of focusing on skills.
To be successful, CISOs must:
While no single technology can deliver a successful security and risk program, each of these topics was conversations we had with prospects and customers at the Gartner Summit. Dealing with security data volumes, connecting disparate systems, and ensuring compliance is fundamental to successful outcomes.
It was common at the Gartner Summit to hear, “I’d never heard of you guys, but my buddy over at XYZ said I had to come talk to you.” Every conversation driver was related to the outcomes we deliver for our customers across security and risk teams. If you want to learn more about how we help security teams, check out our solution brief.
Berwyn Jones Mar 1, 2024
Ed Bailey Jan 12, 2024