New to observability? Find out everything you need to know.
Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure.
Learn More >Cribl Edge provides an intelligent, highly scalable edge-based data collection system for logs, metrics, and application data.
Learn More >Cribl Search turns the traditional search process on its head, allowing users to search data in place without having to collect/store first.
Learn More >The Cribl.Cloud platform gets you up and running fast without the hassle of running infrastructure.
Learn More >Cribl.Cloud Solution Brief
The fastest and easiest way to realize the value of an observability ecosystem.
Read Solution Brief >AppScope gives operators the visibility they need into application behavior, metrics and events with no configuration and no agent required.
Learn More >Explore Cribl’s Solutions by Integrations:
Explore Cribl’s Solutions by Industry:
Get this Gartner® report and learn why telemetry pipeline solutions represent a robust and largely untapped source of business insight beyond event and incident response.
Download Report >Observability Pipelines: Optimize Your Cloud with Exabeam and Cribl
It’s not about collecting ALL the data; it’s about collecting the RIGHT data.
Watch On-Demand >Try Your Own Cribl Sandbox
Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now >Get inspired by how our customers are innovating IT, security and observability. They inspire us daily!
Read Customer Stories >Sally Beauty Holdings
Sally Beauty Swaps LogStash and Syslog-ng with Cribl.Cloud for a Resilient Security and Observability Pipeline
Read Case Study >Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now >Take Control of Your Observability Data with Cribl
Learn More >Cribl Corporate Overview
Cribl makes open observability a reality, giving you the freedom and flexibility to make choices instead of compromises.
Get the Guide >Stay up to date on all things Cribl and observability.
Visit the Newsroom >Cribl’s leadership team has built and launched category-defining products for some of the most innovative companies in the technology sector, and is supported by the world’s most elite investors.
Meet our Leaders >Join the Cribl herd! The smartest, funniest, most passionate goats you’ll ever meet.
Learn More >Want to learn more about Cribl from our sales experts? Send us your contact information and we’ll be in touch.
Talk to an Expert >Nick Heudecker leads market strategy and competitive intelligence at Cribl. Prior to join... Read Moreing Cribl, he spent over seven years as an industry analyst at Gartner, covering the data and analytics market. With over twenty years of experience, he has led engineering and product teams across multiple successful startups in the media and advertising industries. Read Less
A recently conducted survey of 51 CISOs and other security leaders a series of questions about the current demand for cybersecurity solutions, spending intentions, security posture strategies, tool preferences, and vendor consolidation expectations. While the report highlights the trends around platform consolidation over the short run, 82% of respondents stated they expect to increase the number of vendors in the next 2-3 years. Over the longer term, however, the analysts expect a 50% reduction in the number of cybersecurity vendors in use over the next 5-10 years.
I spoke with Ed Bailey, Cribl’s lead technical evangelist, about this possibility of consolidation. Unsurprisingly, we have some thoughts about consolidation. While the idea sounds appealing, the journey towards a single security platform is riddled with challenges, such as uneven product capabilities and limited integration between tools. In this blog, we delve into the complexities that hinder seamless consolidation and explore the ramifications of vendors’ restrictions on data export and tool usage.
While the pressure to consolidate on a single platform is evident, not all capabilities within these platforms are equally robust. Organizations may find that certain components, like event correlation, excel, while others, like case management or UEBA, fall short. This shortfall compels teams to seek additional tools offering superior capabilities in those specific areas. Despite the drive for consolidation, organizations will routinely resort to utilizing best-of-breed tools for specific functions, resulting in a fragmented security landscape and higher costs.
To reinforce their security operations, security teams often seek to establish reinforcement loops with custom analytics conducted in their security data lakes and other analytical platforms. However, many platforms operate as walled gardens, limiting the seamless exchange of data between vendors. This lack of data sharing slows the creation of effective reinforcement loops and inhibits organizations from leveraging the full potential of their security ecosystem. Other vendors support data export, but they intentionally remove essential fields and tags necessary to get value from the data in other tools, or with homegrown analytics.
Open standards, such as the Open Cybersecurity Framework (OCF), hold promise as potential solutions to the integration challenges faced by enterprises. However, widespread support and consistent adoption of these standards across the security tooling landscape remain elusive. The security community must collectively commit to embracing these open standards to overcome the hurdles of integration and unlock the true potential of consolidated security platforms.
The quest for a single security platform presents formidable integration challenges for enterprises. The unevenness of product capabilities, limited data sharing, and the absence of seamless integration pose significant obstacles. Organizations must carefully evaluate their needs, consider best-of-breed tools where necessary, and actively drive the adoption of open standards. By navigating these challenges with strategic planning and collaboration, enterprises can move closer to achieving a unified and resilient security architecture that safeguards their digital assets effectively.
If you want to dive into this topic in more detail, here’s a live stream recording where we discussed the same topics.
Experience a full version of Cribl Stream and Cribl Edge in the cloud with pre-made sources and destinations.