Cribl puts your IT and Security data at the center of your data management strategy and provides a one-stop shop for analyzing, collecting, processing, and routing it all at any scale. Try the Cribl suite of products and start building your data engine today!
Learn more ›Evolving demands placed on IT and Security teams are driving a new architecture for how observability data is captured, curated, and queried. This new architecture provides flexibility and control while managing the costs of increasing data volumes.
Read white paper ›Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure.
Learn more ›Cribl Edge provides an intelligent, highly scalable edge-based data collection system for logs, metrics, and application data.
Learn more ›Cribl Search turns the traditional search process on its head, allowing users to search data in place without having to collect/store first.
Learn more ›Cribl Lake is a turnkey data lake solution that takes just minutes to get up and running — no data expertise needed. Leverage open formats, unified security with rich access controls, and central access to all IT and security data.
Learn more ›The Cribl.Cloud platform gets you up and running fast without the hassle of running infrastructure.
Learn more ›Cribl.Cloud Solution Brief
The fastest and easiest way to realize the value of an observability ecosystem.
Read Solution Brief ›Cribl Copilot gets your deployments up and running in minutes, not weeks or months.
Learn more ›AppScope gives operators the visibility they need into application behavior, metrics and events with no configuration and no agent required.
Learn more ›Explore Cribl’s Solutions by Use Cases:
Explore Cribl’s Solutions by Integrations:
Explore Cribl’s Solutions by Industry:
Try Your Own Cribl Sandbox
Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now ›Get inspired by how our customers are innovating IT, security and observability. They inspire us daily!
Read Customer Stories ›Sally Beauty Holdings
Sally Beauty Swaps LogStash and Syslog-ng with Cribl.Cloud for a Resilient Security and Observability Pipeline
Read Case Study ›Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now ›Transform data management with Cribl, the Data Engine for IT and Security
Learn More ›Cribl Corporate Overview
Cribl makes open observability a reality, giving you the freedom and flexibility to make choices instead of compromises.
Get the Guide ›Stay up to date on all things Cribl and observability.
Visit the Newsroom ›Cribl’s leadership team has built and launched category-defining products for some of the most innovative companies in the technology sector, and is supported by the world’s most elite investors.
Meet our Leaders ›Join the Cribl herd! The smartest, funniest, most passionate goats you’ll ever meet.
Learn More ›Whether you’re just getting started or scaling up, the Cribl for Startups program gives you the tools and resources your company needs to be successful at every stage.
Learn More ›Want to learn more about Cribl from our sales experts? Send us your contact information and we’ll be in touch.
Talk to an Expert ›A recent ESG/ISSA survey highlighted that security professionals are overwhelmed with competing proprietary data standards and integration challenges. Today’s security landscape often comprises dozens of tools, each with its own unique format. Even if the format is defined and widely adopted, like Syslog, implementations vary widely from tool to tool, or even from release to release for the same tool.
How big of a problem are these differing data formats? According to research from Ponemon, the average enterprise spends just over $2.7M on what it terms security engineering. Security engineering is how you get data into your platforms. This simple act of getting data in, or GDI, is a constant struggle for overworked security teams.
As a response to these challenges, security practitioners are requesting open standards for security tooling. In the ESG/ISSA survey, 77% of respondents want vendors to promote and support open standards, while 84% consider cybersecurity integration capabilities an important consideration when procuring new security tools and platforms.
Security professionals are getting what they asked for. At last week’s Black Hat conference, two new standards were announced. In the first, Splunk and AWS, along with a raft of other vendors, announced the Open Cybersecurity Schema Framework, or OCSF. This mouthful of a standard is designed to be a vendor-neutral security schema driving more interoperability between security tools.
However, if one standard is good, two are better. The XDR Alliance, headed by Exabeam, announced its own Common Information Model. While arguably not as robust as the OCSF, the intent around standardization here is largely the same, but a different group of vendors is represented.
Both of these emerging standards compete with a third open standard, the Cloud Security Notification Framework, or CSNF. As the name suggests, this standard focuses on unifying the various notification formats issued by security tools. The CNSF also provides a mechanism for enriching notifications with additional context to identify the most important alerts.
Despite end user calls for open standardization, vendors aren’t incentivized to adhere to these standards. Portability means reduced vendor lock-in, disrupting business models designed around data ingest volumes or nebulous abstractions around workload pricing. In fact, each of these standards offers different mechanisms for extensions or other customization. The early excitement will fade as vendors get back to the business of improving their own products and using their own pre-existing data formats. (The only instance where this isn’t true is for new products, with no install base or technical debt. We’ll have to see what happens there.)
If you’re an end user of security products and platforms, recognize that these standards, if implemented, will take years to make a meaningful impact in your day-to-day security work. As we’ve seen with syslog, uneven or incorrect implementations will be the norm, and you’ll be left with the same challenges around getting data in as before. The need to translate data formats from originating sources to destinations will remain constant, despite the real need to lower the burden around security data management.
Experience a full version of Cribl Stream and Cribl Edge in the cloud with pre-made sources and destinations.
Classic choice. Sadly, our website is designed for all modern supported browsers like Edge, Chrome, Firefox, and Safari
Got one of those handy?