Download this white paper to learn the observability trends and predictions in 2023.
Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure.
Cribl Edge provides an intelligent, highly scalable edge-based data collection system for logs, metrics, and application data.
Cribl Search turns the traditional search process on its head, allowing users to search data in place without having to collect/store first.
The Cribl.Cloud platform gets you up and running fast without the hassle of running infrastructure.
Cribl.Cloud Solution Brief
The fastest and easiest way to realize the value of an observability ecosystem.
AppScope gives operators the visibility they need into application behavior, metrics and events with no configuration and no agent required.
Explore Cribl’s Solutions by Industry:
Explore Cribl’s Solutions by Integrations:
Try Your Own Cribl Sandbox
Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Get inspired by how our customers are innovating in IT, security, and observability. They inspire us daily!
Accenture Federal Services
Cribl Corporate Overview
Cribl makes open observability a reality, giving you the freedom and flexibility to make choices instead of compromises.
Cribl’s leadership team has built and launched category-defining products for some of the most innovative companies in the technology sector, and is supported by the world’s most elite investors.
Join the Cribl herd! The smartest, funniest, most passionate goats you’ll ever meet.
Want to learn more about Cribl from our sales experts? Send us your contact information and we’ll be in touch.
September 7, 2022
A recent ESG/ISSA survey highlighted that security professionals are overwhelmed with competing proprietary data standards and integration challenges. Today’s security landscape often comprises dozens of tools, each with its own unique format. Even if the format is defined and widely adopted, like Syslog, implementations vary widely from tool to tool, or even from release to release for the same tool.
How big of a problem are these differing data formats? According to research from Ponemon, the average enterprise spends just over $2.7M on what it terms security engineering. Security engineering is how you get data into your platforms. This simple act of getting data in, or GDI, is a constant struggle for overworked security teams.
As a response to these challenges, security practitioners are requesting open standards for security tooling. In the ESG/ISSA survey, 77% of respondents want vendors to promote and support open standards, while 84% consider cybersecurity integration capabilities an important consideration when procuring new security tools and platforms.
Security professionals are getting what they asked for. At last week’s Black Hat conference, two new standards were announced. In the first, Splunk and AWS, along with a raft of other vendors, announced the Open Cybersecurity Schema Framework, or OCSF. This mouthful of a standard is designed to be a vendor-neutral security schema driving more interoperability between security tools.
However, if one standard is good, two are better. The XDR Alliance, headed by Exabeam, announced its own Common Information Model. While arguably not as robust as the OCSF, the intent around standardization here is largely the same, but a different group of vendors is represented.
Both of these emerging standards compete with a third open standard, the Cloud Security Notification Framework, or CSNF. As the name suggests, this standard focuses on unifying the various notification formats issued by security tools. The CNSF also provides a mechanism for enriching notifications with additional context to identify the most important alerts.
Despite end user calls for open standardization, vendors aren’t incentivized to adhere to these standards. Portability means reduced vendor lock-in, disrupting business models designed around data ingest volumes or nebulous abstractions around workload pricing. In fact, each of these standards offers different mechanisms for extensions or other customization. The early excitement will fade as vendors get back to the business of improving their own products and using their own pre-existing data formats. (The only instance where this isn’t true is for new products, with no install base or technical debt. We’ll have to see what happens there.)
If you’re an end user of security products and platforms, recognize that these standards, if implemented, will take years to make a meaningful impact in your day-to-day security work. As we’ve seen with syslog, uneven or incorrect implementations will be the norm, and you’ll be left with the same challenges around getting data in as before. The need to translate data formats from originating sources to destinations will remain constant, despite the real need to lower the burden around security data management.
Ed Bailey Jan 31, 2023
Felicia Dorng Jan 24, 2023