Deploying EndaceProbe™ and Splunk provides fail-safe security and network event analysis.

The Endace Fusion Connector optimizes data analysis workflow between Splunk’s security and event monitoring capability and the 100% accurate network history captured and stored by the EndaceProbe.

The event-level integration simplifies packet-level forensics and investigative processes for SecOps and NetOps teams. It helps them to complete the investigation to resolution cycle faster and more accurately, reducing time-to-resolution (TTR) and enabling conclusive threat remediation.

This allows for more effective handling of network security and operations issues, reduces the impact on end-users and supports simple detection of false positives and fine-tuning of detection systems.

Splunk Website

See it in Action

Watch this short video demonstration (04:21) to see how integrating Splunk and Cisco Firepower with the 100% accurate Network History recorded by our EndaceProbes enables accurate detection and rapid response to security threats.

Implementation Details

The Splunk connector, and detailed information on how to deploy it, are available on our Endace Support Portal. If you don't have an account, you can request one here.


Login to the Support Portal

NOTE: There is now a new V3.1 connector. So if you are using an earlier version of the connector from Splunkbase, we highly recommend you upgrade to gain additional functionality.

How about a Demo?

Interested in finding out how the Endace Fusion Connector for Splunk can give you access to powerful search and drill-down capabilities that lets you quickly identify anomalous activity and conduct conclusive investigations?

Yes please, book me in

{{ errors[0] }}
{{ errors[0] }}
{{ errors[0] }}
{{ errors[0] }}
{{ errors[0] }}
{{ errors[0] }}
{{ errors[0] }}
{{ errors[0] }}
{{ errors[0] }}
Please contact me by {{ errors[0] }}
{{ errors[0] }}
{{ errors[0] }}
  • {{ key }} - {{ value }}
Back