NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
January 31, 2019

What's the Difference Between Splunk Enterprise Security and Security Essentials?

Justin Fimlaid Justin Fimlaid

If you’re looking to leverage Splunk for security, there are a couple ways to approach this task. Below I’ll explain some of the differences between Security Essentials and Enterprise Security.

What is Splunk?

Splunk is a best-of-breed data analytics platform. Many people use Splunk for security, but its power comes in the diversity of use cases you can fulfill with a single software. Splunk can do everything, including monitoring IT operations, looking for fraud, cybersecurity, and even monitoring heating, ventilation, and air conditioning (HVAC) systems. The use cases are endless. As long as you grab data in machine readable format (i.e., ASCII), you’re only limited by your creativity.

About NuHarbor Security

NuHarbor is a leading national cybersecurity services firm, supporting the diverse needs of hundreds of clients with clear, comprehensive, and outcome-based solutions. We support only best-of-breed security technologies with thoroughly trained and vetted analysts. We make cybersecurity easier for our clients by integrating the most comprehensive set of security services in the market, from compliance and offensive testing to award-winning 24×7 managed security operations. Companies often ask us to implement Splunk and support them with monitoring for security use cases. One commonly asked question is: What’s the difference between Splunk’s Security Essentials application versus Splunk Enterprise Security?

Splunk Security Essentials

Splunk Security Essentials is a free reference application on Splunkbase that contains example Splunk Search Processing Language (SPL) commands to look for specific security events. You can think of SPL and Security Essentials like a collection of preformatted Google-like searches of your data for specific security events. The Security Essentials app also does a nice job organizing and categorizing security searches by security capability and complexity.

Splunk Enterprise Security

Enterprise Security is Splunk’s Security Incident and Event Management (SIEM) platform. Splunk Enterprise Security provides the security practitioner with visibility into security-relevant threats found in today’s enterprise infrastructure. Splunk Enterprise Security is built on the Splunk operational intelligence platform and uses its search and correlation capabilities, allowing users to capture, monitor, and report on data from security devices, systems, and applications. As issues are identified, security analysts can quickly investigate and resolve the security threats across the access, endpoint, and network protection domains. In simple terms, Splunk Enterprise Security contains everything from Security Essentials but adds the ability to manage events by risk, the ability to do deep security data correlations, and other useful features like SOC automation (e.g., If Splunk identifies a DDOS attack on an open port, a user can automate the action to close the port on the firewall).

Difference Between Splunk Security Essentials and Splunk Enterprise Security

These two solutions are very different in their objective and intent, though many people get these two solutions confused. Splunk Security Essentials is a free security reference application on Splunkbase that contains foundational security use cases. The great part about Security Essentials is that all use cases are organized in stages, among other helpful categorizations:

The complexity of the searches can vary across stages. As you increase in stages, you’ll see the evolution from simple data collection and aggregation to full threat feed integration. A lot of this can be done within Splunk Enterprise, but with Enterprise Security you can easily do this using the risk framework that adjusts risk score based on the asset involved.

Enterprise Security is Splunk’s SIEM (Security Incident and Event Management) platform. It detects patterns in your data and automatically reviews the events in a security-relevant way using searches that correlate many streams of data. Additionally, Splunk compares the identified event against the assets and asset value in your environment to prepare a comprehensive view of enterprise security risk. Splunk Enterprise Security also contains other valuable features that aren’t covered here, such as incident review, investigation management tools, glass tables, etc. What’s interesting about Enterprise Security is the statistical analysis of data from a security investigations perspective. By creating security alerts, Enterprise Security can identify specific security events as well as statistical deviations from your baseline data. Over time, as you become more familiar with your data and have a chance to see outlying security events, you’ll be able to tune and optimize Enterprise Security for maximum benefit of streamlined investigation and security alerting. The goal is to tune Enterprise Security to the point where you’ve “removed the hay” and are “left with the “needle.” In other words, when an alert triggers you’re left with a high-fidelity security event.

High-level Security Use Case Mapping

Use Case

Splunk Security Essentials (Core Splunk) or Splunk Enterprise Security

Security Monitoring

Essentials or Enterprise Security

Advanced Threat Detection

Essentials or Enterprise Security (adds statistical analysis and kill chain methodology)

Compliance

Essentials or Enterprise Security (some compliance standards require ability to identify indicators of compromise and SIEM capability)

Fraud Detection and Insider Threat

Essentials

Incident Investigation

Enterprise Security

SOC Automation

Enterprise Security (adds automated response actions)

Incident Response

Enterprise Security (adds indicators of compromise)

I often see folks leverage firms with no true security experience – this is a recipe for failure, or at least reduced return on investment. NuHarbor supports only best-of-breed security technologies, like Splunk, with thoroughly trained and vetted analysts. NuHarbor has vast expertise with Security Operation Center and MSSP development using Splunk.

If you’re interested in Splunk for security and need a sounding board, contact NuHarbor today! 

Included Topics

  • Cybersecurity Technology,
  • Security Operations
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Advisory and Planning 13 min read
Building a Security Operations Center with Splunk Read More
Security Operations 9 min read
Understanding SOC as a Service Pricing
Read More
6 min read
What is Continuous Security Monitoring?
Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.