apto solutions limited

Splunk Software

Apto provide SaaS for Splunk that monitors and analyzes machine data from any source to deliver Operational Intelligence to optimize your IT, security and business performance. With intuitive analysis features, machine learning, packaged applications and open APIs. We only provide Splunk Accredited Consultants to deliver this service.


  • Collects and indexes log and machine data from any source
  • Powerful search, analysis and visualization capabilities empower users
  • Fraud and cyber threat detection analysis
  • Real time analysis for operational intelligence and business reporting
  • Information Assurance and security analysis
  • Monitor and ensure compliance issues
  • Monitor non heterogeneous networks with unpredictable formats.
  • Monitor Logistics RFID and logistics databases machine data (HUMS)
  • Monitor and manage internet of things including SCADA data
  • Big Data Analytics, machine data from internet/internal network


  • Monitor performance of network infrastructure against Service level Agreements
  • Real-time network intelligence, avoid costly network escalations/downtime
  • Eliminate legacy software and application costs
  • Provide effective security compliance
  • Detect and reduce internal and external cyber threats/abuse
  • Proactively monitor clients/users understand and anticipate their needs
  • Increase security and network management assets productivity
  • Manage & Optimise your cloud costs
  • Automation of incident handling based on priority
  • Fraud detection


£557 per gigabyte per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11


apto solutions limited

Jeremy Hawkey

+44 (0) 8452263351


Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to CRM, Marketing, SalesForce, ServiceNow, ERP, Data Processing, legacy systems
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints No
System requirements
  • Hardware non Windows> 2 x 6 core 2+GHZ, 12GB RAM
  • Windows> 2 x 6 core 2+GHZ, 12GB RAM
  • Linux, 2.6 and later
  • Mac OS X 10.10 and 10.11
  • Windows 8, 8.1, 10
  • Windows Server 2008 R2, 2012, 2012 R2

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Depends on SLA contracted
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 A
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels 0900 -1800 Monday to Friday excluding UK public holidays. 24/7 available on request.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Number different options dependent on whether the buyer is new or an existing splunk customer. These range from Sure start a packaged service including the SaaS to get th buyer up and running quickly with a growth plan.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Splunk provides the analytics and visualisation tools and depending on the configuration of data retention. The data rests at its original location and does not reside in Splunk. Therefore there is no need for data extraction at end of contract
End-of-contract process Migration of analytics to another supplier can be offered depending on the buyers requirements at extra cost.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service If it is through a web browser the functionality is the same. If it is through the Splunk Mobile Ap custom visualisations do not work
Service interface No
What users can and can't do using the API REST API provides methods for accessing every feature in our product. Your program talks to Splunk Enterprise using HTTP or HTTPS, the same protocols that your web browser uses to interact with web pages, and follows the principles of Representational State Transfer (REST).
API documentation Yes
API documentation formats
  • HTML
  • ODF
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Splunk application sits within the aptos cloud network or within the infrastructure of your chosen Cloud Provider. Splunk consumes data from sources within the network. The User is able to configure dashboards and the target data sources.
configuration can be through Splunk Web, Splunk's Command Line Interface (CLI), Splunk's REST API and directly in configuration files.


Independence of resources Splunk forwarders sit in the Buyers network or the infrastructure of their chosen cloud provider and therefore contention is under their control. The Splunk indexing and visualisation is typically part of the SaaS offered in an auto monitored and scalable cloud environment.


Service usage metrics No


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Splunk

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach There are many ways that a user can export data .Splunk provides a REST API to export data. Data can be exported by the Splunk Web facility. Users can use the Command Line Interface, SDK's and data forwarding tools.
Data export formats
  • CSV
  • Other
Data import formats
  • CSV
  • Other
Other data import formats
  • JSON
  • XML
  • Raw Data

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks Splunk sits within the Buyers network or the infrastructure of their chosen cloud provider. Data protection between networks is the responsibility of the Buyer or their cloud provider.
Data protection within supplier network
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network Splunk sits within the Buyers network or the infrastructure of their chosen cloud provider. There is no connection between Splunks networks and those of the Buyer. Data protection between networks is the responsibility of the Buyer or their cloud provider

Availability and resilience

Availability and resilience
Guaranteed availability We have different SLA's for different levels of service selected. That service level dictates the availablity percentage, the tolerances and subsequently the service credit. Service credits are applied only to future service payments.
Approach to resilience Available on request.
Outage reporting Email Alerts and Via Customer Support Portal

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels The service can integrate with existing authentication systems or uses groups and user permissions for access to particular functionality of the service.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 QAS International
ISO/IEC 27001 accreditation date 14/04/2015
What the ISO/IEC 27001 doesn’t cover N/A
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes This is documented as part of our ISO27001 policies and processes.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Changes to services and features follow our documented configuration and change management policy.
Vulnerability management type Supplier-defined controls
Vulnerability management approach As part of our ISO27001 policies and processes we follow a number policies to prevent, assess, log, manage and eradicate vulnerabilities.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We have processes that continually review our monitoring devices, logs, processes, usage, application metrics, unauthorised connection attempts, attacks and so on.
Incident management type Supplier-defined controls
Incident management approach We have pre-defined ISO processes for incident management. Users report incidents through our helpdesk, using an incident management form. We provide incident management reports in a standard format as per our policy.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £557 per gigabyte per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Provided by Splunk Directly, Full capablity of a Splunk Enterprise license for 60 days allowing indexing up to 500 megabytes of data per day.

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑