Executive Summary
AI-generated analysis for Splunk
Splunk (splunk.com), a leading enterprise data analytics platform now operating as a subsidiary of Cisco, presents a Tier 3 (Moderate Risk) profile based on independent evidence gathered across 24 data sources. The overall posture reflects a well-established, reputable vendor with meaningful compliance investments, offset by several documentation and configuration gaps that warrant attention for buyers granting critical data access. Strengths are notable across multiple dimensions:
Key Findings
- Splunk maintains a clean domain reputation with no blacklist listings, no malware URLs, and a zero-score IP abuse record
- The domain has been continuously registered since 2001, uses enterprise-grade domain registrar (MarkMonitor), and is protected by standard prohibitive registry locks
- The company is actively registered as a legal entity (SPLUNK LLC, LEI: 549300XGDSGBP6UEI867) in Delaware, with no sanctions matches across OFAC, EU, and UN watchlists
- Infrastructure exposure is exceptionally minimal — only port 443 is exposed publicly, with zero known CVEs detected, representing a significantly controlled footprint well below the SaaS industry average of 8–12 open ports
- Splunk claims SOC 2 compliance on its trust documentation page, and is independently verified as pursuing FedRAMP High authorization via the FedRAMP Marketplace registry
- No adverse media was found in either the 12-month scan or the historical archive search, and no SEC enforcement filings were identified Three areas require attention before this vendor is approved for critical data access. First, Splunk's published subprocessor page (trust.splunk.com/subprocessors) appears to contain placeholder content with no individual subprocessors listed — a meaningful gap for GDPR Article 28 compliance. Second, the vendor's AI data usage policy indicates that customer data may be used to improve Splunk's offerings unless customers actively opt out via Splunk Enterprise Security settings; the policy also references opt-in requirements for certain preview programs, creating ambiguity about which mechanism governs specific use cases. Third, the marketing domain's HTTP security header configuration scored a C (50/100) on independent testing, with gaps in HSTS, Content Security Policy, and X-Frame-Options — though this may not reflect the production application endpoint. Overall, Splunk is a credible, mature enterprise vendor with strong foundational security signals. The identified gaps are addressable through direct vendor engagement and do not indicate systemic security failures, but given the critical data access classification, these items should be resolved or formally acknowledged before deployment.
Independence Statement
All evidence in this report was sourced independently by ThirdProof using external data sources, public registries, and automated scanning — without vendor participation, notification, or the ability to influence findings.