PROFESSIONAL SERVICES by HACKNOWLEDGE is a consulting service focussing on fulfilling our client’s needs and helping them solve their issues. Log management, Splunk® technologies, Microsoft® Azure Sentinel, purple teaming, incident response, security audits, advanced analytics across companies of all size, in Switzerland and Luxembourg. We bring deep, functional expertise and a special focus to add the maximum value across boundaries and between the silos of any IT department. Our target is to contribute to increasing the level of the IT security in your company.
Splunk provides a SIEM platform that enables organizations to gain real-time operational intelligence by harnessing the value of their data. Splunk Enterprise collects and indexes data at massive scale, regardless of format or source, and enables users to quickly and easily search, correlate, analyze, monitor and report on this data. Splunk Enterprise is designed to help users in various roles, including IT, security teams and business professionals, to quickly analyze machine data and realize real-time visibility into and intelligence about their organization’s operations.
  • Collect and index logs and machine data from any source
  • Scalable technology and automatic load balancing scale to collect high quantity of data per day
  • The Splunk platform makes it easy to customize Splunk Enterprise to meet the needs of any project
  • Splunkbase and custom Apps and Add-Ons to enhance and extend the power of your SIEM
  • Improve the visibility to response to incidents with powerful dashboards
Hacknowledge Splunk ES dashboard on a flatscreen computer analyzing security
Hacknowledge SIEM dashboard on a laptop analyzing security information event monitoring data
A deep understanding of logs enable your company to easily collect and manage logs across your environment, from apps to servers to browsers, and all of the services in-between. We can optimize the log collection to fit only the security and the customer needs.
Our team will help create and maintain a SIEM efficient audit policy. Our advanced data analytics and strong knowledge about security logs enables us to: Reduce log data noise, quickly assess the risk of an event, and escalate alerts as that risk grows. It provides a holistic view of your infrastructure and helps you detect and respond to emerging threats.
Our experience with large Splunk deployments allows us to design proven reference architectures for stable, efficient and repeatable
Splunk deployments. Our Splunk Certified Architects deploy infrastructures regarding the best practices from Splunk. It will help you to build an environment that is easier to maintain and simpler to troubleshoot. Additionally, your entire Splunk foundation will be based on a repeatable
architecture which will allow you to scale your deployment as your needs evolve over time.
Efficient infrastructure easier to maintain

Architecture meeting your consideration and budget

Scalable and resilient
We scale your deployment as your needs evolve over time
Best practices
Aligning your topology with best practices
  • Design
  • Splunk Validated Architecture

  • Log Management

  • Updates

  • Migrations
  • Optimization

  • Custom App & addons development

  • Advanced dashboarding
  • Integration in our MDR Service

  • Trainings

SPLUNK Enterprise Security

The nerve center of the security ecosystem, giving teams the insight to quickly detect and respond to internal and external attacks, simplify threat management minimizing risk

Splunk Enterprise Security (Splunk ES) is a solution that enables security teams to quickly detect and respond to internal and external attacks, to simplify threat management while minimizing risk, and safeguard your business.
Splunk ES can be used from many analyts for continuous monitoring, incident response, running a security operations center or for providing executives a window into business risk.
  • Insight from data that is automatically retrieved from multiple sources and shared to correlate using pre-defined rules or via specific searches

  • Flexibility to customize correlation searches, alerts, reports and dashboards to fit specifics needs

Icon of human head with brain and lightning logo inside representing threat intelligence
  • Out-of-the-box capabilities to manage alerts and power dynamic discoveries, contextual searches, and the rapid detection and analysis of advanced threats

  • continuous monitoring, incident response, a security operations center (SOC) or for executives who need to view business risks

Hacknowledge Content Update (HKCU) app delivers pre-packaged security detection use cases. HKCU provides regular Security Content updates to help security teams address ongoing time-sensitive threats, attack methods, and other security issues. HKCU can generate Notable Events (Alerts) in Splunk Enterprise Security. Security Content also contains easy-to-read background information and guidance about the use cases.
  • Design
  • Installation
  • Configuration
  • CIM normalization
  • Asset & identities configuration
  • Fine tunings
  • Use cases management
  • Trainings


Azure Sentinel is a new SIEM from Microsoft. We manage the deployment, configuration and the tuning. Azure Sentinel can be integrated with our MDR solution to provide a 24×7 Monitoring service with our security analysts.

More Information
Fully supported and integrated in our MDR solution or with Splunk. We can manage end-to-end your Azure Sentinel SIEM.
With Azure Lighthouse, we can deliver managed services using comprehensive and robust management tooling built into the Azure platform to manage your Sentinel alerts from our SOC service
  • Collect data at cloud scale—across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds
  • Detect previously uncovered threats and minimize false positives using analytics and unparalleled threat intelligence from Microsoft online
Icon of human head with brain and lightning logo inside representing threat intelligence
  • Investigate threats with AI and hunt suspicious activities at scale, tapping into decades of cybersecurity work at Microsoft
  • Respond to incidents rapidly with built-in orchestration and automation of common tasks
  • Design / Architecture
  • Deployment
  • Configuration
  • Integration in our MDR service
  • Use-cases writing and optimizations
  • Trainings