Archived Events
Attendees of this Axonius, Splunk & Carahsoft webinar learned:
How to gain true visibility of your entire attack surface
How to meet recent federal regulations mandating regular and comprehensive logging management
How to optimize your internal logging management to aid in ...
Participants joined us for a Splunk workshop designed to provide attendees with basic to advanced Splunk training.
Today's higher education institutions are facing greater financial risk due to an increase in both internal and external fraud. While some institutions are using traditional security tools to detect certain types of fraud, the vast increase in the types of fraud requires a different approach to build out a comprehensive ...
Attendees joined us for a webinar where attendees learned how the Compliance Essentials for Splunk (CES) app can assist their organization's compliance posture across various control frameworks. Customers can utilize Splunk to streamline continuous monitoring efforts, improve cybersecurity posture, and address the ...
Partcipants joined us for our infromative, hands-on virtual workshops where your IT teams had the opportunity to increase the level of Splunk skillsets across your organization.
Attendees joined us for a Splunk webinar where we provided an overview of our three essential apps - Security Essentials, Compliance Essentials, and Enterprise Security. Our experts showcased the features, benefits, and capabilities of each app and how they can help improve your organization's security ...
The demand continues to grow for extensive implementations of monitoring architectures across enterprise and specific mission-level infrastructure and applications. With that the need to be able to scale, debug, and optimize complex environments increases also. It’s time to break down data silos, eliminate networking ...
Federal security professionals within the DoD must comply with the technical testing and hardening frameworks known as STIGs — Security Technical Implementation Guides. STIGs contain technical guidance for “locking down” or “hardening” information systems/software that might be vulnerable to a ...
As the world braces for a possible recession, companies are already beginning to tighten their belts and restrict spending in security departments. Yet, if 2021 and the explosion of ransomware, new nation-state-sponsored security attacks, and the skyrocketing cyber insurance premiums taught us anything, it is that security ...
Today's higher education institutions are facing greater financial risk due to an increase in both internal and external fraud. While some institutions are using traditional security tools to detect certain types of fraud, the vast increase in the types of fraud requires a different approach to build out a comprehensive ...