Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

logo_splunk_1color_K.png
Splunk

Splunk Carahsoft Virtual Workshop


Event Date: January 24, 2023 - January 26, 2023
Hosted By: Splunk & Carahsoft
Participants joined us for the continuation of our informative, hands-on virtual workshops where your IT teams had the opportunity to increase the level of Splunk skillsets across your organization.


Date & TimeSession
Tuesday, January 24th
11:00am ET; 8:00am PT
Tips & Tricks: Some of the best resources and shortcuts we’ve found to get the most out of Splunk after working with it for a year.
Tuesday, January 24th
2:00pm ET; 11:00am PT
General Splunk Configuration: An introduction to Splunk’s CLI illustrating initial configuration and customization of Splunk including setting custom ports for processes and creating user roles with specific capabilities. Also covers the installation and initial configuration of a universal forwarder.
Wednesday, January 25th
11:00am ET; 8:00am PT
Data Manipulation with Splunk: Ingesting .csv and configuring fields, lookups, deep-dive dashboards, and conducting simpleXML edits to customize visualizations.
Wednesday, January 25th
2:00pm ET; 11:00am PT
Dashboarding Cisco Security Data: Focuses on manipulating data dealing with Cisco events. Relevant to any security data within your environment but will show the variety of different dashboards and visualizations you can create and customize.
Thursday, January 26th
11:00am ET; 8:00am PT
Dashboarding Windows Operational Data: Focuses on manipulating data dealing with IT operations within Windows data. Relevant to any IT operations data within your environment but will show you the variety of different dashboards and visualizations you can create and customize.
Thursday, January 26th
2:00pm ET; 11:00am PT
Data Ingestion: Creating a website monitoring input in Splunk and then looking at examples of other data ingestion methods and where they can be used.

Fill out the form below to view this archived event.


Resources


Enabling Zero Trust Architecture to Protect DoD Systems
Datasheet

Enabling Zero Trust Architecture to Protect DoD Systems

TrustedKeep delivers true Zero-Trust Architecture (ZTA) support for national security and defense missions. With its high-performance, scalable encryption and strict zero-trust mindset, TrustedKeep ensures utmost data security. Trusted by the U.S. government and mission partners, it accelerates IC and DoD customers' transition to ZTA, meeting NSM-8 standards. Download this datasheet to learn more!


Fill out the form below to view this Resource.