Archived Events
Headed to Splunk .conf23?
Great, we are too! Don't miss the chance to check out the technology demos scheduled throughout the week at our booth, P403. Okta, Zscaler, Vectra AI, and more will be at the ...
During this webinar, we explored the ongoing challenges facing DOJ security teams and how Splunk SOAR can help you decrease incident response time while being a force multiplier for your teams.
During this webinar, participants learned about:
Challenges facing our security operations ...
Attendees of this Axonius, Splunk & Carahsoft webinar learned:
How to gain true visibility of your entire attack surface
How to meet recent federal regulations mandating regular and comprehensive logging management
How to optimize your internal logging management to aid in ...
Participants joined us for a Splunk workshop designed to provide attendees with basic to advanced Splunk training.
Today's higher education institutions are facing greater financial risk due to an increase in both internal and external fraud. While some institutions are using traditional security tools to detect certain types of fraud, the vast increase in the types of fraud requires a different approach to build out a comprehensive ...
Attendees joined us for a webinar where attendees learned how the Compliance Essentials for Splunk (CES) app can assist their organization's compliance posture across various control frameworks. Customers can utilize Splunk to streamline continuous monitoring efforts, improve cybersecurity posture, and address the ...
Partcipants joined us for our infromative, hands-on virtual workshops where your IT teams had the opportunity to increase the level of Splunk skillsets across your organization.
Attendees joined us for a Splunk webinar where we provided an overview of our three essential apps - Security Essentials, Compliance Essentials, and Enterprise Security. Our experts showcased the features, benefits, and capabilities of each app and how they can help improve your organization's security ...
The demand continues to grow for extensive implementations of monitoring architectures across enterprise and specific mission-level infrastructure and applications. With that the need to be able to scale, debug, and optimize complex environments increases also. It’s time to break down data silos, eliminate networking ...
Federal security professionals within the DoD must comply with the technical testing and hardening frameworks known as STIGs — Security Technical Implementation Guides. STIGs contain technical guidance for “locking down” or “hardening” information systems/software that might be vulnerable to a ...