Archived Events
Attendees joined Splunk and Carahsoft for a presentation and demo where we discussed how Splunk Phantom can help your team achieve optimum security operations regardless of what security tools or SIEM you're using.
Splunk Enterprise Security (ES) is the nerve center of the security ecosystem, giving teams the insight to quickly detect and respond to internal and external attacks, and simplify threat management minimizing risk. Splunk ES helps teams gain organization-wide visibility and security intelligence for continuous ...
Hear from SailPoint and Splunk
Attendees of this webinar joined us for a discussion on compliance and risk management frameworks, specialized control auditing, and how the right data-driven approach can help organizations go beyond meeting regulatory requirements and provide a foundation for a robust security posture.During this session, ...
Attendees joined us on January 15th for the Getting Started with Splunk Data Manipulation workshop, a hands-on introduction to the Splunk GUI. Attendees learned how to upload a .csv to Splunk, perform simple field extractions, and build basic dashboards and reports! During ...
Attendees joined Splunk on Tuesday, January 14th for a webinar on the recent Splunk FedRAMP authorization and what this means to DOE.
Attendees joined us to learn how to apply a broader analytical approach and data-driven techniques to quickly pinpoint the source of an attack and determine the appropriate remediation steps. During this webinar and live demo, ...
Can law enforcement protect citizens in this age of digital transformation? Are they using technology in a way that promotes insights and outcomes to help them become more proactive? Do those insights provide officers with increased situational awareness to ensure officer safety and ...
Attendees joined Ryan Dunn, Solutions Engineer at Secure Government Technologies, for a presentation and live demo where they took an in-depth look at how Splunk can help you and your organization meet your security needs with: Insider threat detectionAdvanced threat ...
Don't let your IT infrastructure and monitoring tools leave you behind!Today's datacenter has evolved, and IT environments are now more complex than ever. Legacy systems are often expensive and fail to adapt to changing IT environments. These systems operate in silos and, because of that, they ...