Archived Events
View this on-demand recording to discover how ReversingLabs can enrich Splunk data with our industry leading threat intelligence. You can learn how to easily hunt for threats specifically targeted at your organization using the Splunk app which enables quicker malware identification and ...
Universities and health officials around the world are working vigorously to ensure students can safely return to campus. Schools need to know who may have been in contact with a person that has tested positive for COVID-19, as well as where on campus that person has been. Having this information will allow schools to make ...
Attendees joined us for a presentation and subsequent demo on the FREE Splunk App for Infrastructure (SAI) and Splunk Security Essentials (SSE).
During this webinar, attendees learned how the Splunk App for Palo Alto Networks works seamlessly to give users visibility and a contextual view across their data center, endpoints, and clouds, mitigating overall risk to infrastructures. Specifically, we discuss how the Palo Alto Networks Next-Generation Security Platform ...
Attendees joined the workshop for a gamified, individually paced introduction to core Splunk and ITSI using BOTN data and framework.
Attendees joined this webinar for a presentation and subsequent demo introducing the Splunk AIOps ecosystem.
Attendees joined us for this hands-on virtual workshop designed to familiarize participants with different endpoint technologies and how to leverage Splunk to gain greater insight into the activities occurring on the endpoint; including Microsoft Event Logs, Sysmon, PowerShell, osquery, CB, and Cisco NVM.
Attendees joined us and learned how companies including: Yelp, Kayak, Namely, and Hubspot leverage SignalFx Infrastructure Monitoring, SignalFx Microservices APM™, Kubernetes Navigator from Splunk for instant visibility and alerting, AI-assisted troubleshooting, and closed-loop automation for their applications ...
During this workshop, attendees gained a better understanding of how to create a website monitoring input in Splunk and then looked at examples of other data ingestion methods and where they can be used.
Attendees joined this hands-on virtual workshop designed to familiarize participants with how to leverage Splunk to search security events and to gain familiarity with searching in Splunk, as well as introducing a set of commands that allow a user to effectively exam their security events.