Splunk Light – Taking the Pulse of Healthcare Systems
As more and more of the healthcare industry goes online an interesting question arises. Who is monitoring the health of your healthcare system? Or to put it another way your health is increasingly...
View ArticleJoin Splunk at Gartner Security & Risk Management Summit 2016
The Splunk Security markets team is excited to attend the Gartner Security and Risk Management Summit from June 13-16 in National Harbor, Maryland. This Summit is one of the premier events in the...
View ArticleThe 4-minute mile challenge and securely moving to the Cloud
As a runner, I am always fascinated by Dr. Roger Bannister’s achievement of shattering the 4-minute barrier to run a mile. Even though, I was not around to witness this landmark feat, the 4-minute...
View ArticleDevOps Metrics: Measuring Business Impact
A few weeks ago, I attended DevOpsDays Seattle. As a big fan of Open Space, I was happy when my session proposal on DevOps metrics was accepted. And as it turns out, this is an important subject for...
View ArticleThe Disintegration of IT
With President Obama’s proposal of a $3.1 billion IT Modernization Fund, there has been increased discussion around the government’s struggle to manage its aging IT infrastructure, while simultaneously...
View ArticleDevOps Metrics: Measuring Team Productivity – Yes or No?
In my last blog post, I talked about the importance of measuring the business impact of DevOps-driven application delivery. At the DevOpsDays Seattle Open Space discussion on metrics, we also explored...
View ArticleSmart AnSwerS #67
Hey there community and welcome to the 67th installment of Smart AnSwerS. For folks who will be in the San Francisco Bay Area the first full week of July, you’re all welcome to join us at the SFBA User...
View ArticleSplunk named to LinkedIn Top Attractors List
At Splunk, we pride ourselves on our innovative, fun, and unique company culture. For nine consecutive years, the San Francisco Business Times has named Splunk one of the “Best Places to Work” in the...
View ArticleSpotting the Adversary… with Splunk
Howdy Ya’ll. Eventually there is a Rubicon to cross in every Security professional’s life. With a satisfied sigh he’ll take a step back from the keyboard, wipe Dorito dust covered hands on khakis, take...
View ArticleDetecting and Responding to the Accidental Breach
Hello All, Splunk recently commissioned analyst firm IDC to conduct research in EMEA into how capable organizations are at protecting and responding to hapless user activity. The research questioned...
View ArticleSplunking a Microsoft Word document for metadata and content analysis
The Big Data ecosystem is nowadays often abbreviated with ‘V’s. The 3Vs of Big Data, or the 4Vs of Big Data, even the 5Vs of Big Data! However many ‘V’s are used, two are always dedicated to Volume and...
View ArticleSmart AnSwerS #69
Hey there community and welcome to the 69th installment of Smart AnSwerS. Time has been flying by with Splunkers working incredibly hard and adapting to new changes in our office space. It’s hard to...
View ArticleGaining clarity: adding a visual line break between events
(Hi all–welcome to the latest installment in the series of technical blog posts from members of the SplunkTrust, our Community MVP program. We’re very proud to have such a fantastic group of community...
View ArticleBest Practices in Protecting Splunk Enterprise
Splunk Enterprise helps companies collect, analyze, and act upon the data generated by their technology infrastructure, security systems and business applications. Customers use Splunk software to...
View ArticleHow to Pick a Threat Intelligence Provider (kind of…)
Over my last two years-ish at Spunk I’ve been asked the question “Which threat intelligence feed should I purchase?” and “whats the deal with the viking helmet?” and “whats up with the Star Wars theme...
View ArticleLook for Trouble at Cisco Live 2016 with Splunk!
Thousands of Cisco customers – including more than 20 internal Cisco teams – leverage Cisco & Splunk solutions to do everything from improve infrastructure and application availability to defend...
View ArticleSplunk & the National Defense University: Educating the Security Warriors
Every six months, or once a semester if you are academically inclined, our Splunk Public Sector office in Tysons Corner, VA hosts students from the National Defense University (NDU) in Washington, DC...
View ArticleDocker? Amazon ECS? Splunk? How they now all seamlessly work together
Today the Amazon EC2 Container Service (ECS) team announced they have added the Splunk native logging driver to the newest version of the ECS agent. This means it’s now easier to implement a...
View ArticleSmart AnSwerS #70
Hey there community and welcome to the 70th installment of Smart AnSwerS. Since expanding Splunk HQ with the addition of the new building next door, things have been eerily quiet as you walk through...
View ArticleSIEM success patterns – How to get it right!
Hello all, One of the things I love about machine data is that it can be used in so many ways. Interestingly enough over the years I have observed a common pattern in organizations that have been...
View Article