Archived Events
Federal agencies require a simple way to correlate all security-relevant data so they can manage their security posture. Instead of merely watching events after they occur, agencies should anticipate their occurrence and implement measures to limit vulnerabilities in real ...
Shift5 solution suite enables users to collect and access previously inaccessible OT platform data on a continuous basis. The solution suite transforms, enriches, and makes the collected data available for consumption in Splunk. Once in Splunk, users are able to correlate/integrate the collected data with other infrastructure ...
During this workshop, attendees gained a better understanding of how to create monitoring visualizations for Windows data (logs uploaded via provided .csv) and utilize it to quickly identify and solve discrepancies in their environment.
During this workshop, attendees gained a better understanding of how to create monitoring visualizations for Windows data (logs uploaded via provided .csv) and utilize it to quickly identify and solve discrepancies in their environment.
IBM Mainframe and System i are critical systems in many government agencies. However, due to technical issues around the legacy nature of these systems they are often left out of important modern IT initiatives. Ironstream is a solution that gets the machine data from these platforms, automatically ...
Attendees joined us for an informative webinar and live demo where they learned how:Legitimate AI and ML can allow your environments to detect APTs, insider threats, ransomware, and other cyberattack methods in their IT, OT, and IoT environmentsZero Trust is not just another term, but a ...
During this workshop, attendees gained a better understanding of how to create security relevant dashboards and alerts to showcase how Splunk can reduce MTTI & MTTR and streamline looking at security posture (logs uploaded via provided .csv).
During this workshop, attendees went over ingesting .csv and configuring fields, lookups, deep-dive dashboards, and conducting simpleXML edits to customize visualizations.
During this workshop, attendees went through an introduction to Splunk’s Command-Line Interface (CLI) illustrating initial configuration and customization of Splunk including setting custom ports for processes and creating user roles with specific capabilities. Participants also covered the installation and ...
During this workshop, attendees gained insight into some of the best resources and shortcuts our ̽»¨ÊÓÆµ SE team has found to get the most out of Splunk after working with it for years.