There’s currently a major adoption occurring around SOAR products Security Orchestration, Automation and Response. What is SOAR? SOAR is next-generation security software products that are designed to automate the common, and fairly remedial tasks that Security Analysts face.
According to The National Retail Federation, retail theft costs U.S. companies $30 Billion a year, with “professional/habitual shoplifters” responsible for 10% ($3b) of all retail theft. And the problem is only getting worse, with losses increasing at 7% year per year. How can you defend yourself against these losses?
There is always a sense of dread when your search head cluster (SHC) goes down. It’s the interface to Splunk, and for the analysts, it’s their window to the data world.
Did you know that Splunk already has built-in health checks that can tell you if something important was misconfigured and alert you to important system or data outages? If you did, you are actually in the minority of users!
Very few organizations begin a Splunk ITSI deployment with their best foot forward. Learn why and what you can do to follow in the footsteps of those that are.
Migration to Splunk ES from a legacy SIEM is not always an “apples-to-apples” scenario. Learn how to temper your team’s expectations as you make this transition.
Splunk is a log aggregation and analysis tool that can also serve as a SIEM product with its Enterprise Security app. In this article, we discuss the features that make Enterprise Security a high-powered SIEM tool.
Learn about the importance of Splunk training and explore Splunk training resources.
There are countless blogs, articles, and Splunk ‘answers’ regarding the optimization of Splunk queries (and here’s another one). In this article, we are going to share a few tips to improve the performance of your Splunk queries…
Learn how Splunk n’ a Box enables you to deploy a Splunk lab environment in a matter of minutes.