• Why SP6?
  • CMMC Services
    • CMMC Certification Overview
    • CUI Data Mapping
    • Security Gap Assessments
    • CMMC Implementation Services
    • C3PAO Assessment Support
    • Compliance as a Service (CaaS)
  • CMMC Software
    • Continuous Compliance Monitoring (ART)
  • Security Solutions
    • Cybersecurity Overview
    • Security Workshops
    • Security Validation
      • Ransomware Readiness Assessments
    • Managed SIEM Services
  • Company
    • Leadership
    • Core Values
    • News
    • Careers
    • Care & Give Back
    • Resources
      • InfoSec
        • Security Blog
        • Splunk Links
      • CMMC
        • CMMC Overview and History
        • Guide for Conducting Risk Assessments
        • CMMC Blog
        • CMMC Guidance
Menu
  • Why SP6?
  • CMMC Services
    • CMMC Certification Overview
    • CUI Data Mapping
    • Security Gap Assessments
    • CMMC Implementation Services
    • C3PAO Assessment Support
    • Compliance as a Service (CaaS)
  • CMMC Software
    • Continuous Compliance Monitoring (ART)
  • Security Solutions
    • Cybersecurity Overview
    • Security Workshops
    • Security Validation
      • Ransomware Readiness Assessments
    • Managed SIEM Services
  • Company
    • Leadership
    • Core Values
    • News
    • Careers
    • Care & Give Back
    • Resources
      • InfoSec
        • Security Blog
        • Splunk Links
      • CMMC
        • CMMC Overview and History
        • Guide for Conducting Risk Assessments
        • CMMC Blog
        • CMMC Guidance
Contact Us
Blog Cybersecurity Splunk Software
Masked wrestler in a suit
_ August 13, 2019_ Chris Selvig

Splunk Data Onboarding – Wrestle with Tough Data… and Win

On-boarding data into Splunk is a fundamental skill and common place for a Splunk Admin. In this article, we will prepare you for situations where getting data into Splunk presents a political or technical tarpit you might not expect.

READ MORE
Blog Cybersecurity Splunk Software
Stethoscope listening to computer keyboard
_ June 24, 2019_ SP6

Splunk Health Monitoring Best Practices

Did you know that Splunk already has built-in health checks that can tell you if something important was misconfigured and alert you to important system or data outages? If you did, you are actually in the minority of users!

READ MORE
Blog Cybersecurity Splunk Software
Person working on a laptop
_ January 14, 2019_ Pankaj Varjani

Understanding Splunk Custom App Development

Learn some tips around custom app development which will help in adhering to Splunk guidelines and best practices for Splunk apps.

READ MORE
Blog Cybersecurity Splunk Software
Diverging railroad tracks
_ December 17, 2018_ Cedric Milan

Consolidated AWS Account Logging of Cloudtrail and Config Services Into Splunk

Explore scenarios where multiple AWS accounts are configured to log Cloudtrail and Config into a consolidated S3 bucket.

READ MORE
Blog Cybersecurity Splunk Administration Splunk Software
Finger pressing blue optimize button on computer keyboard
_ October 1, 2018_ SP6

SPL Optimization

There are countless blogs, articles, and Splunk ‘answers’ regarding the optimization of Splunk queries (and here’s another one). In this article, we are going to share a few tips to improve the performance of your Splunk queries…

READ MORE
Blog Cybersecurity Splunk Software
Green 'Upgrade' button on computer keyboard
_ August 17, 2018_ Jad Callahan

7 Reasons to Upgrade to Splunk 7

Check out 7 top reasons to upgrade to Splunk 7 from our recent live webinar on this topic.

READ MORE
Blog Cybersecurity Splunk Software
Magnifying glass on computer keyboard
_ July 26, 2018_ Pankaj Varjani

How to Make the Most of Splunk Lookups

Learn Splunk lookup terminology, use cases, and tips for effectively this powerful feature.

READ MORE
Blog Cybersecurity Splunk Software
Scrabble tiles spelling 'insight'
_ April 19, 2018_ Cedric Milan

Splunk Data Analysis: How to Configure Your Deployment for Faster Insight

“Day 1 insight” isn’t always easy to achieve. This post reviews areas where you can focus your Splunk data analysis efforts to make the vision of Day 1 insight a reality.

READ MORE
  • 1
  • 2
  • 3
Categories
Recent Posts
  • Ransomware: Executive Summary (for Non-Technical Executives)
  • 7 Ways State, Local, and Education (SLED) Organizations Can Protect Against Ransomware Attacks
  • 3 Splunk Best Practices We Learned the Hard Way
  • The Ultimate Guide to Splunk Pricing in 2023: Ingest vs. Workload Pricing
  • What is Summary Indexing?
Tags
AWS CMMC 2.0 CMMC Certification common information model cybersecurity Fraud Detection How-To Life at SP6 Professional Services Firm Python SIEM Splunk Best Practices Splunk Cloud Splunk Deployment Splunk Enterprise Splunk ITSI Splunk License Splunk SIEM Splunk SOAR Splunk Software state and local government
Archives
SP6 Logo White
TBBJ award

CMMC Services

  • CMMC Certification Overview
  • CUI Data Mapping
  • Security Gap Assessments
  • CMMC Implementation Services
  • C3PAO Assessment Support
  • Compliance As A Service (CaaS)

Security Solutions

  • Cybersecurity Overview
  • Security Workshops
  • Security Validation
  • Ransomware Readiness Assessments
  • Managed SIEM Services

Company

  • Why SP6?
  • Leadership
  • Core Values
  • News
  • Careers
  • Care & Give Back
  • Resources
  • +1 (727) 914-5032
  • service@sp6.io
  • 13577 Feather Sound Dr
    Clearwater, FL 33762
Linkedin Youtube Rss

©2023 SP6 Consulting, LLC,. All rights reserved