Information Exchange Boosts Threat Intelligence

B_GSiiLXIAAU1wsThe rash of recent government breaches and continued cyberthreats have accelerated the need for the exchange of information related to these and other known incidents. For many years, DHS has been working with industry and other federal agencies to provide more standardization of content so that security practitioners (and anyone else for that matter) are speaking the same language across multiple vendor platforms as it pertains to software, configurations and vulnerabilities, to name a few. An early example that pre-dates DHS was the Common Vulnerability Enumeration (CVE) that Mitre launched in 1999. These efforts can be challenging because gathering consensus and buy-in is never easy across a diverse set of organizations and so finding entities that can shepherd these specifications …

» Continue reading

Like Malcolm Gladwell, Splunk Cloud Helps You See Things Others Don’t

As I’m sitting in my home office, I glance over at my credenza and I spy the Malcolm Gladwell non-fiction book, “David and Goliath: Underdogs, Misfits, and the Art of Battling Giants.”  I’m a big Gladwell fan.  While I enjoy how he uses powerful story-telling to reshape the way we think about life and the world around us, I also like how he uses research and data to make discoveries many of us might miss.  Much like the capabilities offered to companies through Splunk software, Gladwell inspires me to dig deeper and look at things from a different perspective.

slingshot2

The premise of Gladwell’s “David and Goliath” book is the Old Testament account about the shepherd boy who takes down a …

» Continue reading

Getting ready for Business Analytics at .conf2015 – Part 1

It’s almost August! That’s a pretty special time for us here at Splunk because we start working with speakers for our annual user conference. That’s right, .conf2015 is just around the corner and I am super excited to meet Splunkers from around the world, hear all the cool use cases from machine data and learn what makes Splunk one of the most innovative companies in the world. It is a fantastic opportunity to interact with passionate users and learn about the innovate ways in which Splunk users have derived value from data for business and IT.

LGO-conf2015-RGB

There are number of great sessions around business analytics. These customer sessions will showcase innovative use of Splunk to solve business use …

» Continue reading

Under the Hood of Cisco IT

IT Operations Analytics with Cisco & Splunk
Do you know which technology is under the hood of Cisco IT?

Do you know what Cisco uses to monitor the health of 70+ of their apps and to respond to security incidents?

We bring you the answers straight from the horse’s mouth.

At the recent SplunkLive! SF and in front of a packed room, Robert Novak, , Quinn Zuo and Ruby Chiang of the Cisco IT team, , uncovered the mystery and gave us a good look under the hood.  They showed how Splunk powers their operations and solves some of their critical IT challenges.

» Continue reading

DIY 0 to 60 with Splunk in 3 steps

A lot of folks (particular developers) often ask me how to get started with building an app in Splunk? Many of the askers have no previous exposure to Splunk. Here are the steps I recommend:

  • Download Splunk: http://www.splunk.com/en_us/download.html. You’ll get 500 megs data ingest a day for free, which is plenty to start!
  • Do the search tutorial. It covers all the basics end to end, from ingesting data, to searches, to dashboards. By the end of the tutorial you will get a good sense of what you can do with Splunk itself.
  • Follow the fantastic new developer guidance for apps. We worked with real partners and have documented the entire journey of building an app, and captured those learnings for you
» Continue reading

Earning a Seat at the Table – Part 1: Responsibly Move at Market Speed

Snehal

As I indicated in my preview post, Earning at Seat at the Table, I’m fascinated by the transformation of IT and its increased role at the business strategy table. Enamored by the glory, impact, and success of Silicon Valley unicorns, CIO’s aspire to drive innovation within their companies. Often times however, the cart is put before the horse. Programs that include ideas like blocking 20% of an employees time to innovate are rolled out with the hope of cultivating a few great prototypes that can be shown off to the executive staff. I’ve found that to roll out an effective innovation strategy, it is critical to first improve the ability to execute IT projects, and subsequently to formalize strategies for …

» Continue reading

Using Data Analytics to Help Secure State and Local Government Networks

B_GSiiLXIAAU1wsWhile we eagerly await the government’s 30-day cybersecurity sprint report, it is important to remember that large federal agencies such as OPM aren’t the only ones susceptible to cyberattacks. State and local governments handle and collect confidential data just as frequently as federal agencies, which makes them attractive targets for cyberattackers. As the feds search for answers in the wake of OPM, state and local governments should likewise be reevaluating their cybersecurity approaches.

A lot of talk around cybersecurity focuses on improving data encryption, password protection and authentication practices. But one of best, and most underutilized, security resources in government is the data already being collected and the insights that information contains. State and local governments need to start embracing …

» Continue reading

Splunk Webinar: Learn how Cerner Extends Splunk to Gain End-to-End Visibility into Complex Business Process

I am honored to have the privilege to host a Splunk webinar with Cerner on July 28. In this webinar, Cerner will be discussing one of their many exciting use cases around business process analytics and how they are extending Splunk software to gain end-to-end insights into complex business processes.

One such process is real-time eligibility, a critical and complex process in healthcare. As a part of the process, information for each patient (e.g., name, address, insurance carrier) is entered into the Cerner system, where it is then verified and forwarded to the insurance carrier. The carrier confirms the patient’s coverage and the amount of the deductible. Within moments, the healthcare provider can validate each patient’s eligibility and then provide …

» Continue reading

Practical Operational Intelligence for the Internet of Things – Part 1

Recently, we were lucky to join the Eclipse Foundation’s IoT team for a webinar on “Practical Operational Intelligence for the Internet of Things”. Emphasis was on the practical. As I discussed in a recent blog for the IoT Solutions World Congress, when it comes to the IoT, turning data into insights shouldn’t be so hard. With the proliferation of complex architectures, interfaces, and slow time-to-value, it’s no wonder the “hype” of both big data and the IoT sometimes eclipses their successes.

With that in mind, I’m kicking off a multi-part blog series on “Practical” IoT Operational Intelligence and Analytics with Splunk. Goal here is to get you to value from IoT generated data as quickly and as …

» Continue reading

Smart AnSwerS #30

Hey there community and welcome to the 30th installment of Smart AnSwerS.

Splunk HQ’s kitchens underwent a total makeover last week, and this beast of an automated hot drink machine appeared on the 1st floor. Splunkers have been frequenting the new big shiny toy, taking all the mugs, bringing them back to their respective floors, and leaving us first floor dwellers with nothing *cries*. Fortunately, this new installation has brought comic relief. Some new signage was placed on the machine saying “”OK Coffee” I am voice activated, please try me.” The machine is not voice activated, serving some occasional amusement 😉

Check out this week’s featured Splunk Answers posts:

Real Time Search Performance Considerations: Are there any

» Continue reading