Simple steps to getting started with Splunk for Customer Experience
In the previous post, I shared an amazing use of Splunk at Comcast for improving user experience. You can also access a replay of the webinar: “How Comcast Improves Mobile App and Video Experience with Splunk.”
In this post, I will share with you some tips, tricks on how you could get started with using Splunk for Customer Experience.
Many of you are already using Splunk for WebOps, Application Delivery or IT Operations by indexing weblogs – apache or IIS. Analysis of this data helps ensure website, mobile app or application uptime and performance. However, these data sources contain critical information that goes beyond the operational use. They contain customer ID, product information, platform, device, and transaction …
How Government Healthcare Agencies Should Approach Their Vulnerabilities
The pressures government healthcare agencies have felt for years are surfacing aggressively. This is due, in part, to recent data hacks and the need to protect sensitive information, but the increasing pressure to operate efficiently with smaller budgets plays a significant role as well. Providing valuable care to patients and adhering to compliance and security requirements are added challenges agencies must tackle despite their limited resources.
Exposing government healthcare agencies’ data leads to vulnerabilities that affect the security of public safety, as well as the safety of the U.S. government as a whole. To combat attacks and meet the various security needs, agencies need greater visibility into their data. Accessibility is also key. It is imperative to have the capability …
Splunk Enterprise Selected Best Fraud Prevention Solution in 2015 SC Awards
It has been an exciting week for all of us at Splunk who were fortunate enough to attend this year’s RSA Conference, focused on cybersecurity. From the wonderful Splunk stories by customers visiting our booth, to the engaging presentations from our partners and customers, RSA is always guaranteed to be a highlight on the Splunk Security calendar. (Our unique t-shirts never fail to build some buzz either!).
During the week we were also honored at the SC Magazine 2015 U.S. awards by winning the Best Fraud Prevention solution. A cross-section of SC Magazine readers selected the finalists and winners in the Reader Trust Award categories, and we are honored that this also marked the third consecutive year that …
Smart AnSwerS #20
Hey Splunk Community and welcome to the 20th installment of Smart AnSwerS!
Almost every day in the Splunk documentation team Hipchat room, a conversation about cats comes up which isn’t surprising since a good number of the technical writers are cat owners. Through much discussion on our observations and exchanging of photos of our pets, the moral of the story usually ends up being that cats just want to be lazy, carry out revenge, and still be loved. Truly living the life. Now if only we could get them to help out with mice problem at the office
Check out this week’s featured Splunk Answers posts:
How can I restrict a user to only search a specific set …
Results and Feedback from Splunk Apptitude Round 1
Back in November, we launched a contest called “Apptitude”. This was a competition designed to energize and challenge Splunk’s developer community. We offered prizes—big prizes—for the best app submissions in two categories: Microsoft System Center Configuration Manager (SCCM) and a general “Innovation” topic. It worked. Over 120 people participated, and 23 entries were submitted! The response was so strong that we have announced a second round of the contest.
The contest ended on January 20th, and here is a summary of the results:
Splunk Cloud Journey Continues with International Launch at AWS Summit
One of the things I always try to remember in our über fast-moving world is that the journey is often so much more valuable than the destination. Whether it’s a road trip, raising kids, or launching a new product, I try to remind myself to soak in all the goodness along the way. At Splunk, we have a destination: To make machine data accessible, usable and valuable to everyone—no matter where it comes from. But, there’s a lot that takes place between here and there – and I’m thrilled to be on the ride.
Customer adoption is a key part of us getting to our destination, which is why I’m so excited that we reached another milestone on the cloud …
Using Splunk for Your Vulnerability Management
The last days have been full of Microsoft ISS http.sys Vulnerability informations and notifications. So patching was at the top of the agenda for many companies and teams.
Recently Verizon also released their yearly data breach report. One of the major trends they have seen is that vulnerabilities are still not patched or isolated at systems and are one of the highest risk factors over the last 20 years.“We found that 99,9% of the exploited vulnerabilities had been compromised more than a year after the CVE was published.”
So why are still attackers so successfully with this attack method? I guess it cokes down to the fact that often there is not an established vulnerability incident handling process in place. Did you know …
Splunk MINT SDKs 4.2: Hybrid support, screen tracking & more goodies!
Today at Fluent Conference we are releasing the new version of the Splunk MINT SDKs that bring some new & exciting features.
With Gartner predicting that by 2016 50% of Mobile Apps will be hybrid it’s about the right time to release our support for Hybrid! The market is desperately looking for better tools when it comes to HTML5 performance and we wouldn’t be happier with this release.
The latest version of the Splunk MINT SDKs allows developers to monitor not just the performance of the native side but also what is going on in the Web View. You will have to add our native SDKs into your mobile apps and then write a few lines in order to instrument …
Accelerate the Detection of Advanced Threats and Malicious Insiders
Cyber threats are becoming increasingly sophisticated, employing multiple attack vectors and utilizing legitimate ports to exfiltrate sensitive company information. These threats often sit undetected on infected systems for months while modifying, viewing, and stealing your data. And unfortunately, finding them is only part of the battle. To effectively remediate them can require days or weeks of investigation from the security team to trace back through the kill chain to determine the source of the infection, the path it employed, and the actions it took. Of course, this is of concern on multiple fronts; not only does the infection remain for a longer period of time, but the cost of remediation can become significant in its own right.
Similarly, malicious insiders …
The Splunk Apptitude App Contest to give out $150,000 in prizes
The RSA Conference 2015 is in full swing here in San Francisco, and Splunk is out in force. With so much news coming out of the conference, it’s easy for things to get lost in the shuffle so I wanted to let you all know the what, why, when and how about the new Splunk Apptitude App Contest that we announced this morning.
The Splunk Apptitude App Contest is an online competition designed to find the next big app using Splunk software. Whether it’s the next cutting edge visualization, or a highly technical security app – we want your big ideas. And we’ll give you more than just bragging rights, we’ll give you cash.
The Splunk Apptitude contest serves …