SC16 Conference: Home of the The World’s Fastest Network

conferenceYou don’t think of High Performance Computing (HPC) everyday but its use in a diverse set of applications such as climate prediction, nuclear labs, oil and gas discovery, defense and aerospace work, financial forecasting and other computational intensive activities touch us in our daily lives.  And from November 13 – 18, 2016 Salt Lake City become the home for HPC enthusiasts at the SC16 conference.

What makes this conference different than any other? It happens to be the home for the world’s fastest network, SCinet. It is a high-performance, experimental network that is specifically built for the conference and connecting it to the broader internet. To give you a sense of its capacity, it provides more than 5 Tpbs(!) of internal …

» Continue reading

Stop Security Threats With Real-Time Data Monitoring

Imagine having a vast library of books but not being able to see what words live on the page that you are reading or want to read. That would be like being able to ingest security relevant data from a diverse array of data sources but not being able to use that information to monitor your security posture in near real time.

Library of Congress

Library of Congress

Real-time data monitoring is essential to secure an enterprise because it gives security practitioners the ability to monitor and manage the consumption and use of machine data across complex IT and security systems with visual insights into that data. The data can come from sources such as web logs, application usage to digital transactions. Why …

» Continue reading

Women in Technology: Meet Kamisha Williams

Splunk Gains Young Talent Through Partnership With Year Up

I first heard about Kamisha Williams’ impressive leadership skills when she led a new-hire group in a volunteer Splunk4Good afternoon at San Francisco’s Buena Vista Horace Mann Community School. When I learned that she had participated in the Year Up program that guided her toward a contractor position at Splunk, I couldn’t wait to learn more from her.  I had heard of Year Up before I met Kamisha and understood it was an incredible force in closing the opportunity divide so I was excited to learn that Splunk was involved in this program.

Tell me about your role at Splunk

Kamisha Williams, right, with Splunkers from the HR team.

Kamisha Williams, right, with Splunkers from the HR team.

I’ve been …

» Continue reading

Splunk Women In Tech: Making the Jump to the Executive and C-Suite

Research shows that women who have a sponsor are more likely to have better pay, advance more quickly, get more high-profile assignments and stay in the workforce once they have children. Yet, men are 45% more likely than women to have a sponsor.

Splunk WiT 3On Monday, Dec. 12, Tracy Edkins, Chief Human Resources Officer at Splunk, shared this research and highlighted the importance of sponsorship as she kicked off Splunk’s Women in Technology event: Making the Jump to the Executive and C-Suite. The event brought together 50 senior-level Splunkers to engage in a conversation on this topic. The evening included networking and executive-facilitated discussions over dinner, followed by a fireside chat with Godfrey Sullivan, Chairman of the Board and former …

» Continue reading

Kaufland DevSummit2016 – Splunk for DevOps – Faster Insights, better code

The first DevSummit event was recently hosted by Kaufland with 200 people attending for the day to hear presentations about the “World of API”, discuss the latest best practice developments and build ideas in a hackathon. One highlight was the keynote from Markus Andrezak on how technology, business and innovation play together.

Of course, a team of Splunkers (big thanks to my colleagues Mark and Henning) wouldn’t miss such an event and got involved with a booth as well as a presentation. It was amazing to have so many fruitful discussions about how to make data more easily accessible and useable for business, development and operation teams. In the morning Joern Wanke from the Kaufland Omnichannel team presented on how …

» Continue reading

Make Security Incidents Less Scary By Organizing Your Response

The Federal Emergency Management Agency (FEMA) created the National Response Framework in 2008 to organize how the national government responds to natural disasters, terrorist attacks and other catastrophic events. Unfortunately, government resources alone can’t properly respond to disasters. That’s why the framework exists. It helps organize FEMA’s limited resources to respond to threats in the most efficient manner possible.

The six-step planning process from FEMA’s National Response Framework

The six-step planning process from FEMA’s National Response Framework

Similarly, incident response is an organized approach to addressing and managing the aftermath of a security breach or attack. The goal is to best organize alerts and resources within a security information and event management (SIEM) system to handle the situation in a way that limits damage and reduces recovery time and …

» Continue reading

Smart AnSwerS #83

Hey there community and welcome to the 83rd installment of Smart AnSwerS.

After a dry spell, Splunk HQ is finally experiencing a good amount of rain in the San Francisco Bay Area. As per usual, people have forgotten how to navigate around the city, both on the roads and sidewalks. On the plus side, we can finally see rain water get collected above the courtyard and flow into a huge basin that distributes the water to surrounding plants. Splunkers have been taking breaks to check out the recycled water system in action as a serene escape, making rainy days at the office something to look forward to.

Check out this week’s featured Splunk Answers posts:

Why is the

» Continue reading

Three Ways Machine Data Makes Your SIEM Better at Security

All data is security relevant is a mantra that security practitioners should get used to saying. But knowing what sources you need to tap into to improve your security posture can seem like a daunting task. It doesn’t need to be.

Data sources are a way companies solve the security issues causing them pain or issues that may cause harm. So what exactly is a data source? It can be almost anything from the machine data being generated by your existing firewall to online web logs. Just what data sources you tap into depends on your security use case.

There are already companies that have found unique ways to leverage machine data to work for their specific needs – whether …

» Continue reading

Universal or Heavy, that is the question?

Introduction

As a Professional Services Consultant, a discussion that I often encounter when on site with customers is whether to use a Universal Forwarder or a Heavy Forwarder.

Splunk provides two different binaries, the full version of Splunk and the Universal Forwarder. A full Splunk instance can be configured as a Heavy Forwarder.  The Universal Forwarder is a cut down version of Splunk, with limited features and a much smaller footprint.

I am going to show in this blog why Splunk Professional Services recommend the use of Universal Forwarders in preference to Heavy Forwarders whenever possible to ensure a faster, more efficient Splunk Platform.

When should the Universal Forwarder be used and why?

The Universal Forwarder is ideal for collecting files from disk (e.g. a syslog …

» Continue reading

Govsummit 2016: Elevating Data for Mission Success

AudienceA welcoming Fall in Washington DC formed the backdrop for Splunk’s second annual Govsummit at the Renaissance downtown last month. Parading a who’s who list of headliners, the summit brought over 1,100 public sector, Education and Splunk partner attendees together for a day of education and networking.

Kevin Davis, VP of Public Sector kicked off the event with CTO Snehal Antani following him with the company keynote. Dr. Ron Ross, Fellow at NIST, Greg Touhill, CISO for the US Federal Government and Tony Scott, CIO for the US Federal Government were on hand to unveil the latest NIST Special Publication 800-160 that provides guidance on systems resiliency for cyber-physical systems. In the wake of recent incidents where IoT devices were harnessed to …

» Continue reading