Nanyang Polytechnic | Splunk Challenge 2015

It is once again the annual “Splunk Challenge” competition held at the School of IT in Nanyang Polytechnic today. This competition aims to promote awareness of data analytics using machine data and Splunk as a platform for Operational Intelligence. I saw a class filled with eager students waiting to display their “splunkfullness” skill in the competition to bring home a Macbook Air, iPad mini and iPod nano.


Taking on the tasks set in the questions paper is no easy feat. There are two parts to the competition. First they will need to understand and interpret the dashboard shown to them and also the datasource that is needed to populate the reports. The second part of the competition requires the student …

» Continue reading

Security Solutions Need Data Science and Machine Learning to Protect Organizations

Screen Shot 2015-11-03 at 3.42.46 PMEvery month we hear about a major breach targeting an enterprise or public sector. Based on current cyberattack growth rates, we anticipate the impact to our global economy to be around three trillion US dollars.

Within the past five years, 2.5 billion records were exposed. From January, 2015 until June 2015, 256 million records were compromised. Breaking that down, that’s…

  • 1,400,000 stolen records per day (or)
  • 56,000 stolen records per hour (or)
  • 943 stolen records per minute.

A recent FireEye study found that on average, an organization takes 205 days to detect advanced threats. We need a security solution that uses a new paradigm to combat modern day attacks…

Splunk calls it Splunk User Behavior Analytics (Splunk UBA).

Splunk UBA

» Continue reading

The Insider Story: Splunk wins BigData-Insider and Security-Insider Awards


Splunk were recently invited to take part in the German IT-Awards 2015 run by Vogel IT-Medien. They own a number of online publications including BigData-InsiderCloudComputing-InsiderDataCenter-InsiderIP-InsiderSecurity-Insider and Storage-Insider. With an average of 850,000 page impressions per month they provide some of the most important sources of independent information to IT professionals in Germany.


Over a period of 4-5 months, the different publications asked their subscribers to vote for the “Readers’ Choice Awards 2015″. With over 27,600 votes it is one of the largest IT awards ceremonies in Germany.


Splunk was nominated in two categories and we’re delighted that we got so many votes from the readers of …

» Continue reading

Lady Gaga, Big Data and Splunk

splunk nwa

What does Lady Gaga have in common with Big Data and Splunk? No, it’s not how she mined social media for her community, though there is a great Lady Gaga “big data” story there. Rather all three came together at the NetworkWorld Asia 10th Anniversary Reader’s Choice Awards 2015 reception on the evening of October 29 at the One Farrer Hotel in Singapore. LADY GAGA

With over 30 distinguished CIO’s in attendance, the asian Lady Gaga kicked off the evening with a high powered (i.e., loud) rendition of Poker Face.

With the audience energised, the night passed quickly with awards given out in 47 categories and an additional 12 Hall of Fame awards were given out to the winners.

Splunk …

» Continue reading

Improve Your Ability to Detect, Scope and Respond to Advanced Attacks with Splunk ES 4.0

Screen Shot 2015-10-27 at 9.34.40 AMFor as long as I’ve been in security, vendors have talked about the “emerging threat landscape” and warned organizations not to be passive or to settle for “good enough” security. Never in my career have those words been truer than they are today. In fact, today’s threats are so different than those of the past that security professionals are now required to approach investigations in a radically different way.

Today’s threats are dynamic in nature, often comprising a series of activities over a long period of time. This makes them difficult to investigate, requiring the analyst to be equally as dynamic in his or her activities to fully scope the infection. It’s also rare these days that a threat only …

» Continue reading

Using Splunk – It’s a Revolution!

Revolution awards

I’m still coming down from the high that I experienced at .conf2015 a few weeks ago in Las Vegas. It was an outstanding event—from the great customer presentations, to the new product updates and the Search Party (the silent disco was a highlight!). That said, not much can compete with the honor I had in presenting this year’s Splunk Revolution Award Winners.

If you’re not familiar with the Splunk Revolution Awards, the awards were established to distinguish the “best of the best” among our customers and hopefully inspire others in the process. These are folks who share their stories and I’m blown away by what they’ve been able to accomplish with the Splunk Platform.

There was so much goodness that …

» Continue reading

Splunk Delivers Real-Time Operational Intelligence to Newly Announced AWS IoT Service

The big news of the day is that AWS is officially in the Internet of Things business. This is an announcement that is bound to make a major impact on the IoT, and is exciting news for those who are building IoT solutions as they can now take advantage of the benefits AWS can provide in terms of time-to-value, security, and scalability for device to cloud and cloud to device infrastructure.

This is also great news for Splunk’s IoT team. Our existing partnership with AWS provided a great starting point for making Splunk Enterprise AMIs and Splunk Cloud an easy to deploy and use solution for the massive amounts of machine data bound to be created by AWS IoT applications. …

» Continue reading

Splunk App for AWS: Making the invisible, visible

Avengers_age_of_ultron_thor-artI imagine most of you have seen the 2013 Marvel movie, Thor. If not, I highly recommend it, where the Asgardian god of thunder saves the Earth using an enchanted, magical hammer. The movie has a very obvious storyline – triumph of good over evil – but what caught my attention was a reference to a quote by the British science-fiction writer, Sir Arthur Charles Clarke – “Any sufficiently advanced technology is indistinguishable from magic.”

This quote really got me thinking. I am a product marketing manager for Splunk Cloud, which is hosted on AWS. As part of my job, I work very closely with various AWS technologies and customer requirements around cloud adoption. For instance, in the AWS …

» Continue reading

We proudly announce: the 2015-2016 SplunkTrust Membership!

Whew! Now that we’re back from .conf and the dust from Megacup’s hooves has settled, I’m proud and pleased to announce the inaugural membership of the SplunkTrust!

We created the SplunkTrust Community MVP program to recognize our community’s top contributors, and to involve them in planning and policy decisions as our community grows. These community members have shown the very highest level of commitment to helping others succeed with Splunk, and are the first year’s SplunkTrust member roster:



  • Aleem Cummins
  • Bernardo Macias
  • Camille Balli
  • Charlie Huggard
  • Chris Kurtz
  • David Shpritz
  • Duane Waddle
  • George Starcher
  • Gregg Woodcock
  • Jacob Wilkins
  • Kate Lawrence-Gupta
  • Kyle Smith
  • Martin Müller
  • Mason Morales
  • Michael Uschmann
  • Mark Runals
  • Mike Langhorst
  • Nick Mealy
  • Rich Mahlerwein
  • Sherman Smith
» Continue reading

Try Splunk Enterprise Security for Free

It’s no secret that the security landscape is continuously evolving and growing in complexity. Today’s attackers are highly skilled and employ a wide range of advanced techniques to evade legacy security. To succeed in this dynamic environment, security teams need scalable security intelligence for constant visibility across the organization.

Splunk Enterprise Security (ES) is a premium security solution that helps solve these complex security challenges. It employs analytics-driven security that connects people to the data and one another to help security teams to be faster, smarter, and more effective in their ability to detect and respond to modern day threats. But switching to a new security solution without trying it out first simply isn’t an option for most organizations.

That’s …

» Continue reading