.conf2015 Highlight Series: EnerNOC uses Splunk to Get a Grip on Power
This post is inspired by our most recent announcement with EnerNOC, but read on for more details.
From cruising altitude, the modern energy industry seems like an island of calm. But as your metaphorical jet gets closer to land, the messiness begins to unfold around you. Be it government regulation, evolving technology, spikes in fear relating to nuclear energy, or even the ability to harness solar or wind power to put energy back into the grid and, gosh, get paid by the power company, there’s a dizzying amount of complexity behind every power bill that increases or decreases your price per kilowatt hour. And that complexity affects your bottom line.
So, in this chaotic world, how can you …
Splunk in Space: Splunking Satellite Data in the Cloud
This year a Team of Splunkers attended the ESA App Camp 2015 in lovely Frascati, Italy. The topic of this year’s challenge was:
“There are thousands of ways to enrich apps with data from space – what’s yours?”
The Splunk team featured Robert Fujara and Philipp Drieger alongside with camp participants Claire Crotty and Anthony Thomas. Together the team created a mobile web app that accessed a Splunk Cloud instance to analyze geolocation-based satellite data and inform users about different environmental indicators across Europe. Users can input their preferences in terms of living environment and based on different indicators they then receive recommendations on which city or region would suit them best.
The key data sources for this project…
Public-Private Partnerships: Treating Cybersecurity as a Team Sport
It’s often said one of the hardest things to do is ask for help. Recognizing that you can’t do something alone isn’t always easy. The same concept also applies to private and public sector organizations. Modern cybersecurity is something that can no longer be addressed with a siloed approach. Industry and government may not always share the same mission, but they do share a common challenge of protecting their organizations from malicious actors. Recognition of this common adversary is starting to happen, but it is critical that moving forward we continue to view cybersecurity as a “team sport.”
Bringing together officials from federal agencies, technology companies, commercial organizations and academia, enables us to create unified solutions to address broad cyber …
Splunk Wins 2015 Corporate Governance Award for Best Proxy Statement
Earlier this month I was fortunate enough to represent Splunk at the 2015 Corporate Secretary Corporate Governance Awards gala event at Gotham Hall in NYC, alongside my colleagues Weilyn Wood and Ellen Swarthout. We were shortlisted for Best Proxy Statement in the small to mid cap public company category and were thrilled to win the award in front of hundreds of governance and legal professionals.
This award recognizes Splunk’s leadership in transparent and useful investor disclosure. The judges examined a number of general factors, including effectiveness of communication elements, readability, visual design and overall layout, as well as specific elements such as compensation discussion and analysis and director profiles. The awards are open to all corporate secretaries, general counsel, governance …
Nanyang Polytechnic | Splunk Challenge 2015
It is once again the annual “Splunk Challenge” competition held at the School of IT in Nanyang Polytechnic today. This competition aims to promote awareness of data analytics using machine data and Splunk as a platform for Operational Intelligence. I saw a class filled with eager students waiting to display their “splunkfullness” skill in the competition to bring home a Macbook Air, iPad mini and iPod nano.
Taking on the tasks set in the questions paper is no easy feat. There are two parts to the competition. First they will need to understand and interpret the dashboard shown to them and also the datasource that is needed to populate the reports. The second part of the competition requires the student …
Security Solutions Need Data Science and Machine Learning to Protect Organizations
Every month we hear about a major breach targeting an enterprise or public sector. Based on current cyberattack growth rates, we anticipate the impact to our global economy to be around three trillion US dollars.
Within the past five years, 2.5 billion records were exposed. From January, 2015 until June 2015, 256 million records were compromised. Breaking that down, that’s…
- 1,400,000 stolen records per day (or)
- 56,000 stolen records per hour (or)
- 943 stolen records per minute.
A recent FireEye study found that on average, an organization takes 205 days to detect advanced threats. We need a security solution that uses a new paradigm to combat modern day attacks…
Splunk calls it Splunk User Behavior Analytics (Splunk UBA).
The Insider Story: Splunk wins BigData-Insider and Security-Insider Awards
Splunk were recently invited to take part in the German IT-Awards 2015 run by Vogel IT-Medien. They own a number of online publications including BigData-Insider, CloudComputing-Insider, DataCenter-Insider, IP-Insider, Security-Insider and Storage-Insider. With an average of 850,000 page impressions per month they provide some of the most important sources of independent information to IT professionals in Germany.
Over a period of 4-5 months, the different publications asked their subscribers to vote for the “Readers’ Choice Awards 2015″. With over 27,600 votes it is one of the largest IT awards ceremonies in Germany.
Splunk was nominated in two categories and we’re delighted that we got so many votes from the readers of …
Lady Gaga, Big Data and Splunk
What does Lady Gaga have in common with Big Data and Splunk? No, it’s not how she mined social media for her littlemonsters.com community, though there is a great Lady Gaga “big data” story there. Rather all three came together at the NetworkWorld Asia 10th Anniversary Reader’s Choice Awards 2015 reception on the evening of October 29 at the One Farrer Hotel in Singapore.
With over 30 distinguished CIO’s in attendance, the asian Lady Gaga kicked off the evening with a high powered (i.e., loud) rendition of Poker Face.
With the audience energised, the night passed quickly with awards given out in 47 categories and an additional 12 Hall of Fame awards were given out to the winners.
Improve Your Ability to Detect, Scope and Respond to Advanced Attacks with Splunk ES 4.0
For as long as I’ve been in security, vendors have talked about the “emerging threat landscape” and warned organizations not to be passive or to settle for “good enough” security. Never in my career have those words been truer than they are today. In fact, today’s threats are so different than those of the past that security professionals are now required to approach investigations in a radically different way.
Today’s threats are dynamic in nature, often comprising a series of activities over a long period of time. This makes them difficult to investigate, requiring the analyst to be equally as dynamic in his or her activities to fully scope the infection. It’s also rare these days that a threat only …
Using Splunk – It’s a Revolution!
I’m still coming down from the high that I experienced at .conf2015 a few weeks ago in Las Vegas. It was an outstanding event—from the great customer presentations, to the new product updates and the Search Party (the silent disco was a highlight!). That said, not much can compete with the honor I had in presenting this year’s Splunk Revolution Award Winners.
If you’re not familiar with the Splunk Revolution Awards, the awards were established to distinguish the “best of the best” among our customers and hopefully inspire others in the process. These are folks who share their stories and I’m blown away by what they’ve been able to accomplish with the Splunk Platform.
There was so much goodness that …