Earning a Seat at the Table: Why Containers Matter
Container technologies like Docker matter to the enterprise for three key reasons:
Density is about extracting as much value from your infrastructure as possible. Private clouds deployed using traditional VM’s are memory-bound, which is why most private clouds still run with single or low double digit CPU utilization. I was able to run my private cloud at roughly 2 VM’s per core, where each VM hosted an application server instance. Using containers, I was able to get roughly 10 containers per core, where each container hosted an application server instance with an identical configuration.
Similar to virtual machines, containers are inherently portable – they abstract the underlying hardware from the app, enabling the app …
Like Malcolm Gladwell, Splunk Cloud Helps You See Things Others Don’t
As I’m sitting in my home office, I glance over at my credenza and I spy the Malcolm Gladwell non-fiction book, “David and Goliath: Underdogs, Misfits, and the Art of Battling Giants.” I’m a big Gladwell fan. While I enjoy how he uses powerful story-telling to reshape the way we think about life and the world around us, I also like how he uses research and data to make discoveries many of us might miss. Much like the capabilities offered to companies through Splunk software, Gladwell inspires me to dig deeper and look at things from a different perspective.
The premise of Gladwell’s “David and Goliath” book is the Old Testament account about the shepherd boy who takes down a …
Splunk Acquires Caspida: The Future in Advanced Breach Detection is Here
Today, we welcome Caspida to the Splunk family. This acquisition enables Splunk to bring critical analytical capabilities to our customers and extends Splunk’s security analytics leadership. Caspida adds data science-driven Behavioral Analytics to the industry’s most powerful analytics-enabled SIEM solution.
In the last year, I have had several conversations with peers and customers about attack patterns and enterprise compromises. We see three big categories of attackers:
- Advanced or nation state attackers: they compromise, persist, and run campaigns – not just one off opportunistic attacks.
- Insiders: trusted parties that abuse their privileges.
- Fraudsters or cyber criminals: stealing money, credit cards, estore wallets, and conduct fraudulent transactions like wire transfers, and reimbursement or benefits fraud.
All recent high-profile …
All aboard with Infrastructure 4.0 — Splunk wins Deutsche Bahn Internet of Things Hackathon
Deutsche Bahn (DB) describes itself as the second largest transport company in the world and is the largest railway and infrastructure operator in Europe. With the popularity of Industry 4.0 and IoT in Germany, DB recently ran a “Deutsche Bahn goes 4.0” Hackathon over the weekend of May 8-9 2015. The concept was “We provide the data, you innovate with it”. Splunk participated with a crack team of two people, a copy of Splunk Enterprise running on a laptop and got their hands dirty digging into a labyrinth of infrastructure data. The challenge was tough: starting at 5pm we had 24 hours straight to analyze the data and demonstrate the value from it. After the final presentation of …
FORE! Splunking my Swing
So I went to the golf range last night. It was an indoor range just a few blocks from Splunk HQ called Eagle Club Indoor Golf. They are using stereoscopic camera systems that precisely capture and analyze ball flight. Checkout their place in the virtual tour below.
Naturally, I asked if I could get a copy of the raw data. After an eyebrow raise they said “Sure”. They emailed me a CSV file that looks like below:
Club, Club Head Speed, Ball Speed, Launch Angle, Azimuth, Side Spin, Back Spin, Total Spin, Descent Angle, Carry, Total Distance, Offline, Peak Height, Vert Path, Horiz Path, Face to Path, Face to Target, Lie, Loft, Horiz Impact, Vert Impact,…
Driver, 109.7, 159.1, 4.3, -2.6, -1665,
Accelerate the Detection of Advanced Threats and Malicious Insiders
Cyber threats are becoming increasingly sophisticated, employing multiple attack vectors and utilizing legitimate ports to exfiltrate sensitive company information. These threats often sit undetected on infected systems for months while modifying, viewing, and stealing your data. And unfortunately, finding them is only part of the battle. To effectively remediate them can require days or weeks of investigation from the security team to trace back through the kill chain to determine the source of the infection, the path it employed, and the actions it took. Of course, this is of concern on multiple fronts; not only does the infection remain for a longer period of time, but the cost of remediation can become significant in its own right.
Similarly, malicious insiders …
Customer experience improves business performance. Are you making the most of your machine data? Part II
In part 1, we discussed some of the findings of the recent UK Institute of Customer Service report on Customer Satisfaction Index and highlighted some customers using Splunk and machine data to improve customer experience. There’s a great video from my colleague Rahul that gives you a good summary:
We often find that companies start using their machine data in Splunk to spot issues and get alerted to possible incidents. Very quickly the people who are looking at the data and what they thought was a system of record realise that the same data in Splunk can be used as a system of engagement. Consider the screenshot from a demonstration of Operational Intelligence (click to enlarge):
Customer experience improves business performance. Are you making the most of your machine data? Part I
A couple of months ago, the UK Institute of Customer Service in the UK published its Customer Satisfaction Index for the previous six months. The overall rating for the UK Customer Satisfaction Index has dropped for the last two years. In the last six months, the only sectors that have gone up in the UKCSI are Banks/Building Societies and Utility companies.
The three biggest areas and UKCSI metrics where the score has fallen are:
With the continued growth of e-commerce, mobile devices and social media, lots of customers are having lots of experiences across lots of channels. Some of the experience is good and some of it is bad. From the UKSCI, it seems like the customer …
Splunk at Gartner BI & Analytics Summit
We’re very excited to be attending the Gartner Business Intelligence & Analytics Summit this week in Las Vegas. In addition to welcoming attendees in our booth (#517), we’ll also be presenting during the following times:
Monday, March 30 | Showcase Theater A, Forum Ballroom | 6pm-6:20pm
Leverage Machine Data and Deliver New Insights for Business Analytics
The Big Data phenomenon is being driven by the growth of machine data. Critical insights found in machine data enable IT and Security teams to ensure uptime, detect fraud and identify threats. Today, forward-thinking organizations are discovering its value to better understand their customers, improve products, optimize marketing and drive business processes. Learn how Splunk and your machine data can deliver real-time
analytics.usa.gov Recreated Using Splunk
Have you guys seen analytics.usa.gov?
It’s a great break-down of web traffic to various US government sites. I’m a passionate believer in the open-data movement, and this is simply wonderful! A very big pat on the back to the US Government from across the other-side of the Atlantic. I’m now looking at you now Europe…
What’s more, the team that built the app have exposed API endpoints for the data that’s currently being displayed. Which – to my excitement – allows us to start playing with it in Splunk.
I wanted to show you just how easy it is to recreate the site in Splunk, and why you would want to do it in the first place.…