Splunk Enterprise Selected Best Fraud Prevention Solution in 2015 SC Awards

It has been an exciting week for all of us at Splunk who were fortunate enough to attend this year’s RSA Conference, focused on cybersecurity. From the wonderful Splunk stories by customers visiting our booth, to the engaging presentations from our partners and customers, RSA is always guaranteed to be a highlight on the Splunk Security calendar. (Our unique t-shirts never fail to build some buzz either!).

IMG_8660During the week we were also honored at the SC Magazine 2015 U.S. awards by winning the Best Fraud Prevention solution. A cross-section of SC Magazine readers selected the finalists and winners in the Reader Trust Award categories, and we are honored that this also marked the third consecutive year that …

» Continue reading

Using Splunk for Your Vulnerability Management


The last days have been full of Microsoft ISS http.sys Vulnerability informations and notifications. So patching was at the top of the agenda for many companies and teams.

Recently Verizon also released their yearly data breach report. One of the major trends they have seen is that vulnerabilities are still not patched or isolated at systems  and are one of the highest risk factors over the last 20 years.

“We found that 99,9% of the exploited vulnerabilities had been compromised more than a year after the CVE was published.”

So why are still attackers so successfully with this attack method? I guess it cokes down to the fact that often there is not an established vulnerability incident handling process in place. Did you know …

» Continue reading

Accelerate the Detection of Advanced Threats and Malicious Insiders

Cyber threats are becoming increasingly sophisticated, employing multiple attack vectors and utilizing legitimate ports to exfiltrate sensitive company information. These threats often sit undetected on infected systems for months while modifying, viewing, and stealing your data. And unfortunately, finding them is only part of the battle. To effectively remediate them can require days or weeks of investigation from the security team to trace back through the kill chain to determine the source of the infection, the path it employed, and the actions it took. Of course, this is of concern on multiple fronts; not only does the infection remain for a longer period of time, but the cost of remediation can become significant in its own right.

Similarly, malicious insiders …

» Continue reading

The Splunk Apptitude App Contest to give out $150,000 in prizes

Screen Shot 2015-04-20 at 3.35.48 PM

The RSA Conference 2015 is in full swing here in San Francisco, and Splunk is out in force. With so much news coming out of the conference, it’s easy for things to get lost in the shuffle so I wanted to let you all know the what, why, when and how about the new Splunk Apptitude App Contest that we announced this morning.

The Splunk Apptitude App Contest is an online competition designed to find the next big app using Splunk software. Whether it’s the next cutting edge visualization, or a highly technical security app – we want your big ideas. And we’ll give you more than just bragging rights, we’ll give you cash.

The Splunk Apptitude contest serves …

» Continue reading

SAIC & Splunk as a Security Intelligence Platform

splunk_LogoSplunk is one of the fastest growing companies in the hi-tech industry for a reason. We constantly push the boundaries on how we, and others, think about complex problems. One area that we’ve been successfully driving for a few years now is Security Intelligence. We learned early on, through the eyes of our customers, that the traditional approach to security had severe limitations. It was pure disruption and innovation to invert the thinking in this area and use the native Splunk platform to identify and ingest massive quantities and sources of unstructured and semi-structured data. This has enabled Splunk customers to index machine-generated data and query it with schema-on-the-fly, powering visualizations, dashboards, alerts and proactive remediation. This is what has …

» Continue reading

Security is a hot topic – where better than GISEC in Dubai to get Splunking your security?

logo_gisecNeedless to say security is a hot topic right now with the numbers, sophistication and impact of threats ever increasing. It seems like the upcoming GISEC event in Dubai is well timed. Splunk is exhibiting at the event and we’ll be showcasing how Splunk is used as a security intelligence platform by thousands of organisations worldwide. Splunk has a number of customers in the Middle East from the very large international companies to smaller ones, as well as public sector organisations.


A lot of our customers in the region are using Splunk as a security intelligence platform because they need more than a traditional SIEM can offer. In December last year we had the Head of IT Risk for …

» Continue reading

Splunk at RSA 2015

splunk_LogoNeed to justify your trip to RSA 2015 next week? Just tell your boss that Splunk will be there, and we have some surprises in store for you! Throughout the conference, we will be running a new demo that shows you how to gain unprecedented visibility throughout your organization.

We will be unveiling the new demo, along with a special announcement and a limited edition t-shirt on Tuesday, April 21st, at 11:15am in the Splunk booth (#3321). And by “special edition”, I really mean special edition! If you’re a fan of Splunk t-shirts, you won’t want to miss this. We will only have a limited supply on hand, and we will only have them on Tuesday!


Splunk at RSA

» Continue reading

.conf2014 Highlight Series: Operationalizing Advanced Threat Defense

UPDATE: .conf2015 registration is now open!
We’ve also opened up the .conf2015 call for papers and speakers.

As we get closer to .conf2015: The 6th Annual Splunk Worldwide Users’ Conference in Las Vegas in September, we’re excited to continue our series of .conf2014 #TBT highlights. This week we revisit Monzy Merza’s in-depth presentation focused on how to get the most out of the Splunk App for Enterprise Security.

Skill Level:
Solution Area:
Splunk App for Enterprise Security

Presentation overview:
Splunk’s Minister of Defense and security guru, Monzy Merza, shows how to use the Splunk App for Enterprise Security to detect, respond to and mitigate advanced malware through various phases of the threat’s lifecycle chain.


» Continue reading

CyberPatriot: Training Future Cyber and STEM Leaders

CyberPatriot_WLettersThis week is the finals for the CyberPatriot National Youth Cyber Defense Competition, a national contest that connects middle and high school students with cyber technologies. This competition is designed to spark interest in cybersecurity and other science, technology, engineering and mathematics (STEM) disciplines. CyberPatriot itself is a broader education program that was founded by the Air Force Association (AFA) in 2011, but the finals competition is what grabs headlines each year.

Students from across the country participate in the annual competition, beginning at the state and regional levels and progressing to the national finals at National Harbor just outside Washington, DC. Teams are equipped with resources to help them prepare for each round of the competition while being …

» Continue reading

Contextualize your data with threat intelligence information from Project Honey Pot

Greetings Splunk Ninjas,

this is my first blog post. I’m a Splunk EMEA specialist and work in the IT industry nearly 10 years. 7 of them with Software Vendors in the IT-Security space. I worked already with many large companies to improve their environments in many ways.

Some time ago I posted on Splunk Apps the IP Reputation App. I was inspired by the trend of various security vendors establishing reputation databases and including them in their products (next generation firewalls, AV’s etc). There is great value in having this information included in the Splunk platform to put machine data in context.

After two years on apps.splunk.com the app has had over 4,000 downloads so there is a lot of demand. The app performs lookups …

» Continue reading