Get ready for Infosecurity Europe 2016!

Hello,

Infosec 2016It’s time to get ready for the 21st edition of Infosecurity Europe 2016, taking place between the 7th – 9th June at Olympia in London. Infosecurity is Europe’s number one information security event, featuring the largest and most comprehensive education program available, with over 315 exhibitors showcasing the most diverse range of products and services to over 12,000 visitors.

Splunk will be onsite in force at Infosecurity – with several speaking sessions as well as an interactive workshop focused on cloud security. Make sure you prepare early to avoid missing some of our great content at the show! Register today for free entrance (save £35).

Splunk Booth Stand C20 + Theater Presentations

Splunk_at_Infosec

First of all – visit the Splunk stand to get your …

» Continue reading

Webinar recap: Learn How Equinix Uses Splunk as a Cloud-Based SIEM

equinixCustomer led webinars are always an eye opener and the recent Splunk webinar “Learn How Equinix Uses Splunk as a Cloud-Based SIEM” on March 31, 2016, was no exception.

George Do, CISO @ Equinix, discussed Equinix’s InfoSec drivers, Equinix’s vision for “SIEM in the Cloud” and provided detailed information on how Equinix is using Splunk Cloud and Splunk Enterprise Security to solve a wide range of security use cases and its value to Equinix.

The webinar was attended by Splunk customers and as well as non-customers. 98% of the poll respondents used a SIEM reflecting the wide-spread adoption of SIEM. 63% of the customers’ supported 10 SaaS applications and more than 32% of the customers supported 50 …

» Continue reading

Webinar: Learn How Equinix Uses Splunk as a Cloud-Based SIEM

equinix

We understand enterprise security teams have to deal with various challenges around threat detection, threat response and threat mitigation. A few years back, security solutions that merely reported and monitored security logs and events were considered good enough. But with the complex and changing threat landscape, the above legacy approaches lack the breadth and depth required to provide a comprehensive security solution. In addition to this, you also need broader insights from all data sources generated at scale across on-prem and hybrid environments.

Our cloud-based SIEM solution helps you to overcome the above challenges and realize value right out of the box with the help of pre-built dashboards, reports, incident response workflows, analytics, correlation searches and security indicators that simplify …

» Continue reading

The Value of Hybrid Highlighted as Splunk is Honored by SC Magazine Awards

Every organization has a cloud strategy. It’s a journey, but the destination is clear. And, it’s my experience that regardless of what mile marker organizations have just passed on the road to cloud, they’re likely operating a hybrid environment. This means they are running solutions both on-premises and in the cloud. To support this strategy, we offer hybrid delivery options – supporting both on-premises and cloud solutions – one of the differentiated values we provide our Splunk customers.

And today, I’m excited to share that our differentiated value just got a big boost asSCMagazineAwards2 Splunk Enterprise won a Trust award for “Best Fraud Prevention Solution” and Splunk Enterprise Security won a Trust award for “Best SIEM Solution” from SC …

» Continue reading

Splunk Security Takes Double Honors at SC Magazine 2016 Awards

Screen Shot 2016-03-09 at 6.42.49 AMLast week I was fortunate enough to accept not just one award, but two awards, on behalf of Splunk at the SC Magazine 2016 Awards in San Francisco. We were honored to be nominated among the other nominees in each category and were thrilled when Splunk Enterprise won a Trust award for “Best Fraud Prevention Solution” and Splunk Enterprise Security won a Trust award for “Best SIEM Solution”.

The awards reflect the value that you, our users and customers, get from our software. When thousands of users and customers across the globe sing the praises of Splunk and how it helps them detect and defeat cyber threats and fraudsters, the awards and accolades tend to follow!

One key observation I had …

» Continue reading

Splunk Selected as Jabil’s Global Security Nerve Center

Jabil_50We know how important the ability to quickly detect, investigate and respond to security threats is in protecting the organization from cyberattacks. We also know that investing in security solutions is a careful and meticulous process. This is why we’re honored that global manufacturing services company, Jabil Circuit, Inc., has selected Splunk Enterprise Security (ES) as its global security nerve center and expanded its use of Splunk Enterprise for IT Operations across its global infrastructure.

With more than 100 facilities in 28 countries – and more than 180,000 employees, Jabil has been using Splunk Enterprise for a number of years to monitor the health of those global networks. Adopting Splunk ES as the security nerve center at Jabil was …

» Continue reading

SplunkLive Stockholm 2015. IKEA, Statnett and Klarna

A couple of weeks ago, I was in one my favourite cities for SplunkLive Stockholm. We had a couple of hundred people in one of the most impressive rooms we’ve ever had a SplunkLive in. It felt more like the setting of Romeo and Juliet (as far as I know, there weren’t any declarations of undying love – not even for machine data).

Stockholm2

This year we were very happy to have Statnett, Klarna and IKEA presenting on how they use Splunk.

 

Statnett 

Statnett own, build and maintain the Norwegian power grid and “make sure the lights are on in Norway”. We had Linus from Statnett talking about how they “monitor all the things” using Splunk and how this feeds into their …

» Continue reading

Splunk Named a Leader in Gartner SIEM Magic Quadrant for the Third Straight Year

The Splunk security portfolio, including Splunk® Enterprise and the Splunk App for Enterprise Security, solves Security Information and Event Management (SIEM) requirements to dramatically improve the detection, response and recovery from advanced threats by providing broad security intelligence from data that is collected across IT, the business, and the cloud. Based on the need to protect against advanced threats, a growing number of organizations are using Splunk security analytics to augment, replace and go beyond their legacy SIEM deployments.

gartner-2015-blog-img-470x246

This week, Gartner published the 2015 version of its annual Magic Quadrant for Security Information and Event Management. In the report, Splunk was named a leader for the third straight year.

The results of the 2015 Gartner SIEM Magic …

» Continue reading

Accelerate the Detection of Advanced Threats and Malicious Insiders

Cyber threats are becoming increasingly sophisticated, employing multiple attack vectors and utilizing legitimate ports to exfiltrate sensitive company information. These threats often sit undetected on infected systems for months while modifying, viewing, and stealing your data. And unfortunately, finding them is only part of the battle. To effectively remediate them can require days or weeks of investigation from the security team to trace back through the kill chain to determine the source of the infection, the path it employed, and the actions it took. Of course, this is of concern on multiple fronts; not only does the infection remain for a longer period of time, but the cost of remediation can become significant in its own right.

Similarly, malicious insiders …

» Continue reading

Splunk and The Top 10 CIO Priorities for State and Local Goverment

On November 5, 2013, National Association of State Chief Information Officers (NASCIO) released a member service document representing the top 10 state CIO priorities for 2014. The list presents no surprises as state CIOs try to do more with less extracting the most value out of every dollar, providing constituent services, protecting customer data and preventing data breaches.  The list is almost a mirror image of the benefits our customers are seeing with Splunk. I won’t go through the whole list but lets look at the top three.

Security is the number one priority for state CIOs in 2014:

“Security: risk assessment, governance, budget and resource requirements, security frameworks, data protection, training and awareness, insider threats, third party security

» Continue reading