You Bet Your Sweet SaaS, AWS will be at #splunkconf16!
The following is a guest blog post by David Potes, AWS Solutions Architect:
The end of September is one of my favorite times of the year, and not just because it’s finally Summer in San Francisco. It’s the time we attend Splunk .conf to talk about all of the things you can do with Amazon Web Services (AWS) and Splunk.
Here are a few .conf sessions highlighting the strong partnership between AWS and Splunk:
- If you’re looking to learn how Adobe built a security monitoring system across hundreds of accounts, there’s a session for you.
- Be sure to also check out how Experian migrated and monitored their 3-tier web application on AWS as well as how a university research department
#splunkconf16 preview: Cisco + Splunk Drive Informed Decisions Across the Business
Cisco and Spunk’s 8-year relationship reached a new peak this spring when Cisco recognized Splunk as it’s Global ISV Partner of the Year. Cisco Vice President Todd Meister recently shared his view on the breadth and power of our strategic relationship in this 3 minute video:
Together, Splunk and Cisco are delivering significant value for thousands of organizations around the globe including Cisco’s own IT, CSIRT, and other internal teams.
“Together, Cisco and Splunk are far more relevant to our customers than we are individually … I strongly believe the Splunk and Cisco alliance is one of the most exciting collaborations happening today.”
– Todd Meister, Vice President, US Partner Organization, Americas Partner Organization, Cisco
But wait …
Full-Scale Operational Intelligence Through CDM
In the face of high-profile breaches and increasingly sophisticated hackers, the Federal Government’s Continuous Diagnostics and Mitigation (CDM) program is one of the most important and widely discussed cybersecurity initiatives in recent history.
Did you know that Splunk Enterprise will be used at 25 of the largest civilian departments and agencies covering 97% of the federal civilian government workforce?
On Wednesday, May 11, I spoke at the Face-to-Face Cybersecurity CDM event hosted by FCW to discuss how Splunk’s solutions and government’s CDM program fit together. As Nick Murray noted in a recent blog post, the CDM program makes tools and services available to agencies via a government wide contract to help them identify cybersecurity risks on an ongoing basis, prioritize …
AWS Agility + Splunk Visibility = Customer Success
If you’ve ever wondered how Splunk and AWS work together to drive customer success in the cloud, hear it directly from AWS CEO Andy Jassy and Splunk CEO Doug Merritt in this new 4-minute video:
What’s best is that this message is not just coming from Andy and Doug – so many of our joint customers have publicly shared the value they gain using Splunk and AWS together:
- Autodesk has gained critical security and operational insights.
- Coca-Cola North America engaged in a digital marketing transformation.
- EnerNOC succeeded with DevOps on AWS.
- FINRA gained security and operational insights, as well as real-time cost management where they are saving over 50% on select AWS workloads.
What’s our “secret sauce”? It’s simple… customer …
The 4-minute mile challenge and securely moving to the Cloud
As a runner, I am always fascinated by Dr. Roger Bannister’s achievement of shattering the 4-minute barrier to run a mile. Even though, I was not around to witness this landmark feat, the 4-minute barrier holds a special significance.
Splunk is excited to share with you a new interactive, sub 4-minute video, in which Splunk’s Senior Vice President of Security Markets, Haiyan Song, takes you on a journey to discover how cloud-based SIEM services can cut costs, help security teams reduce remediation cycle times, and demonstrate regulatory compliance, without the hassle of setting up and managing complex hardware.
Within this interactive video, you can access additional customer videos, peruse white papers, listen to a webinar and much more!
Technology to Protect Your Technology
If it hasn’t happened to you yet, it probably will. That moment when you instinctively check your online bank account only to discover several very recent ATM withdrawals you never made. In fact, you couldn’t have physically made them. The withdrawals were too close together in time, too far apart in distance. You call the bank and learn that they do have protective security measures in place, but the system hadn’t yet flagged the transactions as fraud. You’re relieved. You’ll get your money back. But, you’re discouraged that you discovered the fraud before the bank’s technology did.
According to a 2013 Forrester Report, online fraud costs merchants $200-250 billion per year and financial institutions $12-15 billion.
At Splunk, our lifeblood …
Splunk Enterprise 6.3 – Shaking It Up!
The crowd shook their cell phones while the new HTTP Event Collector sent the data from every device to a central console that tracked the motion, mapped the results, and eventually fired a cannon using the new Custom Alert Action feature integrated into a Citrix Octoblu device controller.
It was a fun way to highlight several cool new features of 6.3:
The HTTP Event Collector directly onboards data from applications, DevOps and IoT devices in real-time, scaling to millions of events per second. Developers can use a standard HTTP/JSON API or logging libraries. Those that are using …
Splunk at Infosecurity Europe 2015
A few weeks ago Splunk attended the Infosec conference in London. It was a busy event full of great security gurus on a mission to protect their environment with state of the art defences.
Enterprise Security 3.3
Security experts got to see live demos at the Splunk booth of the Splunk Enterprise platform as well as key apps including the Splunk App for Enterprise Security, PaloAlto, Fireye, Cisco Security and many more. They learned how to quickly identify, investigate, and respond to internal and external threats throughout their organization. Attendees of the conference were particularly interested in the STIX/TAXII and OpenIOC integration. If you want to learn more – here are some resources:
Bright Talk – What keeps …
ESG Report: An Analytics-based Approach to Cybersecurity
In their report, “An Analytics-based Approach to Cybersecurity,” Enterprise Strategy Group explains why organizations continue to experience costly data breaches and how some lack the right cybersecurity strategies, skills, processes, and technologies needed to best tackle cyberattacks. The report highlights two key areas of weakness – incident response and limitations of legacy SIEM solutions.
Incident response is a simple concept yet many companies felt they were weak in capabilities such as performing root cause analysis, scoping an outbreak to contain and remediate the infection and then determining how to prevent similar attacks in the future. This means that any attack that gets into the organization will have a good change to persist within that organization, and once the …
.conf2014 Highlight Series: Getting Deeper Insights into your Virtualization and Storage with Splunk
As we get closer to .conf2015: The 6th Annual Splunk Worldwide Users’ Conference in Las Vegas in September, we’re excited to continue our series of .conf2014 #TBT highlights. This week we revisit Stela Udovicic and Michael Donnelly’s presentation focused on Splunk insights into virtualization and storage.
Good for all skill levels
IT Operations, Application Management
Virtualization and storage technologies go hand-in-hand. If performing poorly, they can have a serious impact on your applications’ performance and users’ experience. This presentation shows how Splunk can help you get unified visibility …