Full-Scale Operational Intelligence Through CDM
In the face of high-profile breaches and increasingly sophisticated hackers, the Federal Government’s Continuous Diagnostics and Mitigation (CDM) program is one of the most important and widely discussed cybersecurity initiatives in recent history.
Did you know that Splunk Enterprise will be used at 25 of the largest civilian departments and agencies covering 97% of the federal civilian government workforce?
On Wednesday, May 11, I spoke at the Face-to-Face Cybersecurity CDM event hosted by FCW to discuss how Splunk’s solutions and government’s CDM program fit together. As Nick Murray noted in a recent blog post, the CDM program makes tools and services available to agencies via a government wide contract to help them identify cybersecurity risks on an ongoing basis, prioritize …
AWS Agility + Splunk Visibility = Customer Success
If you’ve ever wondered how Splunk and AWS work together to drive customer success in the cloud, hear it directly from AWS CEO Andy Jassy and Splunk CEO Doug Merritt in this new 4-minute video:
What’s best is that this message is not just coming from Andy and Doug – so many of our joint customers have publicly shared the value they gain using Splunk and AWS together:
- Autodesk has gained critical security and operational insights.
- Coca-Cola North America engaged in a digital marketing transformation.
- EnerNOC succeeded with DevOps on AWS.
- FINRA gained security and operational insights, as well as real-time cost management where they are saving over 50% on select AWS workloads.
What’s our “secret sauce”? It’s simple… customer …
The 4-minute mile challenge and securely moving to the Cloud
As a runner, I am always fascinated by Dr. Roger Bannister’s achievement of shattering the 4-minute barrier to run a mile. Even though, I was not around to witness this landmark feat, the 4-minute barrier holds a special significance.
Splunk is excited to share with you a new interactive, sub 4-minute video, in which Splunk’s Senior Vice President of Security Markets, Haiyan Song, takes you on a journey to discover how cloud-based SIEM services can cut costs, help security teams reduce remediation cycle times, and demonstrate regulatory compliance, without the hassle of setting up and managing complex hardware.
Within this interactive video, you can access additional customer videos, peruse white papers, listen to a webinar and much more!
Technology to Protect Your Technology
If it hasn’t happened to you yet, it probably will. That moment when you instinctively check your online bank account only to discover several very recent ATM withdrawals you never made. In fact, you couldn’t have physically made them. The withdrawals were too close together in time, too far apart in distance. You call the bank and learn that they do have protective security measures in place, but the system hadn’t yet flagged the transactions as fraud. You’re relieved. You’ll get your money back. But, you’re discouraged that you discovered the fraud before the bank’s technology did.
According to a 2013 Forrester Report, online fraud costs merchants $200-250 billion per year and financial institutions $12-15 billion.
At Splunk, our lifeblood …
Splunk Enterprise 6.3 – Shaking It Up!
The crowd shook their cell phones while the new HTTP Event Collector sent the data from every device to a central console that tracked the motion, mapped the results, and eventually fired a cannon using the new Custom Alert Action feature integrated into a Citrix Octoblu device controller.
It was a fun way to highlight several cool new features of 6.3:
The HTTP Event Collector directly onboards data from applications, DevOps and IoT devices in real-time, scaling to millions of events per second. Developers can use a standard HTTP/JSON API or logging libraries. Those that are using …
Splunk at Infosecurity Europe 2015
A few weeks ago Splunk attended the Infosec conference in London. It was a busy event full of great security gurus on a mission to protect their environment with state of the art defences.
Enterprise Security 3.3
Security experts got to see live demos at the Splunk booth of the Splunk Enterprise platform as well as key apps including the Splunk App for Enterprise Security, PaloAlto, Fireye, Cisco Security and many more. They learned how to quickly identify, investigate, and respond to internal and external threats throughout their organization. Attendees of the conference were particularly interested in the STIX/TAXII and OpenIOC integration. If you want to learn more – here are some resources:
Bright Talk – What keeps …
ESG Report: An Analytics-based Approach to Cybersecurity
In their report, “An Analytics-based Approach to Cybersecurity,” Enterprise Strategy Group explains why organizations continue to experience costly data breaches and how some lack the right cybersecurity strategies, skills, processes, and technologies needed to best tackle cyberattacks. The report highlights two key areas of weakness – incident response and limitations of legacy SIEM solutions.
Incident response is a simple concept yet many companies felt they were weak in capabilities such as performing root cause analysis, scoping an outbreak to contain and remediate the infection and then determining how to prevent similar attacks in the future. This means that any attack that gets into the organization will have a good change to persist within that organization, and once the …
.conf2014 Highlight Series: Getting Deeper Insights into your Virtualization and Storage with Splunk
As we get closer to .conf2015: The 6th Annual Splunk Worldwide Users’ Conference in Las Vegas in September, we’re excited to continue our series of .conf2014 #TBT highlights. This week we revisit Stela Udovicic and Michael Donnelly’s presentation focused on Splunk insights into virtualization and storage.
Good for all skill levels
IT Operations, Application Management
Virtualization and storage technologies go hand-in-hand. If performing poorly, they can have a serious impact on your applications’ performance and users’ experience. This presentation shows how Splunk can help you get unified visibility …
Splunk at Ubisoft: Play on, player!
One of my all-time favorite Seinfeld episodes is the one where George will do anything to maintain his top score status on Frogger. But power supply and traffic get in the way – literally. Fast forward to today, and you have the same roadblocks, with different names — downtime and latency.
The Online Technology Group at Ubisoft (which makes popular games like Assassin’s Creed and Far Cry) uses Splunk Enterprise to help them monitor how Ubisoft game developers use their API to call various services, so they can identify the applications that are running slowly. The visibility that Splunk provides enables the Online Technology Group to identify and fix issues more quickly, enabling the game developers to deliver a better …
Splunk at TiVo: Watch your favorite shows when you want to
This is a familiar refrain in my home: “What’s on TV? Nothing? Ok, what about Netflix? Or Hulu? Have you seen the latest on Amazon Prime?” If you’re like me, you’d go to each service and search through each programming guide until you found a program you like. Or, you could use TiVo and search across all of the programming guides at once, saving yourself lots of time and trouble switching from one service to another.
For TiVo, this search capability – as well as other TiVo features — is critical to providing a seamless user experience for their 5M+ customers worldwide. Not just on TVs, but on tablets and smartphones too!
TiVo uses Splunk to monitor the uptime …