Splunk Inc. provides the leading software platform for real-time Operational Intelligence. Splunk® software and cloud services enable organizations to search, monitor, analyze, and visualize machine-generated big data coming from websites, applications, servers, networks, sensors, and mobile devices. More than 7,400 enterprises, government agencies, universities, and service providers in over 90 countries use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, prevent fraud, improve service performance, and reduce cost. Splunk products include Splunk® Enterprise, Splunk Cloud™, Splunk Storm®, Hunk™, and premium Splunk Apps. To learn more, please visit https://www.splunk.com/company.
Splunk Enterprise is the industry-leading platform for operational intelligence. It’s the easy, fast, and secure way to analyze the massive streams of machine data generated by your IT systems and technology infrastructure—physical, virtual, and in the cloud.
Hunk™: Splunk Analytics for Hadoop is a full-featured platform for rapidly exploring, analyzing, and visualizing data in Hadoop. Hunk works on Apache Hadoop and most major Hadoop distributions, including first-generation MapReduce and YARN.
Splunk Cloud delivers all the capabilities of the award-winning Splunk Enterprise software, now as a service. It provides an easy and fast way to analyze the massive streams of machine data generated by your IT systems and applications, wherever they are deployed— on-premises, in virtualized environments, or in the cloud.
with Carahsoft's Splunk-Certified Demo Jocks
So you've heard about Splunk because everyone is talking about it. But what in the world is it,
and what does it have to do with you?
Our Splunk Demo Jocks get it. And they can help. Come get a high level overview of what you can do with Splunk and our partner technologies, including a chance to see the tool in action in situations ranging from IT operations, to security, to the Internet of Things (IoT), and beyond.
Don't worry. We know you've only got so much time, so our Demo Desk sessions are only 30 minutes long, and they're virtual so you don't even need to worry about travel. Unless you count getting up for a cup of coffee.
If you have any questions or comments, feel free to contact the Splunk Demo Jocks at Carahsoft by email at firstname.lastname@example.org.
Carahsoft has partnered with several Splunk technology partners to provide a robust ecosystem of complementary solutions for Splunk’s operational intelligence platform.
These solutions address an expansive range of ready-to-use applications, including optimized data collection, security monitoring, IT management and more, and will continue to grow as Carahsoft’s Splunk Partner portfolio expands. A full list of Solution Providers and their specialties can be found below.
For more information contact:Splunk Technology Alliance Partner Team
Corelight transforms raw network traffic into comprehensive, organized network logs with the use of open source Bro (now 'Zeek'). Founded and maintained by the creators of Bro, Corelight provides actionable insights into security events by assembling raw, disparate network data into over 400 protocol-based fields for correlation and analysis in a SIEM tool.
Expanse is a SaaS company that continuously discovers, tracks, and monitors the dynamic global Internet Edge for the world’s largest organizations. In addition, Expanse is the first company to deliver off-premise analysis of network edge communications to identify customer systems that are making risky connections to out-of-policy services on the public Internet
Security operations teams are drowning in machine data and strapped for people who can make sense of the signals coming from it. In today’s rapidly evolving threat landscape, quickly drawing actionable insights from the data is the key to reducing risk. Cyber Security Investigator (CSI) for Splunk enables your analysts at any level to harness the power of natural language search, be significantly more productive, and think strategically, as they investigate complex data.
Qmulos Apps, powered by Splunk, are the only compliance solutions architected to foster a continuous monitoring mindset to the compliance problem. Our security expertise led us to focus our solution on security-relevant machine state data, as well as other required audit evidence types. Our key execs have decades of proven compliance, cyber, and security research experience. Our company is a ISV (TAP) and Professional Services Partner of Splunk.
>rapid response is a new app built by Optensity for use with Splunk alerts. >rapid response lets you turn Splunk’s operational intelligence into direct action in real-time. Rely on >rapid response to ensure fast, repeatable execution of your critical IT operations, security, compliance and application delivery strategies.
SwiftStack provides cloud-native, software-defined storage for unstructured data in a single namespace, powered by policies to extend enterprise workflows across private and public cloud infrastructure. Verified by Splunk, and proven to be fully compatible with Splunk SmartStore, SwiftStack is the only storage option that can be built on the same server platform as Spunk indexers, helping to simplify operations and management of disparate data sets.
Syncsort Ironstream makes it simple to securely process mainframe log or “machine” data into big data analytics platforms and into applications like Splunk® Enterprise, Splunk Enterprise Security, Splunk IT Service Intelligence, and Splunk Cloud, enabling Operational Intelligence for security, IT and the business based on all the relevant machine data in the enterprise. Thousands of customers in more than 85 countries, including 87 of the Fortune 100, have trusted Syncsort to move and transform mission-critical data and workloads for nearly 50 years and Syncsort has been the go-to mainframe access provider for real-time streaming of SMF and other mainframe logs into the Splunk platform since 2014.
Check out the Workshops tab to learn about our Splunk hands-on workshops around Splunk Enterprise, IT Service Intelligence, and Enterprise Security.
SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC