Event Date: June 10, 2020
Hosted By: Splunk & Carahsoft
Join Splunk and Carahsoft for our Zero to Hero virtual workshop hosted by our SE team with Splunk 101. Splunk 101 sessions are a great opportunity for you to discover the value of Splunk hands-on in a matter of hours. Attendees will be tasked with creating some Splunk dashboards in their own Splunk instance based on web server logs.
We will walk through a series of exercises designed to get someone new to Splunk to the point where they understand what Splunk is and what it is capable of. During the session, you will learn how to:
Configure Splunk to collect and index sample log files
Today’s datacenter has evolved and IT environments are now more complex than ever – so don’t let your IT management and monitoring tools leave you behind. With Splunk for IT Operations, you get end-to-end visibility across IT infrastructure to fix problems faster.
Any government agency, whether it is a civilian, defense or
intelligence agency, depends on information technology to
help support data integrity, reduce mission risk and ensure the
confidentiality and availability of information.
In response to these needs, NIST published its Risk Management
The rapid pace of virtualization adoption in the datacenter creates
challenges for virtualization administrators. IT professionals
have limited operational visibility into their virtual infrastructure,
inadequate control over performance and security of virtual
machines, insufficient insights in...
Targeted attacks — including advanced persistent threats (APTs) — and the new generation of malware they employ are among the greatest security challenges facing today’s enterprises. Traditional security technologies are unable to reliably identify such threats in the first place, leading to h...
The cyberthreat landscape is rapidly changing. As attacks continue to increase in volume and sophistication, agency defenses must also evolve.In order to do so, many agencies are moving toward a more holistic, analytics-driven approach to security. By gaining an end-to-end view of what's happening i...
Security operations teams are drowning in machine data and strapped for people who can make sense of the signals coming from it. In today's rapidly evolving threat landscape, quickly drawing actionable insights from the data is the key to reducing risk.