Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.
Auditing Your Data for Insider Threats with Splunk
Data generated by applications and servers, inside or outside a department or agency, can play a significant role in determining anomalous employee behaviors. In some cases, the motivational context for those behaviors can signify an insider threat. Knowing the difference between willful acts and innocent mistakes requires understanding when user activity is abnormal in the broader context of employee behavior.
Register now and see a live demo of how agencies can use Splunk to gain a holistic view of insider activity and investigate abnormal usage patterns in the enterprise. Splunk makes the monitoring and investigation of insider threats a seamless process across time and data types.
This presentation and demo will cover:
Interested but cannot attend at this time? Sign up now to receive a recording of the presentation after the event.
For more information, please contact:
Jordan Ellison
Splunk Government at
Carahsoft Technology Corp.
703-889-9803 (Direct)
855-3-SPLUNK (Toll-Free)
jordan.ellison@carahsoft.com
www.carahsoft.com/splunk
SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? ORDER BY FeaturedBit DESC, Type ASC