Search and Discover the Bad Guys in 60 Minutes or Less



Search and Discover the Bad Guys in 60 Minutes or Less

Splunk software lets you search and analyze all of the data your IT infrastructure generates from a single location in real time. Once your data is indexed by Splunk, you can begin to search through terabytes of machine data to investigate threats and identify outliers before systems are compromised. The Splunk Search Processing Language (SPL™) can provide valuable insight, even to the most advanced intrusion analyst.

Join us for a webcast to discuss how to apply incident response and intrusion analytics concepts to your data and leverage Splunk to find misbehaving hosts, suspicious systems and users, and other elements you should know about.

During this webcast you will learn how to:

  • Apply analytics to your data for intrusion detection, event correlation, and management
  • Perform complex searches to interactively explore your data across large, diverse data sets
  • Find known risk patterns such as brute force attacks, data leakage, and application-level fraud
  • Validate the consistency of your network infrastructure, identify users who are up to no good, and find the bad guys who lurk in those hard to reach places

Interested but cannot attend at this time? Click here to register for future access to the archived recording.

Janelle Rohrer
Splunk Government at
Carahsoft Technology Corp.
703-230-7584 (Direct)
855-3-SPLUNK (Toll-Free)

janelle.rohrer@carahsoft.com

www.carahsoft.com/splunk


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Wed, Dec 11, 2013, 2:00pm - 3:00pm


Cost

Complimentary:  $0.00


Where
Webcast


Website
Click here to visit event website


Organizer
Splunk Government


Contact Event Organizer



Return to search results