Back to Search Begin New Search Save Search Auto-Notify
Use Splunk for Security Intelligence
Today's attackers realize that security teams can't see threats buried in credentialed user activities due to organizational data silos, data collection issues, scalability challenges, or a lack of analytics capabilities. They also have the time and resources to create attack scenarios that bypass security point products and traditional security information and event management (SIEM) systems. Register now for this complimentary webinar and se...
September 10, 2014
Organizer: Splunk Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Using Splunk for CDM: Supporting All Th...
Under the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) requirements, the level of visibility required to deliver risk intelligence, reporting, and other capabilities across all three phases of implementation will require vertical and horizontal integrations of numerous solutions. To successfully meet continuous monitoring capabilities requires a solution in the CDM tool portfolio that can aggregate,...
July 24, 2014
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Take a Big Data Approach to Discovering Fraud
Organizations including federal, state, and local government agencies continue to lose billions of dollars annually to fraud, draining siginificant resources and time as fraudulent activities become more sophisticated. View our on-demand webinar to discover how Splunk software is used to analyze and visualize 10s of terabytes of machine data in real time across multiple data types. Understanding what’s normal and what’s not through...
April 3, 2014
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Stalk Cyberattackers with Splunk
Today's attackers realize that security teams can't see threats buried in credentialed user activities due to organizational data silos, data collection issues, scalability challenges, or a lack of analytics capabilities. They also have the time and resources to create attack scenarios that bypass security point products and traditional security information and event management (SIEM) systems. Join us for this webcast to see a live demo of how...
March 5, 2014
Organizer: Splunk Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Search and Discover the Bad Guys in 60...
Splunk software lets you search and analyze all of the data your IT infrastructure generates from a single location in real time. Once your data is indexed by Splunk, you can begin to search through terabytes of machine data to investigate threats and identify outliers before systems are compromised. The Splunk Search Processing Language (SPL™) can provide valuable insight, even to the most advanced intrusion analyst. Join us for a webca...
December 11, 2013
Organizer: Splunk Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Search and Discover the Bad Guys in 60...
Search and Discover the Bad Guys in 60 Minutes or Less Splunk software lets you search and analyze all of the data your IT infrastructure generates from a single location in real time. Once your data is indexed by Splunk, you can begin to search through terabytes of machine data to investigate threats and identify outliers before systems are compromised. The Splunk Search Processing Language (SPL™) can provide valuable insight, even to t...
December 11, 2013
Organizer: Splunk Government
Location: Webcast
Add Favorite
Explore, Analyze, and Visualize Data in...
Many organizations store vast amounts of data in Hadoop. Yet trying to get value and insights out of this data has proven a challenge. Register for this webcast and see a live demo of how Splunk software makes raw unstructured data in Hadoop accessible, usable, and valuable. Hunk™: Splunk Analytics for Hadoop enables you to detect patterns and find anomalies across terabytes, petabytes, or more of raw data in Hadoop without specialized s...
November 20, 2013
Organizer: Splunk Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Collect, Search, and Analyze Your Log D...
How you manage the access and analysis of your logs, as well as other machine data, can affect the speed you are able to search and analyze this data to troubleshoot issues and investigate security threats.Register now to learn why more than 6,000 organizations, including hundreds of government agencies, use Splunk to better manage their datacenters, achieve higher availability, investigate security incidents faster, and meet compliance requir...
November 14, 2013
Organizer: Splunk Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Scaling Splunk on Converged Infrastruct...
Maintaining the perfect mix of server, storage, and application resources using traditional datacenter infrastructures is tough. Convergence and virtualization are driving forces in today's data centers. However, success is largely dependent upon an organization’s ability to scale in an elegant manner while maintaining an accurate picture of how the network is reacting to the changes. Using the proven design principles of companies like...
October 30, 2013
Organizer: Splunk Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
How is the Health of Your Systems? Find...
With a myriad of siloed tools monitoring your application and infrastructure components, it's a challenge to find the root cause of issues impacting end-users. This results in increased resolution times, higher operational costs, increased inefficiencies, and lower user satisfaction. Join us for a webinar and live demo to see how Splunk enables your operations teams to troubleshoot, monitor, analyze, and optimize your applications and infrastr...
October 29, 2013
Organizer: Splunk Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Back to Search Begin New Search