Unlocking Data to Drive Smarter and Saf...
*Please note: this is for SOFIC attendees only Organizations spend billions annually on technology to ensure visibility, control, and security over servers, workstations, firewalls, and other IT assets. But data that powers the most costly, critical, and longest-lived defense assets goes largely uncaptured and unknown. Shouldn't you have at least the same observability into a $100M weapon system as you do for a $500 laptop? Planes, tanks, and...
Splunk for Water & Utilities Security
The OT Security add-on for Splunk enables organizations that operate assets, networks, and facilities across both IT and OT environments to better apply the globally proven SIEM, Splunk Enterprise Security, to improve threat detection, incident investigation, and response. The OT Security add-on for Splunk expands the capabilities of Splunk's platform to monitor for threats and attacks, compliance, incident investigation, forensics, and incide...
Maximize IT Operations Observability wi...
Splunk's powerful IT operations analytics platform helps you optimize the performance and availability of IT systems and applications while controlling IT costs and resources. However, IBM i systems have been left out of most Splunk environments because the machine data they generate is unique and requires specialized skills to work with.Ironstream collects and feeds IBM i log data to Splunk, ensuring a true 360-degree view of your IT landscap...
OMB M-21-31: Essential Insights for Fin...
In August 2021, the Office of Management and Budget released a memo that outlined the requirements for section 8 of Executive Order 14028, Improving the Nation's Cybersecurity. The memo outlines the requirements for each federal agency to collect, retain, and manage logs with a focus on centralized access and visibility for the Security Operations Center (SOC) of each agency. With the upcoming EL1 deadline, learn how to help your agency meet t...
Unlocking Data to Drive Smarter and Saf...
Organizations spend billions annually on technology to ensure visibility, control, and security over servers, workstations, firewalls, and other IT assets. But data that powers the most costly, critical, and longest-lived defense assets goes largely uncaptured and unknown. Shouldn't you have at least the same observability into a $100M weapon system as you do for a $500 laptop? Planes, tanks, and other weapon systems are composed of thousands...
Free Apps for Federal Systems Integrato...
View this on-demand webinar where we go over how members of the Federal Systems Integrator community can leverage FREE Splunk applications to get the most out of your Splunk instance. Our Splunk experts walk you through 3 of our complimentary applications that will allow you to better take advantage of Splunk's ability to ingest, analyze, and alert on metrics and event data to improve operations advantage and increase efficiency. During this o...
Connecting Splunk to Industrial Data an...
Disparate and deployed industrial assets and connected devices can provide the enterprise a unique touchpoint to real-world operations and conditions. But the collection, storage, and insight of the machine data generated by the Operational Technology (OT) and the Internet of Things (IoT) can be a challenge. Splunk software collects, analyzes, and visualizes real-time historical machine data from any source including operational technology, co...
Splunk & Zscaler for Security
The perimeter is what keeps attackers out of your systems, but with users, applications, and data moving outside of traditional boundaries the perimeter can no longer be tied to a single layer of security. In today's working environment, where employees are connecting from anywhere at any time, controlling that access is now more critical than ever. Join Splunk and Zscaler in this on-demand webinar as they share how a tightly integrated cloud...
Combat RMF & Compliance Challenges with...
Splunk helps defense agencies monitor and assess their systems for RMF compliance by automating the gathering, analysis, and reporting of system data relevant to RMF control families. Attendees joined us for a complimentary virtual workshop where attendees learned specific ways Splunk helps embrace RMF such as: Continuous monitoring of security controls and their effectiveness Audit trail collection and reporting Helping determine the acceptab...
Security Programs that Thrive in Econom...
As the world braces for a possible recession, companies are already beginning to tighten their belts and restrict spending in security departments. Yet, if 2021 and the explosion of ransomware, new nation-state-sponsored security attacks, and the skyrocketing cyber insurance premiums taught us anything, it is that security programs must continue to improve in order to stand a chance at meeting today’s cybersecurity challenges. In this pr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.