Financial services organizations face an impossible security equation: maintain 99.9% uptime while defending against sophisticated attacks. With 78% of security tools disconnected and over 50% of financial firms experiencing major breaches, the solution isn't more point tools—it's integrated platforms. Discover how AppDynamics, Cisco Secure Application, Splunk Enterprise Security, and SOAR work together to transform reactive security into proactive defense for financial institutions.
moreSplunk Enterprise Security (ES) continues to be a leader in the Gartner Magic Quadrant, reflecting its pivotal role in modern security operations. Since the release of version 8, ES has delivered a revitalized user interface through Mission Control and in
... moreLearn how financial institutions are building unified security from development to SOC operations using AppDynamics, Cisco Secure Application, and Splunk Enterprise Security. This integrated approach eliminates security silos by embedding vulnerability intelligence directly into developer workflows while providing security teams with rich context for faster threat response. See how one platform integration addresses regulatory compliance, business continuity, and advanced threat protection challenges specific to financial services.
moreReady to build, code, and connect? The Splunk App Platform Developer experience at .conf25 is bigger and better than ever. Head to the Builder Bar in the Pavillion showfloor to learn about the latest tooling, get hands-on support, and connect with peers. Join the Splunk Developer Program and don’t miss these other key developer sessions at .conf25. Whether you're scaling solutions or squashing bugs, there's something here for every kind of builder. Get the inside scoop on what not to miss.
moreAre you ready to take your threat hunting skills to the next level? As Splunk community members, you know the power of digging deeper—finding threats that fly under the radar of automated tools. But getting started with threat hunting can feel overwhelming with so many techniques and paths to choose from.
moreThis month, we're diving into some brilliant community-driven fixes that simplify life for security practitioners, straight from the trenches of Splunk Answers.
Would you like to feature more solutions like this? Reach out @Anam Siddique on Slack in our Splunk Community Slack workspace to highlight your question, answer, or tip in an upcoming Community Content post! 💡 Our contributors who are highlighted for providing a solution will be given a $25 Cisco Store gift card for their contributions.
moreStay ahead of the curve and in the know with our comprehensive list of upcoming Tech Talks, Community Office Hours, and webinars. From insightful discussions to hands-on workshops, there’s something for everyone eager to dive deeper and learn. Don’t miss out — mark your calendars now!
more.conf25 is almost here, and if you're on the Security Learning Path, this is your moment to level up. Whether you’re just getting started or deep in the weeds of detection engineering, this year’s conference is packed with content designed to help you sharpen your skills, modernize your SOC, and stay ahead of evolving threats.
more
Stay ahead of the curve and in the know with our comprehensive list of upcoming Tech Talks, Community Office Hours, and webinars. From insightful discussions to hands-on workshops, there’s something for everyone eager to dive deeper and learn. Don’t miss out — mark your calendars now!
moreStay ahead of the curve and in the know with our comprehensive list of upcoming Tech Talks, Community Office Hours, and webinars. From insightful discussions to hands-on workshops, there’s something for everyone eager to dive deeper and learn. Don’t miss out — mark your calendars now!
moreWhen a fraudster spreads activity across multiple channels, they can fly under the radar of traditional detection systems. In this final part of our fraud detection series, I break down a real case where a bank caught a coordinated fraud scheme by connecting web traffic and account creation data that seemed innocuous when viewed separately. Find out how they used Splunk to spot the shared password that exposed the entire operation—and stopped a $250k loss before it happened.
moreBrute force attacks are evolving beyond single-account targeting to coordinated, distributed campaigns that fly under traditional security radar. In this second installment of our fraud detection series, we examine how one financial institution used Splunk to uncover and halt a sophisticated attack targeting dozens of high-value accounts. Learn how connecting authentication data across accounts revealed attack patterns that would have remained invisible to conventional security tools, potentially preventing over a million dollars in losses.
moreThe Splunk Developer Program is now live in public preview! Access centralized tools, resources and community support to build innovative apps on Splunk. Learn more at preview.dev.splunk.com
moreIn today’s evolving threat landscape, we understand you’re constantly bombarded with phishing and malware threats. You can say goodbye to manually analyzing phishing and malware threats with Splunk Attack Analyzer. Join us on May 13 for the Splunk Attack Analyzer Hands-on Workshop to see it in action. Our expert, Laura Blystone, will guide you through applying automated threat analysis to real-world attack scenarios.
Discover how advanced analytics uncovered a fraudster using a simple Gmail trick to open 17 seemingly unrelated bank accounts. This case study reveals how Splunk's fraud detection capabilities connected the dots across multiple accounts, preventing $425,000 in immediate losses an potentially saving the bank over $2,000,000. See how email normalization and visual analytics transformed fraud investigation from looking at individual accounts to spotting sophisticated patterns.
moreStay ahead of the curve and in the know with our comprehensive list of upcoming April Tech Talks, Community Office Hours, and webinars. From insightful discussions to hands-on workshops, there’s something for everyone eager to dive deeper and learn. Don’t miss out — mark your calendars now!
moreJoin us for the “Automation for the SOC of the Future Hands-on Workshop” on April 10th to experience Splunk SOAR firsthand and see how easy it can pair to work with Splunk Enterprise Security. We have the amazing Solution Engineer, Amin Hamidi, walk you through the process of responding to incidents, automating the process, and standard operating procedures with a real-world scenario in 90 mins.
moreIn this walkthrough, we’ll check out the awesome capabilities of Splunk AppDynamics with Cisco Secure Application and see how they can be used to secure your applications at runtime, every time.
moreStay ahead of the curve and in the know with our comprehensive list of upcoming Tech Talks, Community Office Hours, and webinars. From insightful discussions to hands-on workshops, there’s something for everyone eager to dive deeper and learn. Don’t miss out — mark your calendars now!
moreDigital resilience is no longer optional – it’s a necessity. Take the quick Digital Resilience Assessment to evaluate your organization’s ability to detect, prevent, and recover from disruptions. The assessment will help you understand where you are on the journey to achieving digital resilience. In just a few minutes, you’ll be able to gauge your current resilience maturity level compared to peers, identify areas for improvement, and receive prescriptive guidance to strengthen your digital resilience.
moreSplunk’s latest advancements in AI and integrations deliver faster, smarter troubleshooting for ITOps practitioners and engineers, providing more effective ways to simplify data exploration, respond faster, and solve problems.
moreWith rapid advancements in AI, digital resilience is no longer optional. That's why leading organizations trust Splunk’s unified security and observability platform to keep their digital systems secure and reliable. By combining new purpose-built threat analytics, advanced AI in observability, data management & federation, and new integrations with Cisco, Splunk provides a foundation for organizations to scale with the future of AI and the demands of tomorrow’s digital landscape.
moreStay ahead of the curve and in the know with our comprehensive list of upcoming Tech Talks, Community Office Hours, and webinars. From insightful discussions to hands-on workshops, there’s something for everyone eager to dive deeper and learn. Don’t miss out — mark your calendars now!
moreStay ahead of the curve and stay informed with our comprehensive list of upcoming Tech Talks, Community Office Hours, and webinars. From insightful discussions to hands-on workshops, there’s something for everyone eager to dive deeper and learn. Don’t miss out — mark your calendars now!
moreStay ahead of the curve and in the know with our comprehensive list of upcoming Tech Talks, Community Office Hours, and webinars. From insightful discussions to hands-on workshops, there’s something for everyone eager to dive deeper and learn. Don’t miss out — mark your calendars now!
moreSplunk Platform has set a great foundation for your security operations. With the ever-evolving threat landscape and an expanding attack surface, Splunk’s SIEM solution- Enterprise Security is always here to enhance your security posture, saving you time and effort with its unified workflow for threat detection, investigation, and response.
Check out this newly launched video to see how the market-leading SIEM - Enterprise Security can empower your SOC efficiency.
moreDo you want to gain full control over your growing data volumes? Edge Processor and Ingest Processor filter, mask, and route your data like never before. Learn how to get started with our Data Management pipeline builders, available for Splunk Cloud Platform customers to use today. Explore common use cases, join us at our upcoming events, and check out additional resources to unlock even more capabilities.
moreIn March, Splunk Community Office Hours spotlighted our fabulous Splunk Threat Research Team for the first time. This team of security content experts is dedicated to developing out-of-the-box detections to provide comprehensive visibility, empower accurate detection with contextual insights, and enhance operational efficiency. Read on for the details and recordings!
more