Splunk Tech Talks
Deep-dives for technical practitioners.

Intelligence Management with Splunk + TruSTAR

melissap
Splunk Employee
Splunk Employee

View our Tech Talk: Security Edition, Intelligence Management with Splunk + TruSTAR 

Manual vetting and data from multiple sources cause analysts to waste much of their time data wrangling, taking time away from alerts that matter the most. Analysts need the ability to normalize and enrich multiple data sources for an objective view of security events. 

The TruSTAR Unified App for Splunk Enterprise and Enterprise Security helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. 

Tune in to learn how to:

  • Customize data ingest preferences using TruSTAR Indicator Prioritization Intel Workflows
  • Automatically download observables into Splunk KV stores
  • Enrich and prioritize notable events in Splunk Enterprise Security 
Get Updates on the Splunk Community!

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...