Splunk Tech Talks
Deep-dives for technical practitioners.

Splunk Attack Range: Build, Simulate, Detect

Rumsha
Splunk Employee
Splunk Employee

Screen Shot 2022-10-13 at 12.41.35 PM.png

 

WATCH NOW 

 

Can your security teams successfully perform attack simulations to visualize and record attacks? 

Splunk Attack Range 2.0 allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk. Watch the Tech Talk,  Splunk Attack Range: Build, Simulate, Detect  and join the Splunk Threat Research  Team for a demo of Splunk Attack Range v2.0 and to learn about:

  • How the Splunk Threat Research Team leverages the Splunk Attack Range
  • The newest features available in the Splunk Attack Range v2.0
  • Future plans for Splunk Attack Range v3.0

 

Also don’t forget to view all the resources available to continue your Splunk journey:

Blogs

 

Resources

 

Recommended .conf22 Sessions

  • Home on the Range: Detection Engineering with Splunk Attack Range
  • Linux Threat Detection with Attack Range
  • Purple Teaming - Build, Attack, and Defend Your Organization

Sign in and access sessions

Get Updates on the Splunk Community!

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...

State of Splunk Careers 2024: Maximizing Career Outcomes and the Continued Value of ...

For the past four years, Splunk has partnered with Enterprise Strategy Group to conduct a survey that gauges ...

Data-Driven Success: Splunk & Financial Services

Splunk streamlines the process of extracting insights from large volumes of data. In this fast-paced world, ...