Can your security teams successfully perform attack simulations to visualize and record attacks?
Splunk Attack Range 2.0 allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk. Watch the Tech Talk, Splunk Attack Range: Build, Simulate, Detect and join the Splunk Threat Research Team for a demo of Splunk Attack Range v2.0 and to learn about:
How the Splunk Threat Research Team leverages the Splunk Attack Range
The newest features available in the Splunk Attack Range v2.0
Future plans for Splunk Attack Range v3.0
Also don’t forget to view all the resources available to continue your Splunk journey: