WATCH NOW
Can your security teams successfully perform attack simulations to visualize and record attacks?
Splunk Attack Range 2.0 allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk. Watch the Tech Talk, Splunk Attack Range: Build, Simulate, Detect and join the Splunk Threat Research Team for a demo of Splunk Attack Range v2.0 and to learn about:
Also don’t forget to view all the resources available to continue your Splunk journey:
Blogs
Resources
Recommended .conf22 Sessions
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.