Tune in to see new capabilities that deliver an improved workflow experience for simplified investigations; enhanced visibility and reduced manual workload; and customized investigation workflows for faster decision-making as well as the latest security content updates to protect you from the latest threats.
Malware. Risky Extensions. Data Exfiltration. End-users are increasingly reliant on browsers to access corporate resources. This usage explosion has brought browser security front and center. Google Chrome is one of the largest browsers and includes several security controls. Now, Chrome and Splunk are partnering to enhance browser security. Join this tech talk to see an overview and demo of a joint solution that delivers security use case visibility and uses the Splunk platform to automate Google Chrome control response.
We've lined up our TopSecurity and Observability Tech Talks for your on-demand summer viewing! Doesn’t matter if you’re a seasoned practitioner or an enthusiastic newcomer there’s plenty to choose from.
Our latest product innovations support integrated workflows and improved user experiences. This makes it easier for you to detect and predict issues, find root cause, assess risk and impact radius, and remediate — quickly, accurately, at scale.
Save time and frustration by leveling up your Cloud Admin Chops! Join us for this Tech Talk to learn how to optimize your Splunk deployment and streamline common admin tasks with Admin Config Service (ACS).
This tech talk highlights content developed by the Splunk Threat Research Team in the past quarter, delivered in the form of detections that are grouped into analytic stories and delivered to Splunk customers through the Enterprise Security Content Update (ESCU) app.
Threat researchshows that a large percentage of organizations experience DNS attacks. Often, adversaries dynamically generate domain names using Domain Generation Algorithms (DGA) to create C2 infrastructure not prone to static analysis disruption.
How to use the analytical power of Splunk to hunt for cyber and insider threats, and also utilizes the Splunk Machine Learning Toolkit (MLKT) for novelty and outlier detection from the noisy security datasets.