If you’re working in IT, security, or data analysis, learning how to use Splunk could help with your job. It’s a widely used platforms for collecting and analyzing large volumes of machine data, and ...
Back at TheCube, SiliconANGLE’s premier video program, Wikibon Analyst Jeff Kelly and SiliconANGLE Executive in Residence Jeff Frick had the pleasure of interviewing Beau Christensen, the Lead Site ...
Learn how Splunk works with UBbox, and how to gain access. When a restricted data folder is approved and provisioned, monitoring via Splunk is also established and access to Splunk is given to the ...
In SiliconANGLE’s ongoing coverage of the 2012 Splunk conference in Las Vegas, Jeff Frick and Jeff Kelly spoke with Splunk CMO Steve Sommer about Splunk’s innovation in the big data space, emphasis on ...
To understand the challenge of making money from data produced by the broad category of data sources known as the Internet of Things, it is vital to think about the difference between the forest and ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. “I believe that defense can have an unfair advantage over the adversaries,” Monzy Merza, ...
“The most exciting part of the user conference is hearing firsthand the compelling use cases from Splunk customers, and this year will be the most fascinating yet,” said Godfrey Sullivan, Chairman and ...
"Skeptical" Asian companies have been using Splunk as a tool to "check up" on how closely outsourcing vendors honor their SLAs (service level agreements), according to Splunk co-founder Michael Baum.
The Bank of England is using Splunk in its security operations centre (SOC) to try and spot cyber attacks before they happen. According to Jonathan Pagett, head of the SOC, the bank has been moving ...
Starbucks is using Splunk: Phantom to automate the bulk of its “mundane” security tasks to reduce the amount of time cyber professionals spend on them. Speaking at the Splunk.conf 2018 in Florida, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results