false

Splunk

The world’s leading organizations trust Splunk to help keep their digital systems secure and reliable. Our software solutions and services help to prevent major issues, absorb shocks and accelerate transformation. Learn what Splunk does and why customers choose Splunk.  

 

Security 10 Min Read

SUPERNOVA Redux, with a Generous Portion of Masquerading

A review of the Pulse Secure attack where the threat actor connected to the network via a the Pulse Secure virtual private network (VPN), moved laterally to its SolarWinds Orion server, installed the SUPERNOVA malware, and collected credentials, all while masquerading the procdump.exe file and renamed it as splunklogger.exe.
Observability 5 Min Read

Monitoring AWS EC2 with Splunk Observability

What should you monitor in AWS EC2 to make sure you are getting the right data perspective and insights from your clouds? Discover how to start monitoring EC2 instances with Splunk Infrastructure Monitoring today.
Industries 2 Min Read

How 5G Can Elevate the Customer Experience in Retail

As 5G becomes more commonplace, it will have a significant impact on the retail industry, with possibilities for enhanced data-generated customer insights, VR services, smart screens, and mobile-cloud services to create personalized experiences.
Security 2 Min Read

Streamlining Vulnerability Management with Splunk Phantom

Manage the entire lifecycle of vulnerability management with automation and orchestration using Splunk’s SOAR technology, Splunk Phantom, to automate actions and reduce the time spent on patch management by 40%.
Splunk Life 3 Min Read

Happy St George’s Day - Your Data Driven Guide To English Tourist Attractions

The correlation of St George’s Day and a likely UK based staycation this summer holiday got Splunker Matt Davies thinking about a data driven approach to England’s top holiday attractions.
Security 11 Min Read

Monitoring Pulse Connect Secure With Splunk (CISA Emergency Directive 21-03)

Our Splunk security experts share a closer look at the Pulse Connect Secure attack, including a breakdown of what happened, how to detect it, and MITRE ATT&CK mappings.