Splunk's Blog Posts

The world’s leading organizations trust Splunk to help keep their digital systems secure and reliable. Our software solutions and services help to prevent major issues, absorb shocks and accelerate transformation. Learn what Splunk does and why customers choose Splunk.

Find the Fingerprints and Traces of Threats with Splunk at RSAC 2021
Security
3 Minute Read

Find the Fingerprints and Traces of Threats with Splunk at RSAC 2021

Splunk's heading to RSAC 2021, are you? Take a peak at our upcoming sessions and don't forget to tune into our CEO Doug Merritt's keynote when he takes the RSAC main stage.
Boss of Ops and O11y (BOO) Global Events Update
Observability
2 Minute Read

Boss of Ops and O11y (BOO) Global Events Update

Join Splunk for our Boss of the Ops and O11y competition, where you'll race against the clock (and your peers) to handle simulated IT incidents with real-world data and use Splunk's Observability portfolio to answer the tough questions engineers and analysts face everyday.
Splunk SOAR Playbooks: Suspicious Email Domain Enrichment
Security
2 Minute Read

Splunk SOAR Playbooks: Suspicious Email Domain Enrichment

This playbook focuses specifically on domain names contained in the ingested email, and it uses Cisco Umbrella Investigate to add the risk score, risk status, and domain category to the event in Splunk SOAR.
Conquer Complexity at Any Scale With the New Splunk Observability Cloud
Observability
3 Minute Read

Conquer Complexity at Any Scale With the New Splunk Observability Cloud

Announcing the new Splunk Observability Cloud, bringing together the world’s best-in-class solutions for infrastructure monitoring, application performance management, digital experience monitoring, synthetic monitoring, log investigation and incident response.
TruSTAR Intel Workflows Series: Shifting from App-Centric to Data-Centric Security Operations
Security
4 Minute Read

TruSTAR Intel Workflows Series: Shifting from App-Centric to Data-Centric Security Operations

TruSTAR recently introduced API 2.O featuring TruSTAR Intel Workflows. This blog series will explain our motivations for building this feature, how it works, and how users can better inform security operations.
Splunk and Zscaler Utilize Data and Zero Trust to Eradicate Threats
Security
3 Minute Read

Splunk and Zscaler Utilize Data and Zero Trust to Eradicate Threats

Splunk and Zscaler have partnered to deliver a superior approach to security. Our tightly integrated, best-of-breed cloud security and security analytics platforms deliver a cloud experience for the modern, cloud-first enterprise.