Hemant Seth's Blog Posts

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

Cribl Litigation Update
Bulletins
1 Minute Read

Cribl Litigation Update

An update on Splunk's intellectual property and unfair competition complaint against Cribl filed on October 5, 2022.
Get Ready for .conf24: A Can’t-Miss For Security Professionals
.conf & .conf Go
2 Minute Read

Get Ready for .conf24: A Can’t-Miss For Security Professionals

Splunker Dane Disimino dives into what makes .conf24 an essential gathering for security experts.
The Importance of Prioritizing Sustainability in Your Org (From the Top Down)
Cio Office
3 Minute Read

The Importance of Prioritizing Sustainability in Your Org (From the Top Down)

From the board to the C-suite and ERGs, why business leaders should engage everyone in their organization on ESG practices.
Cloud Strategies: How To Build a Cloud Strategy for Success
Learn
9 Minute Read

Cloud Strategies: How To Build a Cloud Strategy for Success

Going to the cloud is a no-brainer for many teams and organizations. Still, there’s a smart way to do it: with a cloud strategy. Get the full story here.
Log Monitoring with AI: What Makes Monitoring Intelligent?
Learn
4 Minute Read

Log Monitoring with AI: What Makes Monitoring Intelligent?

Monitoring log data offers so many benefits and proactive approaches in your organization. Understand what using AI for log monitoring can do, too.
Threat Assessments & How To Assess a Cyberthreat
Learn
3 Minute Read

Threat Assessments & How To Assess a Cyberthreat

To respond to threats effectively, you need to understand what damage that threat can cause. Threat assessments are a crucial part of any cybersecurity strategy.