Hemant Seth's Blog Posts

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

Code, Coffee, and Unity: How a Unified Approach to Observability and Security Empowers ITOps and Engineering Teams
Observability
3 Minute Read

Code, Coffee, and Unity: How a Unified Approach to Observability and Security Empowers ITOps and Engineering Teams

Splunk's Spiros Xanthos explores the pivotal role that a unified security and observability approach plays in empowering ITOps and engineering teams to ensure digital resilience faster.
Cloud Security and Data Resilience in Government
Industries
4 Minute Read

Cloud Security and Data Resilience in Government

A review of the legislative and policy landscape regarding cloud security and data resilience.
Detecting Lateral Movement Using Splunk User Behavior Analytics
Security
8 Minute Read

Detecting Lateral Movement Using Splunk User Behavior Analytics

The blog is to introduce lateral movement detection using Splunk User Behavior Analytics (UBA)
Splunk’s 2025 HBCU Academic Scholarship
Splunk Life
4 Minute Read

Splunk’s 2025 HBCU Academic Scholarship

Splunk is delighted to offer the Splunk HBCU Academic Scholarship for 2025.
Developing the Splunk App for Anomaly Detection
Platform
13 Minute Read

Developing the Splunk App for Anomaly Detection

A technical overview of the Splunk App for Anomaly Detection, which uses machine learning to automatically configure anomaly detection jobs on time series data.
Integrated Intelligence Enrichment With Threat Intelligence Management
Security
1 Minute Read

Integrated Intelligence Enrichment With Threat Intelligence Management

Threat Intelligence Management enables analysts to fully investigate security events or suspicious activity by providing the relevant and normalized intelligence to better understand threat context and accelerate time to triage.