Hemant Seth's Blog Posts

Hemant Seth

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

.conf23: Splunk Customer Success Is Ready for .conf23
.conf & .conf Go
1 Minute Read

.conf23: Splunk Customer Success Is Ready for .conf23

See all the ways that Splunk Customer Success can help guide your .conf23 experience with the Splunk Customer Success Know Before You Go Guide.
Autonomous Testing: The Top 5 Tools and Their Benefits
Learn
6 Minute Read

Autonomous Testing: The Top 5 Tools and Their Benefits

Explore the benefits of autonomous testing and the top AI-driven tools available. Learn how to improve efficiency, accuracy, and test coverage in software testing.
15 surprisingly scary application security statistics
Observability
3 Minute Read

15 surprisingly scary application security statistics

Take a research-based look at the state of application security and learn how leveraging security builds user trust, resilience and revenue growth.
The Devil’s in the Data
Partners
2 Minute Read

The Devil’s in the Data

How Accenture leverages Splunk’s powerful, industry leading data analytics platform to drive supply chain efficiency and resiliency for its customers.
Staff Picks for Splunk Security Reading June 2023
Security
5 Minute Read

Staff Picks for Splunk Security Reading June 2023

Hello, everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Data Exfiltration: Prevention, Risks & Best Practices
Learn
7 Minute Read

Data Exfiltration: Prevention, Risks & Best Practices

Learn about data exfiltration as a threat to organizations. Discover techniques, risks, and prevention measures to safeguard sensitive information.