/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

What is Real User Monitoring?
Learn
6 Minute Read

What is Real User Monitoring?

Real User Monitoring (RUM) helps you monitor visitors' activities, revealing critical insights into the user experience. Get the expert story here.
Container Orchestration: A Beginner's Guide
Learn
11 Minute Read

Container Orchestration: A Beginner's Guide

This blog post explores container orchestration and automation for software development and IT organizations.
Introducing Splunk Add-On for Splunk Attack Analyzer & Splunk App for Splunk Attack Analyzer
Security
3 Minute Read

Introducing Splunk Add-On for Splunk Attack Analyzer & Splunk App for Splunk Attack Analyzer

Announcing the launch of the Splunk Add-on for Splunk Attack Analyzer and Splunk App for Splunk Attack Analyzer.
The Top 3 Findings From Splunk’s CISO Report
Leadership
2 Minute Read

The Top 3 Findings From Splunk’s CISO Report

The CISO Report shares findings and insights on how CISOs are addressing the latest threats, keeping up with AI and changing the security culture in their organization.
Splunk Named #1 SIEM Provider in the 2022 IDC Market Share for SIEM for 3rd Time in a Row
Security
2 Minute Read

Splunk Named #1 SIEM Provider in the 2022 IDC Market Share for SIEM for 3rd Time in a Row

Splunk has been named as the #1 SIEM provider in the 2022 IDC Market Share for SIEM for the third time in a row.
Centralized Logging & Centralized Log Management (CLM)
Learn
4 Minute Read

Centralized Logging & Centralized Log Management (CLM)

Centralized logging is a strategic advantage for many businesses. Learn how CLM works & how to prepare for expected logging challenges.
Detection Engineering Explained
Learn
5 Minute Read

Detection Engineering Explained

The digital watchtower for organizations, detection engineering! DE responds to known threats and continuously scans the horizon for the slightest hint of a potential breach.
What is Identity Access Management?
Learn
9 Minute Read

What is Identity Access Management?

How do you manage identity? How do you manage access? Interesting questions that luckily have clear answers for every business and organization today.
Splunk Use Cases
Learn
4 Minute Read

Splunk Use Cases

In this blog post, we'll take a look at common uses cases for Splunk - from Security to Observability and more.