false
Splunk Blogs
Leadership
6 Min Read
Splunk announces innovations across its observability portfolio to provide organizations deeper visibility into their network health through integrations with Cisco, and faster troubleshooting with the help of AI.

Featured Articles

Security

Learn

Latest Articles

Security 2 Min Read

Punycode phishers - All you need to know

Unicode domains can be used for homograph attacks. Learn what they are and how users can be tricked.
Security 8 Min Read

Splunk and Tensorflow for Security: Catching the Fraudster with Behavior Biometrics

Raising the barrier for fraudsters and attackers: how to leverage Splunk and Deep Learning frameworks to discover Behavior Biometrics patterns within user activities

Operational Intelligence - Manufactured in Germany | SplunkLive! Events in Germany 2017

If you hear stories about how data is analysed from locomotives, placement systems on a shopfloor, automated optical inspection devices (AOI), autonomous indoor vehicles, contact less payment apps (NFC) - you know that you’re at SplunkLive! Germany!
Tips & Tricks 2 Min Read

Build a Dashboard with Dynamic and Editable Inputs

Use some less obvious features of Splunk SimpleXML to create a dynamic but flexible user experience with form inputs.http://docs.splunk.com/Documentation/ES/latest/User/Eventinvestigator
Partners 2 Min Read

Building the next generation of Security Ninjas - ECS is full on with Splunk

A conversation with Harry McLaren, Senior Security Consultant and the Splunk Enablement Lead within ECS.
Tips & Tricks 9 Min Read

Syslog-ng and HEC: Scalable Aggregated Data Collection in Splunk

Best practices for scalable aggregated data collection
Security 2 Min Read

Assigning Role Based Permissions in Splunk Enterprise Security

Learn how to add a new role in Enterprise Security and apply capabilities to it
Tips & Tricks 7 Min Read

How to stream AWS CloudWatch Logs to Splunk (Hint: it’s easier than you think)

See step-by-step process of AWS Lambda streaming of CloudWatch Logs into Splunk for real-time security analysis, visualization, troubleshooting.