Splunk ES Implementation Checklist

Congratulations! Your organization has had the foresight to purchase Splunk’s Enterprise Security along with expert Professional Services to assure a successful implementation. This guide will serve as a checklist to help ensure you are prepared for the most successful ES deployment possible.…Learn MoreSplunk ES Implementation Checklist

Splunk Attack Range Setup Guide

Splunk Attack Range allows you to create vulnerable local or cloud environments, to simulate attacks and collect the data Into Splunk. In this on-demand video Bill Ouellette (Principal Splunk Security Engineer) will provide a Step by Step Guide on setting up the “Attack Range Framework” within your Splunk test instance. …Learn MoreSplunk Attack Range Setup Guide

Should I Migrate my Splunk Environment to Python 3? Yes…No…Yes!!!

Now that Splunk’s newest release (8.0) supports Python3 we have fielded many questions from customers on what the practical approach for migration is. In this blog, we will discuss the steps you should make when migrating your environment to Python3.…Learn MoreShould I Migrate my Splunk Environment to Python 3? Yes…No…Yes!!!

CIM Compliance – A Simple Walkthrough

Making data CIM compliant can be a daunting and confusing exercise for new Splunkers and experienced ones alike. Often the biggest misconceptions have to do with the approach rather than the exercise itself. My biggest piece of advice – start with the end in mind.…Learn MoreCIM Compliance – A Simple Walkthrough

Splunk 2020 Predictions

In a this rapidly changing digitized world, data is at the root of everything, and essential to solving every problem. From basic business decisions to global crises, a panel of technology experts at Splunk has assembled more than a dozen predictions about how technology will transform business and daily life.…Learn MoreSplunk 2020 Predictions

AWS Lambda vs AWS Firehose

Splunk has multiple methods in regards to Getting Data In (GDI). One very popular method is the Http Event Collector (HEC). The use of the HEC allows data ingestion into Splunk via HTTP POST messages. Two popular methods that send POST messages out of AWS into Splunk are the AWS services: Lambda and Firehose.…Learn MoreAWS Lambda vs AWS Firehose