Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

That's A Data Problem - Thriving in an Uncertain World | Daniel Newman & Splunk's Doug Merritt

The COVID-19 pandemic unveiled the importance of business resiliency. Moving forward, the case for prioritizing business resilience is beyond doubt. Leadership must leverage data and system resilience to meet new threats that could impact their business model and operations. Tech Analyst Daniel Newman and CEO of Splunk, Doug Merritt, discuss how to build business resilience focusing on data strategies, people-first leadership and investing to be ready for a future of uncertainty.

That's A Data Problem - How Do Security Programs Drive Business Results?

The sheer number of cybersecurity attacks against companies continues to grow, and with accelerated cloud transformation, IT teams are facing new challenges. To drive innovation and stay competitive, companies need to ensure they are using cloud securely, prioritizing a security first approach and mitigating risks to drive business results.

Onboarding Data in Splunk Security Analytics for AWS

Splunk Security Analytics for AWS's new data onboarding wizard quickly takes you from subscribing to the service to visualizing your AWS environment. We’ll walk through the wizard in this video, and you’ll see how the new process can save you hours, days, or even weeks when compared to traditional data onboarding processes.

Detecting and Investigating Threats in Splunk Security Analytics for AWS

Splunk Security Analytics for AWS’s pre-built, AWS-specific detections and dashboards allow you to easily visualize your AWS environment and centralize your security analysis and investigations. We’ll walk through some of the offering’s key dashboards and detections in this video, as well as the investigation interface.

SOCtails Episode 4 - Respond Fast to Security Incidents with Automated Playbooks

Investigating and responding to phishing attacks is tedious and time-consuming. Kevin responds to phishing attacks by following a step-by-step manual process catalogued in his "Cybersecurity Playbook." Jeff shows Kevin an easier and faster way to respond using automated playbooks from Splunk SOAR (formerly known as Splunk Phantom).