Strong Security Starts with Strong IT O...
Splunk ITSI is a premium analytics solution that correlates and applies machine learning to infrastructure, application, and business data for 360° service monitoring, predictive analytics, and streamlined incident management. Unlike point event management or IT monitoring solutions, ITSI correlates and applies machine learning to metric, log, and trace data for end-to-end intelligence across your entire environment. ITSI also combines vie...
Build a Scalable and Secure CI/CD Pipel...
Join our experts to learn how teams inside Department of Homeland Security (and DHS components) can deploy Splunk, GitLab, and D2iQ together to support CI and CD process automation, securely accelerate application development and deployment, and lay the groundwork for continued modernization and innovation.During this webinar, attendees will learn:How to secure each stage of the development lifecycle through GitLab (SAST, DAST, Container Scann...
Zero Trust Security for Agencies
Zero Trust is an evolution of a range of past security architectural approaches and concepts; think network segmentation, least privilege, and defense. The key difference being Zero Trust brings a different mindset to how we design and build security to support the idea of starting with no implicit trust and that we assume a breach has already occurred. The Department of Defense (DOD) released a publication in the Spring of 2021 on Zero Trust...
Splunk Cloud Meets the FedRAMP Security...
Join us for a webinar covering Splunk’s FedRAMP Cloud offering and what this means for The Department of Interior (DOI). During this DOI-focused webinar, attendees will gain insight regarding: Overview of Splunk’s FedRAMP SaaS offering Key benefits when compared to hosting Splunk on-premises Splunk apps and premium solutions authorized for use Total cost of ownership (TCO) and licensing considerations Architecture and migration str...
Getting More from Your Data: Harnessing...
Join us to discover how Rubrik, when integrated with Splunk, provides agencies with the ability to gain rich search and dashboarding capabilities with minimal configuration. The Rubrik Cloud Data Management platform is built on top of a rich suite of RESTful APIs, allowing easy integration with third-party services. Many Rubrik customers are also Splunk customers, so pairing the two systems is a natural fit. Customers use Splunk to aggregate l...
Solving STIGs and Automating Compliance...
System Technical Implementation Guidelines (STIGs) are system configuration guidelines provided by the Defense Information Systems Agency (DISA) that are commonly used in the federal and DoD space to meet system compliance requirements when it comes to system configuration. This effort can be extraordinarily complex and time-consuming for the people that are responsible for executing this work. Not only must each system component be configured...
Streamline DOJ SOC Operations Using Spl...
Security teams across the Department of Justice face an ever-increasing number of security incidents that often require manual investigation efforts to identify, analyze, and mitigate these threats facing their organizations daily. Join us for a presentation on how customers have reduced response and resolution time through security orchestration and automation via Splunk SOAR. During the presentation, we will discover how Splunk SOAR can prov...
Splunk IT Essentials (ITE) for the Depa...
During this DOE-focused on-demand webinar, viewers will gained insight regarding: An overview of Splunk's no-cost Splunk offering: ITE Learn and ITE Work Which billable and non-billable Splunk apps are now in ITE (e.g., Exchange, App for Infrastructure, VMware, Windows, Unix, etc.) How ITE consolidates numerous Splunk and 3rd party point solutions into a centralized view How to identify trends or issues impacting KPIs with drill-down capabilit...
An Ecosystem Approach to Zero Trust for...
Join us for a Health and Human Services focused webinar going over an ecosystem approach to Zero Trust. Achieving a comprehensive Zero Trust policy involves a range of integrated components. Together, these controls provide the necessary data and insights for centralized monitoring. By aligning zero trust methodologies to Splunk's ecosystem of partners, we can dramatically improve organizations' security posture and their overall security oper...
Demo Day: Splunk Synthetic Monitoring
Splunk Synthetic Monitoring and Web Optimization combines the power of application monitoring using bots from a user's perspective, with an included website optimization engine to help organizations find, fix, and prevent the web performance issues impacting user experience. Join us for a demonstration of how Splunk Synthetics can help your organization drive better user experiences, drive top line revenue, and operationalize performance strat...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.