What do you do if you have a large number of Deployment Servers (DS) and want to separate business units into different serverclasses? In this article, we will discuss steps you can take to adapt your (DS) to your growing organization.
If you work in the cybersecurity sector, you know that the U.S. Department of Defense (DoD) is rolling out a Cybersecurity Maturity Model Certification program,
To say a lot has change in 2020 is an understatement. The world we live in and work in has dramatically changed these past few months and some changes might last even longer. But even in this unpredictable world, we still look at data to help us solve our problems.
Designing Glass Tables and/or Dashboards is a critical element in your ITSI configuration. The correct implementation will help communication to your visualization audience/consumer. Let’s discuss a few points to help steer your decision making process.
Learn three Splunk deployment best practices that will go a long way in saving you time and face, and allow you to spend your evenings unwinding in peace.
No matter the size of your organization, deploying Splunk is a big decision. After all, it can scale from very small to very large. Furthermore,
In a Splunk environment, Splunk operations are controlled by configuration files (conf files). Configuration of the file settings are essential to the proper running of the Splunk instance. In this article, we walk through how to properly configure the file settings to ensure that your Splunk instance is running optimally.
UBA, User Behavior Analytics, is a Premium Splunk App that leverages machine learning technologies, to secure an organization from insider threats while also providing outsider threat monitoring and alerting capabilities. In this blog we will cover frequently asked questions around UBA and its functionality.