In our latest edition of our "Splunker Stories" series, we meet with one of Splunk’s Senior Consultants, Sol Warnock. We sat down with Sol to learn more about the path which led him to Splunk, his passion to make the world a better place, and how Splunk has supported and empowered Veterans.
In our latest instalment of 'Meet the Splunktern', we talk to Anna Nosek, one of our Polish Software Enginering interns. Read more about her experience at Splunk and her tips for interns and graduates who are preparing for a technical interview.
For the second year in a row, Splunk is thrilled to offer the Splunk HBCU Academic Scholarship. This scholarship is aimed at empowering students from prestigious historically Black academic institutions including North Carolina A&T University (NCA&T), Florida A&M University (FAMU) and Tuskegee University (TU).
Hello everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, white papers, and customer case studies that we feel are worth a read. We hope you enjoy.
The power of the new Splunk integration with Salesforce's Real-Time Event Monitoring (RTEM) enables customers to track security concerns such as failed logins, suspicious login-as activities and high risk permission modifications. Find out more in this blog.
In this next installment of our “Meet the Splunktern'' series, we’re featuring Karni Beth, our summer Customer Success Marketing intern. From hosting webinars to creating onboarding guides for our customers, Karni’s summer was surely a summer of growth and development. Read on to learn more about Karni and her journey at Splunk.
In the latest edition of our "Splunker Stories" series, we meet Splunk’s Regional Sales Director for Higher Education East, Kim Pisano! We sat down with Kim to learn more about the path which led her to Splunk, her passion for education, and how her teams are working to ensure higher education institutions have enhanced productivity to enable positive outcomes.
In this post, we demonstrate how to set up effective security monitoring of your Hyperledger Fabric infrastructure. We identify some common threats, recognize key data sources to monitor, and walk through using Splunk to ingest and visualize your data.
Skipped searches are a bane of existence for many Splunk Administrators. In this blog, we review the search concurrency model in Splunk and go through a systematic way to identify various reasons for skipping and how to remedy them.