If you work information security and have a pulse, then you’re at least a little familiar with the hype surrounding Splunk Inc., the billion-dollar “unicorn” and purveyor of an increasingly popular big data operational intelligence and real-time analytics platform. Chances are you’re up to your ears in it.
Lately, there’s been a lot of noise surrounding Splunk’s growing security business, which, fueled by the Splunk App for Enterprise Security, accounted for a third of the company revenue, according to Haiyan Song, SVP of security markets at Splunk.
Lucky for us, this is the information age, and there a lot of wonderful resources out there where users and organizations can host information (you guessed it) such as past webinars and presentations for public access. One such resource is YouTube.com, maybe you’ve heard of it.
But alas, the information age didn’t come with an abundance of free time, and maybe you don’t want to spend the precious free time you do have in a search bar, maybe you’d rather save that time for the real bar instead.
Lucky for you, we went spelunking (ha!) through the depths of Splunk’s’ YouTube channel, which boasts and impressive 270+ videos and pulled a few of the best resources for learning to use Splunk for security.
These six videos demonstrate how Splunk provides big data and Security Information and Event Manager (SIEM) use cases, and how the technology leverages search, correlation, investigation, and reporting capabilities for continuous monitoring and faster incident investigations. So sit back and enjoy! We hope you found these videos as useful as we did.
Splunk Enterprise (SIEM): Why Splunk For Security?
Splunk for Security VS. SIEM
Splunk Ransomware Vulnerability Assessment
Splunk for Security Investigation: Command and Control Analysis
Splunk for Security Investigation: Endpoint Advanced Malware Analysis
Splunk for Security Investigations, Part 1: Threat Detection
Splunk for Security Investigations, Part 2: Threat Validation:
Splunk for Security Investigations, Part 3: Scoping
Latest posts by Jeff Edwards (see all)
- Five Questions You Need To Ask Yourself When Evaluating SIEM Solutions - November 8, 2017
- Winning the Data Breach War with User and Entity Behavioral Analytics - November 3, 2017
- 5 Alternatives to The Gartner Magic Quadrant for SIEM - October 31, 2017