Skip to main content
false
Splunk

The world’s leading organizations trust Splunk to help keep their digital systems secure and reliable. Our software solutions and services help to prevent major issues, absorb shocks and accelerate transformation. Learn what Splunk does and why customers choose Splunk.  

 

.conf & .conf Go 1 Min Read

Bringing Data to Every Part of Your Organization at SplunkLive! Virtual

SplunkLive! Virtual is coming soon, and Splunk's Lisa Palmer has all the details about what's in store for this year's event.
Security 3 Min Read

TruSTAR Intel Workflows Series: Automating Data Workflows to Unlock Investments in SIEM, SOAR and XDR

We recently introduced TruSTAR Intel Workflows.This blog series explains our motivations for building this feature, how it works, and how users can better inform security operations. This is Part 2: How TruSTAR Intel Workflows Work.
Security 3 Min Read

Find the Fingerprints and Traces of Threats with Splunk at RSAC 2021

Splunk's heading to RSAC 2021, are you? Take a peak at our upcoming sessions and don't forget to tune into our CEO Doug Merritt's keynote when he takes the RSAC main stage.
DevOps 2 Min Read

Boss of Ops and O11y (BOO) Global Events Update

Join Splunk for our Boss of the Ops and O11y competition, where you'll race against the clock (and your peers) to handle simulated IT incidents with real-world data and use Splunk's Observability portfolio to answer the tough questions engineers and analysts face everyday.
Security 2 Min Read

Splunk SOAR Playbooks: Suspicious Email Domain Enrichment

This playbook focuses specifically on domain names contained in the ingested email, and it uses Cisco Umbrella Investigate to add the risk score, risk status, and domain category to the event in Splunk SOAR.
DevOps 3 Min Read

Conquer Complexity at Any Scale With the New Splunk Observability Cloud

Announcing the new Splunk Observability Cloud, bringing together the world’s best-in-class solutions for infrastructure monitoring, application performance management, digital experience monitoring, synthetic monitoring, log investigation and incident response.