Skip to main content
false
Splunk

The world’s leading organizations trust Splunk to help keep their digital systems secure and reliable. Our software solutions and services help to prevent major issues, absorb shocks and accelerate transformation. Learn what Splunk does and why customers choose Splunk.  

 

Security 2 Min Read

Orchestrate Framework Controls to Support Security Operations with Splunk SOAR

Learn more about how to identify use cases for automation and dive deeper into the five steps of designing security workflows around framework regulations

Real world impact from De Rechtspraak

We often say customers are our best storytellers at Splunk, and it’s certainly the case with our latest EMEA customer case study in the form of the Dutch court system, De Rechtspraak. Hear more from Splunk VP EMEA, Frederik Maris on how De Rechtspraak is harnessing insight from Splunk.
Security 3 Min Read

How to Marie Kondo Your Incident Response with Case Management & Foundational Security Procedures

Learn how successful security teams “Marie Kondo” their security operations, cleaning up their “visible mess” to identify the true source of “disorder” (the cyber attack itself).
Partners 2 Min Read

Register Today for Splunk 2021 Virtual Global Partner Summit

Register now for the free Splunk 2021 Virtual Global Partner Summit (GPS), a two-day virtual event running across all time zones (AMER: April 7-8 from 8:00 am - 4:00 pm PDT; APAC: April 8-9 from 8:00 am - 4:00 pm SGT; and EMEA: April 8-9 from 8:00 am - 4:00 pm BST) where you will gain the knowledge to help your customers turn their data into doing by accelerating their digital transformation and cloud adoption.
IT 3 Min Read

How Microsoft Used Splunk’s Ethlogger to Turn Blockchain Data Into Supply Chain Insight

Microsoft went blockchain with their supply chain partners, and Splunk's Ethlogger was critical for the success of the blockchain consortium.
Security 13 Min Read

Detecting Microsoft Exchange Vulnerabilities - 0 + 8 Days Later…

Even if you haven’t uncovered Microsoft Exchange Vulnerabilities and malicious behavior, it is important to continue monitoring, particularly as more actors look to leverage these vulnerabilities for their own purposes.