Skip to main content
false
Splunk

The world’s leading organizations trust Splunk to help keep their digital systems secure and reliable. Our software solutions and services help to prevent major issues, absorb shocks and accelerate transformation. Learn what Splunk does and why customers choose Splunk.  

 

.conf & .conf Go 2 Min Read

The Best of .conf20: Observability Sessions

Whether you’re just catching up on the fun of our first all-virtual .conf or want to relive the glory of sessions past, we’re here to keep you up to speed about your options. Check out the best of our .conf20 Observability sessions and DevOps track to learn about our product announcements, the essentials of Kubernetes monitoring, tech trends for SRE and more.
Platform 3 Min Read

Genesys + Splunk = Complete Control Over Your Contact Center

Splunk released the Genesys App for Splunk, which allows customers to get real-time insights into agent status, agent performance, and queue performance of your Genesys Engage contact center environment via API integration with one or more of your Genesys Pulse instances. Today, we're exploring what's inside the Genesys App for Splunk.
Security 3 Min Read

Onboarding Threat Indicators into Splunk Enterprise Security: SolarWinds Continued

Apply these best practices to effectively ingest threat indicators to combat the SolarWinds Sunburst Backdoor malware in Splunk Enterprise Security (ES).
Partners 2 Min Read

AWS Well-Architected Workload Recommendations in Splunk

Learn how to build high-performing, resilient, and efficient infrastructure for your workloads using the improvement summary recommendations dashboard within the Grand Central App for Splunk.
Bulletins 1 Min Read

Splunk Update on SolarWinds Supply Chain Attack

Splunk’s Chief Customer Officer, John Sabino, shares an update on the SolarWinds Supply Chain Attack and reiterates our commitment to supporting our customers at all times.
Security 2 Min Read

Top 5 Considerations for Implementing SOAR Technology

Security Orchestration, Automation, and Response (SOAR) solutions are becoming increasingly valuable. Before you get started, has your security operations team looked into the top 5 questions to consider?