Explore Resources
or
or
Clear All
The Forrester Wave: Security Analytics Platforms, Q1 2017
Forrester assess the state of the security analytics market
Exploring Splunk: Search Processing Language (SPL) Primer and Cookbook
Explore Splunk and dive into the value of machine data.
Masters of Machines: Business insight from IT operational intelligence
Analyst firm Quocirca reveals the untapped opportunity in Operational Intelligence.
Worldwide IT Event and Log Management Software Market Shares, 2016
Market revenue and vendors in this accelerating market
Data Secrets Revealed: A Collection of Security Customer Stories
See how leading organizations are turning machine data into business and security insights.
The Five Essential Capabilities of an Analytics-Drive SOC
Launch a security architecture that effectively prevents, detects, responds and predicts
The Science Behind Building a Kill Chain
Learn how data science and machine learning can find unknown threats
Security Investigation and Rapid Response Using Splunk and Amazon Web Services
Discover how Splunk and AWS can help you find and remediate security problems.
The Essential Guide to Machine Data: User and Application Data
Gain value from the data your users and applications create.
Masters of Machines III: Mitigating the Impact of Critical IT Events
Research reveals how critical IT events can impact the average European business.
The Accenture Cyber Defense Platform - Architectural Overview
Learn how enterprises can utilize applications to mitigate risk.
The Big Data Campaign Trail: Clarus Research Report
Learn how big data can help the public sector reach mission success.
Operational Intelligence: Executive Summary
Harness machine data for true operational insights
A New Approach to Combat Cyberattacks
Use Splunk UBA to capture threat footprints and detect anomalies.
The Modern Enterprise Data Fabric: Helping the Public Sector Transform Digitally
Learn what the digital transformation means for the public sector.
The Essential Guide to Machine Data: IOT & Other Data Sources
Learn the value of IoT data and other data sources.
The Essential Guide to Machine Data: Network Machine Data
Learn about the value your network machine data creates.
SIEM RFP New Questions for New Times
Learn what to look for in a SIEM solution.
Extracting More Value from SIEM Deployments: Integrated Splunk with ArcSight
Extract more value from SIEM deployments using Splunk with ArcSight.
Splunk Big Data and the Future of Security
Learn how big data can improve your security posture.
Mapping Splunk Enterprise to PCI Requirements
Learn how to use Splunk to achieve PCI compliance.
Demystifying Compliance
Learn how Splunk can help you adhere to compliance standards.
The Big Machine: Creating Value Out of Machine Driven Big Data
GigaOM Pro & Splunk: Understand the benefits of big data.
Achieving Your Digital Transformation With Dell EMC and Splunk
Buy Dell EMC infrastructure with Splunk or build your own solution.
Splunk and the Cybersecurity Framework
Use Splunk to implement the risk management guidance
Challenges to Risk Management Framework
Use Splunk to navigate the RMF
How Machine Data Supports GDPR Compliance
Master the risks to get ahead of GDPR mandates
Global Customer Support - Support Enablement
Take full advantage of Splunk & scale to requirements
Global Customer Support - Success Management
Get maximum value from your investment
How Government IT Can Counter Security Threats By Analyzing Big Data
How governments counter threats by analyzing big data
App Management: Racing Ahead of the Competition
Your answers are hiding in silos--can you find them?
Leveraging Big Data at the State and Local Level
Big data solution essential to government IT operations
Splunk and Government Insider Threat Detection Program
Bring analytical context to anomalous IT behaviors
Control Virtual Chaos: A New Approach for Managing Virtual Environments
Big data provides visibility for complex landscapes
Datacenter Virtualization
Big data analysis provides the right information at the right time
Operationalizing Threat Intelligence Using Splunk Enterprise Security
Pinpoint potential threat activity
Why You Need Improved Operational Intelligence for Big Data
Machine data improves government ops
Taking Your SIEM to the Cloud
Strengthen security management with cloud-based SIEM
Too Many Hats, Not Enough Heads
Comprehensive solution for small IT environments
Driving DevOps Success with Data
Optimize business results, prove value with analytics
Embracing the Strategic Opportunity of IT
Enable a business-aware IT
How Data & Operational Intelligence Drive Public Sector Mission Success
Stop malicious activity before it's a breach
Building a Splunk Center of Excellence
Sharing best practices brings the most out of your data
Multiple Splunk as a Service
Building the architecture for multitenant Splunk deployments
Security Investigation, Detection, & Rapid Response
Faster investigation equals quicker mitigation and prevention
Splunk Enterprise on AWS: Deployment Guidelines
Turn machine data - physical or virtual - into valuable insights
Using Healthcare Machine Data for Operational Intelligence
Reduce fraud, improve patient outcomes, aid HIPAA audits
The Six Essential Capabilities of an Analytics-Driven SIEM
Modern threats demand analytics-driven security
Enhance AWS Security with Splunk Solutions
Migrating to AWS with security & peace of mind
The Path to Operational Intelligence
Go from reactive problem-solving to data-driven insights
You Can't Spell "Digital Transformation Without IT"
Transforming IT into a key driver of innovation
Splunk for Managed Service Providers - Technical Architecture
Designing & deploying Splunk for MSPs
Splunk for Managed Security Service Providers - Technical Architecture
Designing & deploying Splunk for MSSPs
Using Splunk UBA - Insider Threats
Splunk UBA creates self-learning baseline to uncover deviations
Using Splunk UBA to Detect Cyber Attacks
Use Splunk UBA to capture threat footprints & detect anomalies
Splunk for Advanced Threat Detection
Analyzing all your data can uncover signs of advanced threats
Smart Soldiers
Accelerate mission operational efficiencies
Make Your IT Services Smarter
Gain SI from machine-learning-powered analytics
Using Splunk User Behavior Analytics
Implement flexible, scalable security for customer deployments
Using Splunk Adaptive Response
Multi-vendor approach enables deeper investigations, automated responses
Splunk Software as a SIEM
Simplify security management with cloud-based SIEM
Add-Ons and Apps in the Splunk Quick Start for Infrastructure Monitoring
Visibility helps you find & fix problems faster
Add-Ons and Apps in the Splunk Quick Start for Application Monitoring
One-stop shop to getting insights into your critical applications
Smart Transportation
Make transportation safer, smarter and stress-free with Splunk
Splunk and Amazon Web Services
Meet or exceed your security and compliance standards
Splunk for CDM & CMaaS
Deliver high functionality, greatly reduce risk
Deploying Splunk Enterprise in Virtual Environments
Configure your virtual machines to run Splunk software
Building a SOC with Splunk
Power your SOC with effective processes, build security posture
Deploying Splunk Enterprise on Microsoft Azure
Rapidly gain insights from massive amounts of machine data
Splunk for Risk Management Framework
Step-by-step monitoring process of NIST 800-53 controls
Using Modules in Splunk IT Service Intelligence
Fast-track data collection, accelerate productivity, gain insights
Deploying Splunk Enterprise in AWS
Implement or extend Splunk Enterprise on the AWS cloud
Deploying Splunk Enterprise on Google Cloud Platform
Leverage machine data to deepen business understanding
Splunk for Retail
Support omni-channel strategies, satisfy customers, see trends
Splunk for Healthcare
Reduce risks, protect PHI, help HIPAA compliance
Splunk for Fraud Detection
Preventing fraud protects your customers and your reputation
Splunk for Financial Services
Detect fraud, build customer experience, guard against threats
Splunk for Communication Service Providers
Improve customer experience, service delivery & security posture
Splunk for Business Analytics
Leverage a new class of data to gain business insights
Splunk for Government Healthcare
Automate early breach detection & continuously monitor threats
Splunk for Compliance
Using machine data to meet compliance requirements
Splunk for K-12
Improve uptime, understand trends, support student performance
Splunk for Government
Better visibility serves the public better & faster
Splunk for Higher Education
Use OI to identify problems, risks & opportunities
Splunk for Big Data Analytics
Learn how to transform your raw data into business value
Splunk for Public Safety
Use analytics to lower crime & optimize resources
Splunk for Security
Monitor, detect, analyze and prevent high-priority threats
Splunk for Aerospace and Defense
Streamline compliance, security, mergers & acquisitions in A & D
Splunk for Industrial Data and the IoT
Gain new insights from devices, sensors & machine technologies
Splunk for Defense
Achieve security & efficiencies through data-driven intelligence
Splunk for IT Operations
End-to-end visibility, problem solving across IT infrastructure
Splunk for Application Delivery
Deliver better applications, faster MTTR with less time & effort
Splunk Light
Full log search & analysis of your small IT environment
Splunk for VMware
Immediate visibility into your VMware environment's health
Splunk App for Microsoft Exchange
Operational visibility for MS Exchange-based infrastructures
DB Connect
Scalable, real-time integration with relational databases
Splunk Enterprise
Drive business results with operational intelligence
Splunk App for Amazon Web Services
Collect & analyze data from over 15 AWS sources
Splunk User Behavior Analytics
Detect known / unknown cyberthreats & insider attacks
Splunk IT Service Intelligence
Service monitoring with machine learning, analytics for IT
Splunk Enterprise Security
Monitor for threats with analytics-driven security
Splunk Stream
See application performance, customer experience in real time
Splunk Cloud
See why Splunk Cloud is the leading platform for OI
Splunk App for AWS
Gain end-to-end visibility across AWS environment
Splunk and Cisco
Splunk & Cisco deliver operational intelligence at scale
Splunk and Verizon Managed Security Services
Find threats faster, streamline security
Enterprise Machine Data Fabric
See -- and embrace -- how the digital world is changing
Masters of Machines III: Mitigating the Impact of Critical IT Events
Downtime now ranks higher concern than security
Improve Your DevOps Game With Machine Data
Steps for using machine data to improve DevOps
Splunk Public Sector IT Ops Research
Use public sector IT Ops research for mission success
AWS Visibility + Splunk Visibility = Cloud Success
View why Splunk + AWS = Cloud success
Getting Started With Splunk for Application Management
Step-by-step guide to improving application insight
Getting Started with Splunk for Monitoring & Diagnostics
Guide to real-time insights into industrial operations
Getting Started with Splunk for Container Monitoring
Take an analytics-driven approach to container performance
Splunk for Business Process Analytics
Be an IT over-achiever: Gain real-time insights into biz processes
Splunk for Customer Experience Analytics
How IT & analytics help improve customer experience
Listen to Your Data: Profiles of Customer Success With the Splunk Platform
Profiles of customer success with Splunk
Splunk and the CIS Critical Security Controls
Splunk's impact on these Top 20 critical security controls
Essential Guide to Machine Data
Ingest, correlate & analyze your machine data
Splunk 2018 Predictions
See what's in store for machine learning, IT operations, security & IoT
Splunk 2017 Predictions
Crystal ball views into cloud, IoT, analytics, security, DevOps
Splunk Quick Start for Infrastructure Monitoring
Get complete visibility into applications & services
The Essential Guide to Machine Data: Middleware and OS Data
Get value from the data created by your middleware and OS.
Splunk Quick Start for Application Management
Resolve problems, reduce downtime, raise customer satisfaction
The Essential Guide to Machine Data: Infrastructure Machine Data
How to leverage value from your infastructure machine data.
Splunk Quick Start for SIEM
Get up & running fast using Splunk ES, analytics-driven SIEM
Splunk Quick Start for Security Investigation - Infrastruture
Quickly improve search & analysis of firewalls, proxies, IDS/IPS
Splunk Quick Start for Security Investigation - Endpoint
Improve investigations, see results from endpoint data analysis
Quick Reference Guide
Product features, functions, concepts & components
Splunk Company Overview
Make machine data make sense - for business, IT & security
Gaining the Situational Awareness to Mitigate Cyberthreats
Raise awareness, save time, raise morale
IDC Report-Worldwide ITOA Software Market, 2016
Market & vendor share estimates in this expanding market
Gartner 2016 Magic Quadrant and Critical Capabilities for SIEM
Advance security analytics with Splunk Enterprise Security as a SIEM
Investigation or Exasperation? The State of Security Operations
How organizations are coping with increasing attacks.
U.S. Public Sector in IT Operations
Learn the latest challenges and trends in U.S. public sector IT operations.
U.K. Public Sector in IT Operations
Learn the latest challenges and trends in U.K. public sector IT operations.
Insights Everywhere—Gaining More Value From Cloud and Hybrid
Splunk and Amazon Web Services (AWS) Customer Success Stories
Banking on Machine Data
How the Financial Services Industry Can Prevent Cyberattacks, Transform IT and Streamline Business Operations
Cybersecurity Analytics and Operations Has Evolved
CISOs are moving towards an integrated security operations and analytics platform architecture.
Make Your IT Events Less Eventful
How to discover what matters so you can solve problems faster
Booz Allen Cyber4Sight for Splunk
Learn how Booz Allen and Splunk offer actionable intelligence to anticipate attacks and address complex challenges
Cybersecurity Analytics and Operations in Transition
Aligning security operations and IT governance with automation
Modernize ECA With IT Infrastructure Monitoring Tools
Combine IT infrastructure monitoring with IT service alerting tools for basic postprocessing of events
Using Splunk ITSI for Event Analytics
How to simplify incident detection, reduce time-to-resolution and gain cohesive service insights
Splunk Integrated Behavior Analytics
Explore crawl, walk and run approach to UEBA
Machine Learning Quick Reference Guide
A quick list of machine learning search commands and tips on algorithms from the Splunk Machine Learning Toolkit.
Data Secrets Revealed
Learn how customers across industries are unleashing the power of machine data.
Taking IT to the Next Level
How IT can partner with the business, adopt data-centric DevOps and be successful with containers.
Operationalize Machine Learning
Learn how to use Splunk to detect malicious domain names
Three Companies. IT Security. Machine Data.
Learn how companies are leveraging machine data to protect against cyberthreats
Splunk Disrupts the Traditional SIEM
Learn the benefits of an analytics-driven SIEM
From Aspirational to Operational: How State & Local Government Can Harness Data to Become a Smart Community
Learn how machine data can make cities smarter.
Gartner Market Guide for AIOps Platforms
Gartner's recommendations on how to optimize IT operations to drive business value
Top 5 Key Takeaways from .conf2017
Didn’t make it to .conf2017? Don’t worry, we have you covered.
Why You Should Take Security in the Cloud
Learn the benefits of security as a service
Driving Institutional Research Excellence With NIST 800-171 Compliance
Learn how Splunk drives NIST 800-171 compliance
Four Easy Ways Central Logging Improves Security Posture
Learn how central logging can improve your security posture now.
Data Secrets Revealed: A Collection of IT Operations Customer Stories
See how organizations are transforming their IT environments for the better.
Getting Started With Splunk Insights for AWS Cloud Monitoring
Troubleshoot and monitor your AWS cloud infrastructure
Damage Control - The Impact of Critical IT Incidents
Analyst firm Quocirca reveals cost and time associated with IT troubleshooting
Ransomware 101/Learn 3 key ways to defend against the malware
Learn 3 key ways to defend against the malware
All Data, All Uses
Learn how big data solves government challenges
Gain end-to-end visibility
Learn how big data gives insights to the public sector
Splunk Highlights Three Ms: Metrics, Machine Learning and More
451 Research highlights Splunk's announcements from .conf2017
Get Your Cloud Migration Strategy Right
Tips for making your transition to the cloud successful