Splunk Users: Tips and Tricks

  • Splunk ES Implementation Checklist

    By on May 14, 2020

    Congratulations! Your organization has had the foresight to purchase Splunk’s Enterprise Security along with expert Professional Services to...

    Aditum Partners
  • Splunk Attack Range Setup Guide

    By on May 4, 2020

    Splunk Attack Range allows you to create vulnerable local or cloud environments, to simulate attacks and collect the data...

    Aditum Partners
  • Hardening Your Splunk Environment

    By on March 19, 2020

    According to the Ponemon Institute the average cost of data breach for a company is $3.8 million dollars. …

    Aditum Partners
  • Should I Migrate my Splunk Environment to Python 3? Yes…No…Yes!!!

    By on March 12, 2020

    Now that Splunk’s newest release (8.0) supports Python3 we have fielded many questions from customers on what the practical…

    Aditum Partners
  • A Splunk Engineer’s Guide to Migration

    By on February 28, 2020

    As a Splunk Professional Services consultant I have the good fortune of working with really smart and experienced engineers,…

    Aditum Partners
  • CIM Compliance – A Simple Walkthrough

    By on February 14, 2020

    Making data CIM compliant can be a daunting and confusing exercise for new Splunkers and experienced ones alike. Often…

    Aditum Partners
  • CIM, What… Why… How…

    By on February 3, 2020

    During your SIEM journey there will be many terms thrown your way, understanding those terms is absolutely essential when...

    Aditum Partners
  • Splunk 2020 Predictions

    By on January 15, 2020

    In a this rapidly changing digitized world, data is at the root of everything, and essential to solving every...

    Aditum Partners
  • 12 Steps to Splunk Success

    By on December 16, 2019

    Splunk can provide transformational value to both middle-market as well as enterprise organizations. As with any IT solution, and...

    Aditum Partners
  • AWS Lambda vs AWS Firehose

    By on November 22, 2019

    Splunk has multiple methods in regards to Getting Data In (GDI).  One very popular method is the Http Event...

    Aditum Partners