Posts tagged with ‘es’

  • Splunk ES Implementation Checklist

    By on May 14, 2020

    Congratulations! Your organization has had the foresight to purchase Splunk’s Enterprise Security along with expert Professional Services to...

    Aditum Partners
  • Splunk Attack Range Setup Guide

    By on May 4, 2020

    Splunk Attack Range allows you to create vulnerable local or cloud environments, to simulate attacks and collect the data...

    Aditum Partners
  • Hardening Your Splunk Environment

    By on March 19, 2020

    According to the Ponemon Institute the average cost of data breach for a company is $3.8 million dollars. …

    Aditum Partners
  • CIM Compliance – A Simple Walkthrough

    By on February 14, 2020

    Making data CIM compliant can be a daunting and confusing exercise for new Splunkers and experienced ones alike. Often…

    Aditum Partners
  • CIM, What… Why… How…

    By on February 3, 2020

    During your SIEM journey there will be many terms thrown your way, understanding those terms is absolutely essential when...

    Aditum Partners
  • What is SOAR Technology?

    By on November 26, 2019

    There’s currently a major adoption occurring around SOAR products Security Orchestration, Automation and Response.  What is SOAR?  SOAR is...

    Aditum Partners
  • Splunk Health Monitoring Best Practices

    By on June 24, 2019

    Did you know that Splunk already has built-in health checks that can tell you if something important was misconfigured...

    Aditum Partners
  • Splunk ES Assets and Identities – Critical to a Successful Deployment

    By on February 23, 2018

    Assets and identities provide critical context to the notable events generated by your correlation searches. Learn tips for…

    Aditum Partners