Posts tagged with ‘security data journey’

  • Splunk Assets and Identities

    By on June 18, 2020

    Speed and Accuracy are key to Enterprise Security. In this video, you’ll see how Splunk’s Assets and Identities...

    Aditum Partners
  • Splunk ES Implementation Checklist

    By on May 14, 2020

    Congratulations! Your organization has had the foresight to purchase Splunk’s Enterprise Security along with expert Professional Services to...

    Aditum Partners
  • Splunk Attack Range Setup Guide

    By on May 4, 2020

    Splunk Attack Range allows you to create vulnerable local or cloud environments, to simulate attacks and collect the data...

    Aditum Partners
  • CIM Compliance – A Simple Walkthrough

    By on February 14, 2020

    Making data CIM compliant can be a daunting and confusing exercise for new Splunkers and experienced ones alike. Often…

    Aditum Partners
  • CIM, What… Why… How…

    By on February 3, 2020

    During your SIEM journey there will be many terms thrown your way, understanding those terms is absolutely essential when...

    Aditum Partners
  • What is SOAR Technology?

    By on November 26, 2019

    There’s currently a major adoption occurring around SOAR products Security Orchestration, Automation and Response.  What is SOAR?  SOAR is...

    Aditum Partners
  • Caught Red Handed…. Using Splunk to Catch Retail Theft Rings

    By on November 4, 2019

    According to The National Retail Federation, retail theft costs U.S. companies $30 Billion a year, with “professional/habitual shoplifters” responsible...

    Aditum Partners
  • Splunk Security Essentials: Advancing Your Security Data Journey

    By on June 7, 2018

    Gain insight into how to advance your organization’s security data journey using Splunk Security Essentials.

    Aditum Partners