Splunk

Results: 154



#Item
61Splunk / System administration / CFO / Chief financial officer / NetSuite / Autodesk / Management / Information technology management / Business / Data security

FOR IMMEDIATE RELEASE Media Contact: Nicole Garroutteext. 305

Add to Reading List

Source URL: www.ecs-sf.org

Language: English - Date: 2013-04-17 16:36:21
62Computer programming / Splunk / Timestamp / Windows PowerShell / File system / Batch file / JavaScript / Extensible Storage Engine / Computing / Scripting languages / Software engineering

Best Practices for Building Splunk Apps and Technology Add-ons Presented by: Jason Conger

Add to Reading List

Source URL: challenges.s3.amazonaws.com

Language: English - Date: 2014-11-18 12:38:53
63Data security / Splunk / System administration / Workforce management / Software as a service / Infrastructure optimization / Cloud computing / Computing / Centralized computing / Management

logentries.com Case Study Motus Motus uses Logentries to aggregate, monitor and alert in real-time on its log data across its services

Add to Reading List

Source URL: info.logentries.com

Language: English - Date: 2015-02-20 14:56:56
64National security / Data security / Computer crimes / Public safety / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Security information and event management / Security event manager / Information security / Security / Computer security / Crime prevention

ESG Solution Showcase An Analytics-based Approach to Cybersecurity Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Since the Google Aurora incident announced in 2010, large organizations have faced

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2015-06-05 21:30:42
65System administration / Data security / Splunk / Cloud infrastructure / Amazon.com / Software as a service / Chef / Amazon Elastic Compute Cloud / Continuous integration / Cloud computing / Computing / Centralized computing

CASE STUDY : Opscode + Splunk CLOUD RULE #536: There’s no such thing as being ‘too agile.’

Add to Reading List

Source URL: www.chef.io

Language: English - Date: 2015-05-29 14:56:43
66Webroot Software / Computer network security / Splunk / Cyberwarfare / Phishing / IP address / Threat / Computer security / Computing / Spamming

FOR ENTERPRISE BrightCloud IP Reputation Service for Splunk ® ®

Add to Reading List

Source URL: www.brightcloud.com

Language: English - Date: 2015-04-13 13:56:27
67Participatory design / Geography of California / San Francisco / Splunk

Diane Loviglio www.dianeloviglio.com Education

Add to Reading List

Source URL: www.dianeloviglio.com

Language: English - Date: 2011-03-03 08:18:10
68NetOps / Information technology / Computing / Technology / System administration / Data security / Splunk

MONITOR - SOLUTIONS BRIEF Deploying EndaceProbe™ Intelligent Network Recorders and Splunk Enterprise Endace and Splunk Enterprise deliver an elegant and seamless workflow solution for detecting and resolving network i

Add to Reading List

Source URL: www.emulex.com

Language: English
69Computer security / Cybercrime / Webroot Software / Splunk / Phishing / Internet security / Botnet / Fast flux / DNS spoofing / Computer network security / Spamming / Computing

FOR ENTERPRISE BrightCloud IP Reputation Service for Splunk ® ®

Add to Reading List

Source URL: www.brightcloud.com

Language: English - Date: 2015-01-16 11:10:09
70System administration / Information / Data security / Splunk / Local area networks / Telecommunications engineering / Storage area network / Computer data storage / Database / Computing / Computer storage / Information technology management

PDF Document

Add to Reading List

Source URL: info.nimblestorage.com

Language: English - Date: 2015-05-23 05:40:13
UPDATE