Videos

Splunk O11y Cloud Explained: Application Performance Monitoring (APM) – Episode 2

Video Splunk O11y Cloud Explained: Application Performance Monitoring (APM) Episode 2 Series Overview Video Summary This video provides an overview of Splunk Application Performance Monitoring (APM), part of the Splunk Observability Suite. APM offers distributed tracing to help pinpoint issues within microservices, along with dynamic service mapping that visually outlines service interactions, dependencies, and performance […]

Splunk O11y Cloud Explained: Application Performance Monitoring (APM) – Episode 2 Read More »

Splunk O11y Cloud Explained: Synthetic Monitoring – Episode 1

Video Splunk O11y Cloud Explained: Synthetic Monitoring Episode 1 Series Overview Video Summary This video introduces synthetic monitoring within Splunk Observability, showcasing how it enables organisations to track uptime, performance, and create dashboards to report on SLAs for availability. Synthetic monitoring helps optimise user journeys by evaluating and improving page speed and functionality across all

Splunk O11y Cloud Explained: Synthetic Monitoring – Episode 1 Read More »

Splunk for Security Stream Windows DNS Setup - Episode 7

Splunk for Security: Expansion – Window DNS Monitoring – Episode 4

Video Splunk for Security: Expansion – Windows DNS Monitoring Episode 4 Series Overview Video Summary In the final video of the Splunk for Security: Expansion series, the focus is on setting up Windows DNS monitoring using Splunk Stream. The process begins with navigating to the Splunk Stream app, selecting “Configuration,” and then adding a new

Splunk for Security: Expansion – Window DNS Monitoring – Episode 4 Read More »

Splunk for Security Data Flow Capabilities - Episode 6

Splunk for Security: Expansion – Data-Flow Capabilities – Episode 3

Video Splunk for Security: Expansion – Data-Flow Capabilities Episode 3 Series Overview Video Summary In this third installment of the Splunk for Security: Expansion series, the focus shifts to exploring the capabilities of the Splunk Stream app through its dashboards. The video begins by reviewing the data ingested into Splunk, which is now available for

Splunk for Security: Expansion – Data-Flow Capabilities – Episode 3 Read More »

Splunk for Security Stream Data-Flows - Episode 5

Splunk for Security: Expansion – Stream Data-Flows – Episode 2

Video Splunk for Security: Expansion – Stream Data-Flows Episode 2 Series Overview Video Summary In this instalment of the Splunk for Security Expansion series, we delve into the data flow processes within Splunk Stream. The flow mirrors conventional data handling tools: data is captured by forwarders, which are often installed on HEC servers, and then

Splunk for Security: Expansion – Stream Data-Flows – Episode 2 Read More »

Splunk for Security Architecting Streaming - Episode 4

Splunk for Security: Expansion – Architecting Splunk Streams – Episode 1

Video Splunk for Security: Expansion – Architecting Splunk Streams Episode 1 Series Overview Video Summary In this first episode of the Splunk for Security: Expansion series, we explore the architecture and deployment of the Splunk Stream app. Splunk Stream provides real-time visibility into application and infrastructure performance by passively collecting data from the network, without

Splunk for Security: Expansion – Architecting Splunk Streams – Episode 1 Read More »

Splunk for Security What is the Common Information Model (CIM) - Episode 3

Splunk for Security: Normalisation – Understanding CIM – Episode 3

Video Splunk for Security: Normalisation – Understanding CIM Episode 3 Series Overview Video Summary In the third episode of our series on the Common Information Model (CIM), we explore how to maximise the benefits of CIM by effectively normalising data. The CIM itself is essentially a comprehensive collection of data models that Splunk continuously updates

Splunk for Security: Normalisation – Understanding CIM – Episode 3 Read More »

Splunk for Security Data Models Acceleration - Episode 2

Splunk for Security: Normalisation – CIM Data Models Acceleration – Episode 2

Video Splunk for Security: Normalisation – CIM Data Models Acceleration Episode 2 Series Overview Video Summary In the second episode of our series on the Common Information Model (CIM), we explore how to maximise the benefits of CIM by effectively normalising data. The CIM itself is essentially a comprehensive collection of data models that Splunk

Splunk for Security: Normalisation – CIM Data Models Acceleration – Episode 2 Read More »

Splunk for Security CIM Data Models 101 - Episode 1

Splunk for Security: Normalisation – CIM Data Models 101 – Episode 1

Video Splunk for Security: Normalisation – CIM Data Models 101 Episode 1 Series Overview Video Summary This video is the first in a series focusing on the Common Information Model (CIM) and its role in data normalisation. It introduces data models, explaining how they standardise data from multiple sources by aligning different field names and

Splunk for Security: Normalisation – CIM Data Models 101 – Episode 1 Read More »

Lacework Explained Resources and Polygraphs

Lacework FortiCNAPP Explained – Resources and Polygraphs – Episode 6

Video Lacework Explained – Resources and Polygraphs Episode 6 Series Overview Video Summary This video explores the complexities of managing and securing a growing array of cloud resources, focusing on the benefits of centralised visibility and advanced analytics. As organisations face the challenge of tool sprawl across multi-cloud environments, having a unified platform to monitor

Lacework FortiCNAPP Explained – Resources and Polygraphs – Episode 6 Read More »

Scroll to Top