Suche senden
Hochladen
Webinar: Neues zur Splunk App for Enterprise Security
•
0 gefällt mir
•
10,375 views
Georg Knon
Folgen
Webinar: Neues zur Splunk App for Enterprise Security
Weniger lesen
Mehr lesen
Software
Melden
Teilen
Melden
Teilen
1 von 27
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
Splunk
Gov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior Analytics
Splunk
Splunk for Security - Hands-On
Splunk for Security - Hands-On
Splunk
Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
Splunk
Gov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior Analytics
Splunk
Build a Security Portfolio That Strengthens Your Security Posture
Build a Security Portfolio That Strengthens Your Security Posture
Splunk
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk
Empfohlen
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
Splunk
Gov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior Analytics
Splunk
Splunk for Security - Hands-On
Splunk for Security - Hands-On
Splunk
Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
Splunk
Gov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior Analytics
Splunk
Build a Security Portfolio That Strengthens Your Security Posture
Build a Security Portfolio That Strengthens Your Security Posture
Splunk
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk
Splunk Enterprise Security
Splunk Enterprise Security
Splunk
Building an Analytics Enables SOC
Building an Analytics Enables SOC
Splunk
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
Splunk
Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session
Splunk
Splunk for Security-Hands On
Splunk for Security-Hands On
Splunk
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IBM Danmark
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Splunk
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Erin Sweeney
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk
Enterprise Security featuring UBA
Enterprise Security featuring UBA
Splunk
Splunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case Study
Andrew Gerber
Security investigation hands-on workshop 2018
Security investigation hands-on workshop 2018
YoungCho50
Operational Security Intelligence
Operational Security Intelligence
Splunk
Splunk for Security
Splunk for Security
Gabrielle Knowles
Splunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
Splunk
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
Splunk
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk
Weitere ähnliche Inhalte
Was ist angesagt?
Splunk Enterprise Security
Splunk Enterprise Security
Splunk
Building an Analytics Enables SOC
Building an Analytics Enables SOC
Splunk
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
Splunk
Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session
Splunk
Splunk for Security-Hands On
Splunk for Security-Hands On
Splunk
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IBM Danmark
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Splunk
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Erin Sweeney
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk
Enterprise Security featuring UBA
Enterprise Security featuring UBA
Splunk
Splunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case Study
Andrew Gerber
Security investigation hands-on workshop 2018
Security investigation hands-on workshop 2018
YoungCho50
Operational Security Intelligence
Operational Security Intelligence
Splunk
Splunk for Security
Splunk for Security
Gabrielle Knowles
Splunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
Splunk
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
Splunk
Was ist angesagt?
(20)
Splunk Enterprise Security
Splunk Enterprise Security
Building an Analytics Enables SOC
Building an Analytics Enables SOC
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session
Splunk for Security-Hands On
Splunk for Security-Hands On
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics
Enterprise Security featuring UBA
Enterprise Security featuring UBA
Splunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case Study
Security investigation hands-on workshop 2018
Security investigation hands-on workshop 2018
Operational Security Intelligence
Operational Security Intelligence
Splunk for Security
Splunk for Security
Splunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security Session
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
Ähnlich wie Webinar: Neues zur Splunk App for Enterprise Security
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk
Operational Security
Operational Security
Splunk
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident Investigation
Georg Knon
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
Splunk
SplunkLive! Wien - Splunk für Security
SplunkLive! Wien - Splunk für Security
Splunk
SplunkLive! Zürich - Splunk für Security
SplunkLive! Zürich - Splunk für Security
Splunk
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
Adam Tice
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
Splunk for Security Breakout Session
Splunk for Security Breakout Session
Splunk
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Splunk
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
Splunk
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Splunk
Operational Security Intelligence Breakout Session
Operational Security Intelligence Breakout Session
Splunk
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Andrew Gerber
Ähnlich wie Webinar: Neues zur Splunk App for Enterprise Security
(20)
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Operational Security
Operational Security
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident Investigation
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
SplunkLive! Wien - Splunk für Security
SplunkLive! Wien - Splunk für Security
SplunkLive! Zürich - Splunk für Security
SplunkLive! Zürich - Splunk für Security
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Security Breakout Session
Splunk for Security Breakout Session
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Operational Security Intelligence Breakout Session
Operational Security Intelligence Breakout Session
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mehr von Georg Knon
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Georg Knon
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Georg Knon
SplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case Swisscom
Georg Knon
SplunkLive! Zürich 2016 - Use Case Helvetia
SplunkLive! Zürich 2016 - Use Case Helvetia
Georg Knon
SplunkLive! Zürich 2016 - Use Case Adcubum
SplunkLive! Zürich 2016 - Use Case Adcubum
Georg Knon
Splunk Webinar: Splunk für Application Management
Splunk Webinar: Splunk für Application Management
Georg Knon
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Georg Knon
Splunk for IT Operations Breakout Session
Splunk for IT Operations Breakout Session
Georg Knon
Getting started with Splunk - Break out Session
Getting started with Splunk - Break out Session
Georg Knon
Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...
Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...
Georg Knon
Splunk Webinar: Verwandeln Sie Datensilos in Operational Intelligence
Splunk Webinar: Verwandeln Sie Datensilos in Operational Intelligence
Georg Knon
5 Möglichkeiten zur Verbesserung Ihrer Security
5 Möglichkeiten zur Verbesserung Ihrer Security
Georg Knon
Splunk IT Service Intelligence
Splunk IT Service Intelligence
Georg Knon
Data models pivot with splunk break out session
Data models pivot with splunk break out session
Georg Knon
Splunk IT Service Intelligence
Splunk IT Service Intelligence
Georg Knon
Splunk Internet of Things Roundtable 2015
Splunk Internet of Things Roundtable 2015
Georg Knon
Webinar splunk cloud saa s plattform für operational intelligence
Webinar splunk cloud saa s plattform für operational intelligence
Georg Knon
Splunk Webinar: Maschinendaten anreichern mit Informationen
Splunk Webinar: Maschinendaten anreichern mit Informationen
Georg Knon
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Georg Knon
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Georg Knon
Mehr von Georg Knon
(20)
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
SplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case Helvetia
SplunkLive! Zürich 2016 - Use Case Helvetia
SplunkLive! Zürich 2016 - Use Case Adcubum
SplunkLive! Zürich 2016 - Use Case Adcubum
Splunk Webinar: Splunk für Application Management
Splunk Webinar: Splunk für Application Management
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk for IT Operations Breakout Session
Splunk for IT Operations Breakout Session
Getting started with Splunk - Break out Session
Getting started with Splunk - Break out Session
Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...
Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...
Splunk Webinar: Verwandeln Sie Datensilos in Operational Intelligence
Splunk Webinar: Verwandeln Sie Datensilos in Operational Intelligence
5 Möglichkeiten zur Verbesserung Ihrer Security
5 Möglichkeiten zur Verbesserung Ihrer Security
Splunk IT Service Intelligence
Splunk IT Service Intelligence
Data models pivot with splunk break out session
Data models pivot with splunk break out session
Splunk IT Service Intelligence
Splunk IT Service Intelligence
Splunk Internet of Things Roundtable 2015
Splunk Internet of Things Roundtable 2015
Webinar splunk cloud saa s plattform für operational intelligence
Webinar splunk cloud saa s plattform für operational intelligence
Splunk Webinar: Maschinendaten anreichern mit Informationen
Splunk Webinar: Maschinendaten anreichern mit Informationen
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Kürzlich hochgeladen
Copilot para Microsoft 365 y Power Platform Copilot
Copilot para Microsoft 365 y Power Platform Copilot
Edgard Alejos
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
itservices996
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
OnePlan Solutions
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
Tier1 app
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
osttopstonverter
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
Shane Coughlan
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
Jean Silva
Data modeling 101 - Basics - Software Domain
Data modeling 101 - Basics - Software Domain
Abdul Ahad
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
Andrey Devyatkin
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdf
maor17
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
Lionel Briand
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
RTS corp
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
rahul_net
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
vaideheekore1
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
Alexandre Beguel
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
manoharjgpsolutions
Osi security architecture in network.pptx
Osi security architecture in network.pptx
VinzoCenzo
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
Neo4j
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
Shane Coughlan
Kürzlich hochgeladen
(20)
Copilot para Microsoft 365 y Power Platform Copilot
Copilot para Microsoft 365 y Power Platform Copilot
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
Data modeling 101 - Basics - Software Domain
Data modeling 101 - Basics - Software Domain
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdf
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
Osi security architecture in network.pptx
Osi security architecture in network.pptx
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
Webinar: Neues zur Splunk App for Enterprise Security
1.
Copyright © 2015
Splunk Inc. The Splunk App for Enterprise Security Holger Sesterhenn, Sen. Sales Engineer, CISSP MaChias Maier, Security Product MarkeEng, EMEA
2.
2 Ihr Webcast
Team Ma#hias Maier Security Product MarkeEng, EMEA mmaier@splunk.com Holger Sesterhenn Sen. Sales Engineer hsesterhenn@splunk.com
3.
Copyright © 2015
Splunk Inc. Safe Harbor Statement During the course of this presentaEon, we may make forward looking statements regarding future events or the expected performance of the company. We cauEon you that such statements reflect our current expectaEons and esEmates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward-‐looking statements, please review our filings with the SEC. The forward-‐looking statements made in this presentaEon are being made as of the Eme and date of its live presentaEon. If reviewed aSer its live presentaEon, this presentaEon may not contain current or accurate informaEon. We do not assume any obligaEon to update any forward looking statements we may make. In addiEon, any informaEon about our roadmap outlines our general product direcEon and is subject to change at any Eme without noEce. It is for informaEonal purposes only and shall not be incorporated into any contract or other commitment. Splunk undertakes no obligaEon either to develop the features or funcEonality described or to include any such feature or funcEonality in a future release.
4.
Copyright © 2015
Splunk Inc. How Can Splunk Help?
5.
Roadmap Security Strategy
Security Posture Visual Security AnalyEcs Advanced Threats Insider Threat
6.
Roadmap Security Strategy
7.
Source: Mandiant M-‐Trends
Report 2012/2013/2014 67% VicEms noEfied by an external enEty 100% Valid credenEals were used 229 Median # of days before detecEon The Ever-‐Changing Threat Landscape
8.
Copyright © 2015
Splunk Inc. Intrusion DetecEon Firewall Data Loss PrevenEon AnE-‐Malware Vulnerability Scans AuthenEcaEon TradiEonal Security Strategy
9.
Copyright © 2015
Splunk Inc. Connect the Dots Across All Data Servers Storage Desktops Email Web TransacEon Records Network Flows Hypervisor Custom Apps Physical Access Badges Threat Intelligence Mobile CMBD DHCP/DNS Intrusion DetecEon Firewall Data Loss PrevenEon AnE-‐ Malware Vulnerability Scans AuthenEcaEon
10.
Copyright © 2015
Splunk Inc. ConnecEng the “Data Dots” via MulEple/Dynamic RelaEonships Persist, Repeat Threat Intelligence Auth—User Roles Host Ac@vity/Security Network Ac@vity/Security ACacker, know relay/C2 sites, infected sites, IOC, aCack/campaign intent and aCribuEon Where they went to, who talked to whom, aCack transmiCed, abnormal traffic, malware download What process is running (malicious, abnormal, etc.) Process owner, registry mods, aCack/malware arEfacts, patching level, aCack suscepEbility Access level, privileged users, likelihood of infecEon, where they might be in kill chain Delivery, exploit installa@on Gain trusted access Exfiltra@on Data gathering Upgrade (escalate) lateral movement Persist, repeat
11.
AnalyEcs-‐Driven Security Risk
Based Context and Intelligence ConnecEng Data and People
12.
Copyright © 2015
Splunk Inc. Sample Nasdaq -‐ Heartbleed
13.
Complement, replace and
go beyond tradi@onal SIEMs Security Intelligence Use Cases 13 SECURITY & COMPLIANCE REPORTING REAL-‐TIME MONITORING OF KNOWN THREATS MONITORING OF UNKNOWN THREATS INCIDENT INVESTIGATIONS & FORENSICS FRAUD DETECTION INSIDER THREAT
14.
Roadmap Security Strategy
• ConnecEng Data and People Security Posture
15.
15 What’s New
in Splunk App for Enterprise Security 3.3 BeCer DetecEon of Advanced Threats • STIX/TAXII & OpenIOC threat intelligence • IOC/arEfacts research Improved CollaboraEon • Export correlaEon searches, KSIs, swim lanes BeCer DetecEon of Malicious Insiders • User acEvity monitoring dashboard and swim lanes • Access anomalies Faster Incident Response • Added funcEonality to Incident Response page Benefit Feature
16.
Roadmap Security Strategy
• ConnecEng Data and People Security Posture • SituaEonal Awareness Visual Security AnalyEcs
17.
Roadmap Security Strategy
• ConnecEng Data and People Security Posture • SituaEonal Awareness Visual Security AnalyEcs • Contextual Analysis Advanced Threats
18.
Copyright © 2015
Splunk Inc. hCp://sExproject.github.io/about/
19.
Copyright © 2015
Splunk Inc. STIX/TAXII and Open IOC 101 • Info sharing across companies and industries • Standardized XML • Contains TTPs, IOCs, COA • IOCs include IPs, web/e-‐mail domains, hashes, processes, registry key, cerEficates • hCp://sExproject.github.io/about/
20.
Copyright © 2015
Splunk Inc. Threat Intelligence in Splunk
21.
Copyright © 2015
Splunk Inc. TAXII Services Source: hCp://hailataxii.com
22.
Copyright © 2015
Splunk Inc. Sample TAXII Feeds User Community Organisa@on Cyber Threat XChange Health InformaEon Trust Alliance Defense Security InformaEon Exchange Defense Industrial Base InformaEon and Sharing and Analysis OrganizaEon ICS-‐ISAC Industrial Control System InformaEon Sharing and Analysis Center NH-‐ISAC NaEonal Health Cybersecurity Intelligence Planorm NaEonal Health InformaEon and Analysis Center FS-‐ISAC / Soltra Edge Financial Services InformaEon Sharing and Analyses Center (FS-‐ISAC) Retail Cyber Intelligence Sharing Center, Intelligence Sharing Portal Retail InformaEon Sharing and Analysis Center (Retail-‐ISAC) More: hCp://sExproject.github.io/supporters/
23.
Roadmap Security Strategy
• ConnecEng Data and People Security Posture • SituaEonal Awareness Visual Security AnalyEcs • Contextual Analysis Advanced Threats • Knowledge Sharing and AdopEon Insider Threat
24.
Copyright © 2015
Splunk Inc. DetecEng Suspicious User AcEvity • Spot suspicious user acEvity • Malicious insider or external threat using stolen credenEals • High aggregate risk score • Uploaded data to non-‐corp sites • Emailed data to non-‐corp domains • Visits to blacklisted sites • Remote access • Anomalous help desk Ecket
25.
Roadmap Security Strategy
• ConnecEng Data and People Security Posture • SituaEonal Awareness Visual Security AnalyEcs • Contextual Analysis Advanced Threats • Knowledge Sharing and AdopEon Insider Threat • Stop Data Breaches
26.
Copyright © 2015
Splunk Inc. Case Study: Telenor " Challanges: – Millions of customers, thousands of servers and routers and they had missing details in operaEve tasks. – CommunicaEon between departments was challanging. – Errors and issues sporadically slipped unnoEced. " Breakthroughs: – Team noEced WebMail accounts being abused to send hundreds of thousands of SMS messages abroad – Baselining normal and track DeviaEon – Understand aCackers and their behaviour to take them down proacEve. Norway's largest telecom services provider 160 Mio mobile subscribers globally
27.
Copyright © 2015
Splunk Inc. Thank You! Q&A
Jetzt herunterladen