#theCUBE #EMA #Splunk #SplunkConf #Conf2015 #SiliconANGLE
01. David Monahan, EMA, visits theCUBE !. (00:20)
02. Splunk in the Marketplace. (00:40)
03. Finding the Splunk Gaps and Challenges Ahead. (02:07)
04. The Eco System Play in Security for Splunk. (04:54)
05. EMA Survey Highlights. (07:27)
06. Promising New Technology in Security. (09:04)
07. The Top Security Conversations--Personnel. (10:43)
08. What Splunk Needs to do to be Successful. (12:28)
--- ---
Splunk helps power data-driven security | #splunkconf
by Nelson Williams | Sep 24, 2015
Security is a major issue in the tech world, as well as a top priority for technology consumers. Tools that allow companies to detect threats before they strike are a vital part of any serious security program. To that end, Splunk Inc. is moving into the security world by using the power of aggregated data to discover the traces of a potential breach before the company is compromised.
To talk about the implications of data-driven security, John Furrier and Jeff Frick, cohosts of theCUBE, from the SiliconANGLE Media team, spoke to David Monahan, research director of security and risk management with Enterprise Management Associates, Inc. (EMA), at the Splunk .conf2015 conference.
Fitting the pieces in place
The conversation started with a quick discussion about how Splunk fits into the market for security. Monahan agreed that the space was huge. He also explained how Splunk fit in as part of the security ecosystem. Splunk uses data aggregation and analytic technology to find potential concerns by pulling together data from multiple sources. Companies can leverage Splunk for additional capability using the data they already gather and use.
The important thing is that Splunk doesn’t replace the current technology a company uses. Instead, Splunk augments what’s already there, allowing a business to preserve their original capital investment. This vastly reduces the total cost of ownership.
Conversations about security
Monahan then spoke about what people are saying in the security space, both customers and businesses. He brought up surveys that showed the ability to correlate data was huge for companies, which Splunk does to help reduce false positives.
He also pointed out that companies are very concerned about their employee needs, and look to do more with less in this area, seeking tools that help them do their work with fewer, or less experienced, people. The business community also is searching for ways to gain better visibility across their data silos to combine and analyze data from different sources. By applying this visibility to security, companies will be able to detect threats earlier, which is also a big concern.
@theCUBE
#splunkconf
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Splunk.conf 2015 | Las Vegas. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For Splunk.conf 2015 | Las Vegas
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for Splunk.conf 2015 | Las Vegas.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Splunk.conf 2015 | Las Vegas. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to Splunk.conf 2015 | Las Vegas
Please sign in with LinkedIn to continue to Splunk.conf 2015 | Las Vegas. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
David Monahan, Enterprise Management Associates | Splunk .conf2015
#theCUBE #EMA #Splunk #SplunkConf #Conf2015 #SiliconANGLE
01. David Monahan, EMA, visits theCUBE !. (00:20)
02. Splunk in the Marketplace. (00:40)
03. Finding the Splunk Gaps and Challenges Ahead. (02:07)
04. The Eco System Play in Security for Splunk. (04:54)
05. EMA Survey Highlights. (07:27)
06. Promising New Technology in Security. (09:04)
07. The Top Security Conversations--Personnel. (10:43)
08. What Splunk Needs to do to be Successful. (12:28)
--- ---
Splunk helps power data-driven security | #splunkconf
by Nelson Williams | Sep 24, 2015
Security is a major issue in the tech world, as well as a top priority for technology consumers. Tools that allow companies to detect threats before they strike are a vital part of any serious security program. To that end, Splunk Inc. is moving into the security world by using the power of aggregated data to discover the traces of a potential breach before the company is compromised.
To talk about the implications of data-driven security, John Furrier and Jeff Frick, cohosts of theCUBE, from the SiliconANGLE Media team, spoke to David Monahan, research director of security and risk management with Enterprise Management Associates, Inc. (EMA), at the Splunk .conf2015 conference.
Fitting the pieces in place
The conversation started with a quick discussion about how Splunk fits into the market for security. Monahan agreed that the space was huge. He also explained how Splunk fit in as part of the security ecosystem. Splunk uses data aggregation and analytic technology to find potential concerns by pulling together data from multiple sources. Companies can leverage Splunk for additional capability using the data they already gather and use.
The important thing is that Splunk doesn’t replace the current technology a company uses. Instead, Splunk augments what’s already there, allowing a business to preserve their original capital investment. This vastly reduces the total cost of ownership.
Conversations about security
Monahan then spoke about what people are saying in the security space, both customers and businesses. He brought up surveys that showed the ability to correlate data was huge for companies, which Splunk does to help reduce false positives.
He also pointed out that companies are very concerned about their employee needs, and look to do more with less in this area, seeking tools that help them do their work with fewer, or less experienced, people. The business community also is searching for ways to gain better visibility across their data silos to combine and analyze data from different sources. By applying this visibility to security, companies will be able to detect threats earlier, which is also a big concern.
@theCUBE
#splunkconf