Category: Blog

What Are The Newest Machine Learning Capabilities Offered By Splunk?

Since their start, Splunk has focused on machine learning. At the time, that meant analysis of log files and event data. As the Internet of Things (IoT) comes into its own, machine to machine (M2M) communication data will be the core of IoT and operational intelligence. At .conf2016, Splunk's annual user conference, Splunk announced new […]

Read more
Category: Blog

How Dell EMC Landed In the “Magic Quadrant”

40 zettabytes. That's the predicted size of the digital universe by 2020. Data is the big bang that brought this universe into existence. Big data. Structured data. Unstructured data. Businesses now must tackle managing and storing all this information, no matter what form it takes. Distributed file systems (DFS) and object storage are the software […]

Read more
Category: Blog

How to Use ID Management to Protect Yourself from Security Threats

Show of hands: Who thinks security will get easier in 2017? Obviously, no one thinks that. In fact, a roundup of 2017 cybersecurity predictions paints a fairly dire picture. Many of those predictions center around compromised passwords and lax identity and access management (IAM). That’s a top issue for good reason: The 2016 Verizon Data […]

Read more
Category: Blog

Solutions to Finance Your Digital Transformation

Digital transformation. That's a hot topic for nearly every business in existence. Most businesses are either in the middle of or planning for their own digital transformation. Each gives the phrase a different meaning. For one business, it may mean greater use of cloud technology. For another, the phrase signifies a simplified supply and distribution chain. […]

Read more
Category: Blog

Splunk Stakes Out Position As Cybersecurity Leader

Earlier detection. Faster response. That's the wish list of every cybersecurity practitioner. Splunk is trying to grant those wishes. At their fall conference, Splunk staked their claim as cybersecurity leader. That claim has merit as evidenced by their fourth straight year leading Gartner's Magic Quadrant for Security Information and Event Management (SIEM). In Splunk's response […]

Read more
Category: Blog

Not If But When: Why You Need an Incident Response Team on Standby

Last year, half a billion personal records were lost or stolen, the Internet Security Threat Report from Symantec revealed. Ransomware attacks grew by 35%, spear-phishing by 55%. Far more than a simple inconvenience, breaches and attacks come with a high cost. The 2016 Cost of Data Breach Study: Global Analysis found the average data breach […]

Read more
Category: Blog

Improve Your Software-Defined Data Center with Cross-Cloud Architecture

A cloud is a cloud is a cloud. If only that were true. Cloud is the foundation for our software-defined data centers (SDDCs). Yet one of the greatest operational challenges facing today's enterprise is working across cloud environments. How did we end up with so many cloud environments? As this infographic shows, 37% of line […]

Read more
Category: Blog

Use Vblock to Create Your Own Powerful Converged Cloud Infrastructure

The promise of converged infrastructure is a single solution that dramatically lowers compatibility issues between computing, storage, and network devices; cuts cabling and cooling costs; and reduces power and space needs. VCE pioneered converged infrastructure solutions with their introduction of Vblock Systems. Their solution combines the best of VMware virtualization, Cisco networking and computing, and […]

Read more
1 2 36 >