Splunk Development Services
Security Operations Center (SoC)
Security Information and Event Mgmt. (SIEM)
Security Orchestration, Automation, and Response (SOAR)
Site Reliability Engineering (SRE)
IT Services Management (ITSM)
Artificial Intelligence for ITOps (AIOps)
Splunk Managed Services
Splunk Professional Services
Splunk Ninja as a Service
Splunk Python 3 Migration
Splunk Enterprise Security (ES)
Splunk Phantom SOAR
Events & Webinars
Get In Touch
Our experiences define our identity
Best of Both Worlds – Deep SIEM Insights with Powerful Business Intelligence Dashboards: Google Chronicle + Looker
Category: Business Intelligence, Google Chr...
Introduction to SIEM Security information and event management (SIEM) solutions collect a range of security and other data from security controls and devices throughout the IT e...
Unify your SOC with Splunk Mission Control Plugins
Category: Splunk, Splunk Mission Control
Introduction to Splunk Mission Control Splunk Mission Control attempts to reinvent security operations, it’s a unified security operations platform that brings together security...
An introduction on using SonarQube
Category: Quality and Security, SonarQube
An Introduction on SonarQube SonarQube is a Code Quality Assurance tool that collects and analyzes source code, and provides reports for the code quality of your project. It com...
How to use Nexus OSS User Access Management
Category: Nexus OSS, Uncategorized
What is Nexus OSS Nexus OSS is a free artifact repository with universal format support. It provides a single source of truth for all your components, binaries, and build artifa...
Introduction: DevOps & Site Reliability Engineering
Category: DevOps, Site Reliability Engineering
Development and Operations Throughout the 80’s, and 90’s Systems Administrators (or SysAdmins) wrote code to create, improve, and manage the computing systems under their ...
How to get your data from various services to MS Teams Channel
Category: MS Teams
MS Teams allows users to create a webhook that allows users to post data into the channel. The user can expose any HTTPS endpoint and design your own connectors. Microsoft has m...
Vulnerability detection using VulnDB integration with Nmap
Category: Vulnerability Detection
Vulnerability management is the process of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities. It is crucial to computer security and n...
Advanced Threat Hunting Harnessing Chronicle Backstory with Demisto
Category: Cyber Security
Simplifying Threat Hunting & Remediation by harnessing Chronicle Backstory capabilities with Demisto’s Intelligence orchestration. The cybersecurity landscape is chang...
An introduction to the Splunk Search Processing Language
Category: Splunk, Splunk SPL
Overview Splunk offers an expansive processing language that enables a user to be able to reduce and transform large amounts of data from a dataset, into specific and relevant p...
Web Accessibility: How to Enable Access for Everyone
Category: Web Accessibility, Web Development
Accessibility is seldom discussed in today’s web development and design. The web is fundamentally designed to work for all people, regardless of their hardware, software, ...
Filter by Tags
Quality and Security
Site Reliability Engineering
Splunk Mission Control
Crest Data Systems. |
Ok, I agree