Somerford Associates
Somerford Associates
  • Видео 243
  • Просмотров 419 616
Splunk RUM: Real User Monitoring, Identify Errors & Enhance UX—Observability Cloud Explained (Ep. 3)
In our third video in the series, we focus on Splunk Real User Monitoring (RUM), part of the Splunk Observability Suite.
RUM provides real-time visibility into user interactions and application performance by tracking metrics like page views, JavaScript errors, and user latency. This allows developers to detect issues, correlate them to specific user sessions, and quickly address problematic code. A highlight of this video includes using drill-down capabilities to identify performance bottlenecks during the checkout process, leading to faster troubleshooting and a better user experience.
📊 Get value out of your data in 4 weeks with Fast Track Splunk (FTS) O11y - find out more: www.somerfor...
Просмотров: 31

Видео

Splunk APM: Microservices Monitoring, Tracing, & Error Analysis-Observability Cloud Explained (Ep.2)
Просмотров 4119 часов назад
Join Dan Gray, Certified Splunk Observability Technical Expert at Somerford, as he explores Splunk Observability and how it can be used for enhanced uptime and performance monitoring. In our second video in the series, we focus on Splunk Application Performance Monitoring (APM), part of the Splunk Observability Suite. APM offers distributed tracing to help pinpoint issues within microservices, ...
Splunk Synthetic Monitoring: Real-Time App Performance Tracking-Observability Cloud Explained (Ep.1)
Просмотров 4514 дней назад
Welcome to our new series of short videos designed to break down the Splunk O11y suite! Join Dan Gray, Certified Splunk Observability Technical Expert at Somerford, as he explores Splunk Observability and how it can be used for enhanced uptime and performance monitoring. In our first video, we focus on Synthetic Monitoring and how it enables organisations to optimise user journeys by assessing ...
Splunk Security Essentials Deep Dive & Tutorial-Splunk for Cybersecurity-Threat Detection & Response
Просмотров 21721 день назад
In this recorded webinar, explore Splunk Security Essentials, a powerful platform to enhance your organisation's cybersecurity. Join experts Jake Hammacott and Oliver Knapp as they guide you through essential features for threat detection and incident response. Discover real-world scenarios, best practices, and actionable techniques that you can implement immediately to strengthen your security...
Setting Up Windows DNS Monitoring in Splunk Stream - Splunk for Security Tutorials: Expansion (Ep.4)
Просмотров 7528 дней назад
In the final video of the Splunk for Security: Expansion series, we dive into setting up Windows DNS monitoring with Splunk Stream. Watch as we navigate the Splunk Stream app, create a new metadata stream for DNS, and configure key elements like naming, aggregation by source IP, and field customisation. 📊 Find out how Somerford can provide help to maximise the value of Splunk: www.somerfordasso...
Analysing Data & Network Traffic with Stream Dashboards - Splunk for Security: Expansion (Ep. 3)
Просмотров 62Месяц назад
In this third instalment of the Splunk for Security: Expansion series, the focus shifts to exploring the capabilities of the Splunk Stream app through its dashboards. Jake reviews data ingested into Splunk, now available for searching, reporting, and dashboarding. It demonstrates how different dashboards, such as those for HTTP, DNS, and SSL traffic, provide valuable insights into network activ...
What Are Stream Data Flows and How Do They Work? - Splunk for Security Tutorials: Expansion (Ep. 2)
Просмотров 70Месяц назад
In this instalment of the Splunk for Security Expansion series, we delve into the data flow processes within Splunk Stream. The flow mirrors conventional data handling tools: data is captured by forwarders, which are often installed on HEC servers, and then sent to indexes. Once indexed, the data becomes searchable within the Splunk Enterprise environment. The video highlights how the search he...
Understanding Splunk Stream Architecture - Splunk for Security Tutorials: Expansion (Ep. 1)
Просмотров 100Месяц назад
In this first episode of the Splunk for Security: Expansion series, we explore the architecture and deployment of the Splunk Stream app. Splunk Stream provides real-time visibility into application and infrastructure performance by passively collecting data from the network, without requiring extensive instrumentation. It offers dynamic cloud visibility with on-the-fly deployments and precise f...
Varonis SaaS: Threat Detection, UBA Models, AI-Powered Alerts & MDDR Service Explained | Webinar
Просмотров 114Месяц назад
Join Somerford's Varonis expert, Beth Laws, as she walks you through threat detection, UBA models, AI-powered alerts, and MDDR service-all powered by Varonis SaaS. Find out how Varonis Speeds Up the Secure Integration of Microsoft Copilot into Microsoft 365 on our website: www.somerfordassociates.com/varonis-and-microsoft-copilot-security/ ━━━━ ✓ Learn More About Varonis on our Website: www.som...
Maximising the Common Information Model (CIM) - Splunk for Security Tutorials: Normalisation (Ep. 3)
Просмотров 982 месяца назад
In the third episode of our series on the Common Information Model (CIM), we explore how to maximise the benefits of CIM by effectively normalising data. 📊 Find out how Somerford can provide help to maximise the value of Splunk: www.somerfordassociates.com/splunk-professional-services/ ━━━━ ✓ Keep notified of news and announcements on Linkedin: www.linkedin.com/company/somerford-associates-limi...
How to Accelerate CIM Data Models - Splunk for Security Tutorials: Normalisation (Episode 2)
Просмотров 852 месяца назад
In the second episode of our series on the Common Information Model (CIM), we explore how to maximise the benefits of CIM by effectively normalising data. 📊 Find out how Somerford can provide help to maximise the value of Splunk: www.somerfordassociates.com/splunk-professional-services/ ━━━━ ✓ Keep notified of news and announcements on Linkedin: www.linkedin.com/company/somerford-associates-lim...
What are Splunk CIM Data Models? - Splunk for Security Tutorials: Normalisation (Episode 1)
Просмотров 1322 месяца назад
This is the first short video in our new Splunk for Security series, introducing the Common Information Model (CIM) and its role in data normalisation. Discover how CIM helps standardise data for better searches, analysis, and insights. 📊 Find out how Somerford can provide help to maximise the value of Splunk: www.somerfordassociates.com/splunk-professional-services/ ━━━━ ✓ Keep notified of new...
Splunk Observability Cloud 101 | Beginner's Guide to Real-Time Monitoring & Observability
Просмотров 3402 месяца назад
Watch our webinar on Splunk Observability Cloud and its ability to provide full observability. This video includes a demo of essential Infrastructure Monitoring, APM, and RUM features. Additionally, we showcase their interconnectedness, leveraging metrics, traces, and logs to offer comprehensive insights into both backend operations and frontend user experience. 📊 Read more on Splunk Observabil...
Generative AI and Its Role in Real-Time Data Streaming Platforms (DSPs) | Confluent Showcase
Просмотров 883 месяца назад
Hear from Confluent Solutions Engineer Italo Nesi to learn the fundamentals of Machine Learning and how ML and Generative AI advancements impact Data Streaming Platforms (DSP). 📊 Streamline your cloud migration with Confluent's Migration Accelerator Programme: www.somerfordassociates.com/somerford-confluent-migration-accelerator-programme/ ━━━━ ✓ Keep notified of news and announcements on Linke...
Varonis SaaS: Microsoft Copilot Security, What to Consider Before Copilot | Webinar
Просмотров 1323 месяца назад
Learn how to keep your Microsoft Copilot rollout secure with Varonis. In this showcase, Beth Laws, our Varonis Technical Expert, breaks down how to tackle data exposure risks, ensure accurate classification labels, and streamline security processes. See how Varonis works with Microsoft Purview Information Protection and applies least privilege models to safeguard your sensitive data. ▶ Find out...
Splunk IT Service Intelligence 101 | Advanced Infrastructure Monitoring, Event Management & AIOps
Просмотров 1883 месяца назад
Splunk IT Service Intelligence 101 | Advanced Infrastructure Monitoring, Event Management & AIOps
Splunk .conf24 Key Announcements Summarised: AI Features, ES 8.0, Asset & Risk Intelligence and More
Просмотров 2023 месяца назад
Splunk .conf24 Key Announcements Summarised: AI Features, ES 8.0, Asset & Risk Intelligence and More
Stories of Success: Women Leadership, Diversity, and Resilience - The Somerford Podcast
Просмотров 1104 месяца назад
Stories of Success: Women Leadership, Diversity, and Resilience - The Somerford Podcast
Splunk Ingesting Data from a Drone - Real-time Analytics
Просмотров 1704 месяца назад
Splunk Ingesting Data from a Drone - Real-time Analytics
How Data in Motion is Transforming Real-Time Business Operations: Confluent & Apache Kafka Explained
Просмотров 644 месяца назад
How Data in Motion is Transforming Real-Time Business Operations: Confluent & Apache Kafka Explained
What is Data Security Posture Management (DSPM) and How Does it Work?
Просмотров 6924 месяца назад
What is Data Security Posture Management (DSPM) and How Does it Work?
Why Data Streaming? - The Somerford Podcast: Complete Confluent Mini-Series
Просмотров 745 месяцев назад
Why Data Streaming? - The Somerford Podcast: Complete Confluent Mini-Series
Operationalising Splunk RBA Environments and Into the Future-Splunk Security Maturity Series: Part 3
Просмотров 1235 месяцев назад
Operationalising Splunk RBA Environments and Into the Future-Splunk Security Maturity Series: Part 3
How Varonis is Securing Microsoft Copilot Rollouts Worldwide | Varonis Data Security
Просмотров 725 месяцев назад
How Varonis is Securing Microsoft Copilot Rollouts Worldwide | Varonis Data Security
Developing Splunk RBA Environments Ready for Production-Splunk Security Maturity Series: Part 2
Просмотров 1255 месяцев назад
Developing Splunk RBA Environments Ready for Production-Splunk Security Maturity Series: Part 2
Lacework Resources & Polygraphs | Lacework Explained Episode #6
Просмотров 905 месяцев назад
Lacework Resources & Polygraphs | Lacework Explained Episode #6
What is Splunk RBA and How Does it Work?-Splunk Security Maturity Series: Part 1
Просмотров 4205 месяцев назад
What is Splunk RBA and How Does it Work?-Splunk Security Maturity Series: Part 1
Lacework Dashboard and Alerts Overview | Lacework Explained Episode #5
Просмотров 1215 месяцев назад
Lacework Dashboard and Alerts Overview | Lacework Explained Episode #5
Varonis Data Risk Assessment Explained | How Varonis' Data Risk Assessment (DRA) Works
Просмотров 1026 месяцев назад
Varonis Data Risk Assessment Explained | How Varonis' Data Risk Assessment (DRA) Works
Simplifying IoT Data Ingestion and Real-Time Monitoring with Splunk Edge Hub - The Somerford Podcast
Просмотров 1076 месяцев назад
Simplifying IoT Data Ingestion and Real-Time Monitoring with Splunk Edge Hub - The Somerford Podcast