Hemant Seth's Blog Posts

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

Harness the Power of Cisco Talos Threat Intelligence Across Splunk Security Products
Security
4 Minute Read

Harness the Power of Cisco Talos Threat Intelligence Across Splunk Security Products

Leverage Cisco Talos’ threat intelligence through Cisco Talos Intelligence for Enterprise Security, the Cisco Talos Intelligence connector for Splunk SOAR, and as a globally enabled feature in Splunk Attack Analyzer.
Data Protection: Best Ways To Protect Your Data Today
Learn
6 Minute Read

Data Protection: Best Ways To Protect Your Data Today

Protecting your data is serious business for every business and organization today. Learn how to protect your data: it starts with understanding the risk.
What Are SLOs? Service Level Objectives Explained
Learn
4 Minute Read

What Are SLOs? Service Level Objectives Explained

Learn about Service Level Objectives (SLOs), their role in defining service performance, key metrics, and how they ensure reliability, quality, and cost-efficiency.
ITSM Today: IT Service Management Frameworks, Trends, and Do’s & Don’ts
Learn
11 Minute Read

ITSM Today: IT Service Management Frameworks, Trends, and Do’s & Don’ts

Discover how ITSM frameworks like ITIL streamline IT operations, improve service quality, and boost business efficiency with automation.
What is Security Automation?
Learn
9 Minute Read

What is Security Automation?

In this article, we’ll talk about the basics of security automation, discuss its value for organizations of all types and sizes and explore how you can get started using a security automation platform.
What Is an Exploit in Cybersecurity?
Learn
4 Minute Read

What Is an Exploit in Cybersecurity?

Exploits are serious business. Learn how they happen — and how to prevent your networks from being exploited — in this in-depth article.