Hemant Seth's Blog Posts
Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.
Display Mode
Paginated
Filter
Author
Author URL
Limit
6

Meet the Splunktern: Deinell (Dane) Dungca
Welcome to the next installment of our 'Meet the Splunktern' blog series – this week, we're introducing Deinell (Dane) Dungca, our Social Impact Intern.

BOO! Surprise Update to the Boss of the NOC Program
As the IT organizations and the overarching landscape evolves from traditional monitoring to observability, we need to evolve our program as well. As a result, we're excited to introduce the brand new Boss of Operations and Observability (Boo) tournament where users explore Splunk solutions through real-world IT Operations and Observability episodes.

Orchestrate Framework Controls to Support Security Operations with Splunk SOAR
Learn more about how to identify use cases for automation and dive deeper into the five steps of designing security workflows around framework regulations

Real world impact from De Rechtspraak
We often say customers are our best storytellers at Splunk, and it’s certainly the case with our latest EMEA customer case study in the form of the Dutch court system, De Rechtspraak. Hear more from Splunk VP EMEA, Frederik Maris on how De Rechtspraak is harnessing insight from Splunk.

How to Marie Kondo Your Incident Response with Case Management & Foundational Security Procedures
Learn how successful security teams “Marie Kondo” their security operations, cleaning up their “visible mess” to identify the true source of “disorder” (the cyber attack itself).

Only the Paranoid Survive, Recast for Cybersecurity
At TruSTAR, we want to highlight stories of success in defending cyberspace that can propagate as best practices. Read more about human dependencies, technical challenges and defining data to be shared.