Back to Results
First PageMeta Content
Security / Splunk / Information technology management / Computer network security / Malware / Computer security / Automated teller machine / Technology / System administration / Data security


Detecting Insider Threats How Splunk Software is Used to Safeguard Financial Data C U S T O M E R p ro f i l e Splunk customer profiles are a collection of innovative, in-depth use cases that highlight the value that Spl
Add to Reading List

Document Date: 2014-02-04 16:21:23


Open Document

File Size: 1,08 MB

Share Result on Facebook

City

San Francisco / /

Company

Detecting Insider Threats How Splunk Software / Amazon / ICAP / Splunk Inc. / Yahoo! / Microsoft / /

Country

United States / /

Currency

USD / /

/

IndustryTerm

bank source code / particular bank / storage devices / loan applications systems / search terms / real-time visibility / software indexes / invasive tools / granular monitoring tools / job search sites / search term / Application developers / software capturing / online purchase / online form / technology infrastructures / bank / disparate systems / corporate network / costly monitoring tools / contractors accessing job search sites / event management / online actions / rex search command / web devices / storage services / /

OperatingSystem

Mac OS X / Macintosh / Microsoft Windows / Windows NT / /

/

Position

manager / chief / contractor / Data Hadoop Engineer / Executive / /

Product

Storm / /

ProgrammingLanguage

R / C / XML / /

ProvinceOrState

California / /

Technology

XML / html / SSL / PDF / http / /

URL

http /

SocialTag