Splunk

15 results

  1. From SAPinsider Las Vegas 2025: How Keurig Dr. Pepper Streamlined SAP Monitoring with Splunk and PowerConnect

    Reading time: 6 mins

    Keurig Dr Pepper transformed its SAP monitoring from a manual, siloed process to a real-time, AI-driven system using Splunk and PowerConnect, achieving significant operational efficiencies, reducing downtime, and improving root cause analysis after unifying two distinct SAP environments post-merger.

  2. security

    Powering the Security Centers of the Future: Splunk and Cisco Talos Integration for Enhanced Threat Detection and Response

    Reading time: 3 mins

    In the face of increasing cyber threats, integrating Cisco Talos threat intelligence with Splunk’s security solutions significantly enhances threat detection, investigation, and response capabilities for organizations, ensuring faster and more effective defenses against cyberattacks.

  3. How basic cyber hygiene can keep SAP services secure

    Reading time: 2 mins

    A recent Splunk security report highlights that while security leaders fear AI-driven attacks, 52% remain affected by data breaches and 49% by compromised emails, emphasizing the importance of robust cyber hygiene practices to counter risks like weak passwords.

  4. Shoring up SAP cyber defences with Splunk Security for SAP Solutions

    Reading time: 2 mins

    SAP solutions require careful data protection, which is enhanced through the integration of Splunk’s officially endorsed security app, facilitating real-time threat detection and response while addressing the complexities of safeguarding sensitive SAP information.

  5. While protecting from AI-enhanced cyber threats, it’s important not to forget the security fundamentals

    Reading time: 2 mins

    In the rush to adopt advanced AI technologies, businesses must not overlook fundamental cybersecurity practices, as neglecting basic security can leave them vulnerable to conventional threats, despite the rise of AI-driven attacks.

  6. Reinforcing SAP defenses with Splunk’s Advanced Threat Detection

    Reading time: 2 mins

    It’s Cybersecurity Awareness Month so no better time to highlight the importance of defending complex SAP systems from evolving digital threats by investing in proactive measures like Splunk Advanced Threat Detection and Splunk Mission Control, organizations can significantly enhance security and protect vital business data.

  7. cybersecurity

    Have you secured your SAP network from internal risks?

    Reading time: 2 mins

    Organizations using SAP systems must prioritize internal threat protection by utilizing tools like Splunk’s User Behavior Analytics to monitor user behavior, detect anomalies, and enhance security measures against potential internal risks.

  8. Vonage and SAP expand collaboration for AI-driven enterprise experiences

    How Splunk and SAP can help businesses gain more value out of data

    Reading time: 1 mins

    Splunk has developed Service Intelligence for SAP Solutions to enhance visibility in SAP operations by providing preconfigured tools for monitoring and analyzing data, enabling organizations to identify operational inefficiencies and optimize their processes.

  9. Vonage and SAP expand collaboration for AI-driven enterprise experiences

    Where Splunk’s Asset and Risk Intelligence can help in an SAP environment

    Reading time: 1 mins

    Splunk’s Asset and Risk Intelligence tool helps modern SAP enterprises manage and secure a complex array of systems and IoT devices by providing continuous asset tracking and compliance insights, thereby enhancing cybersecurity and operational effectiveness.

  10. Splunk Unveils Product Innovations – Splunk Attack Analyzer, OpenTelemetry Collector, and Unified Identity

    Reading time: 2 mins

    Splunk, a leader in cybersecurity and observability leader, has introduced new product innovations to its unified security and observability platform. The enhancements cover the full range of Splunk’s offerings, equipping SecOps, ITOps, and engineering teams with consolidated interfaces and processes that facilitate prompt, precise, and large-scale detection, investigation, and response to threats. When combined with…