The Future of AIOps: Accelerate IT Ops with Data and Machine Learning Plaforms
“By 2022, 40% of all large enterprises will combine big data and machine learning functionality to support and partially replace monitoring, service desk and automation processes and tasks, up from 5% today.”*
What are the benefits of AIOps and how can they be implemented into your IT Operations strategy? Organizations are now seeking solutions that can prepare and wrangle all of their data. However, in order to develop a comprehensive strategy, orgs will also require sophisticated AI baked into its core to apply machine learning to gain predictive insights.
Featured guest Will Cappelli, VP in the Enterprise Management, Gartner and Rick Fitz, SVP, IT Markets, Splunk discuss the necessary tactics and best practices for a successful AIOps strategy, and how IT Ops market leaders can leverage data and machine learning platforms to scale initiatives that move business objectives forward.
Join us for our virtual fireside chat where you will learn about:
- New trends in AI for IT Operations
- How to develop an AIOps strategy to breaks down IT silos
- How leading IT Organizations decrease MTTR by 70% using AI capabilities
RecordedJul 12 201831 mins
Your place is confirmed, we'll send you email reminders
Andi Mann, Chief Technology Advocate, Splunk, Inc. and Pankaj Prasad, Sr Principal Analyst, Gartner
IT Ops teams are now critical to an organization’s success and require a strategy that aligns with the organization’s objectives and its external stakeholders. Most infrastructure monitoring solutions haven’t caught up to meet these new requirements, forcing IT teams to resort to traditional monitoring strategies that don’t allow for innovation and growth.
Join Gartner analyst Pankaj Prasad and Splunk’s Chief Technology Advocate, Andi Mann, as we discuss new trends in IT monitoring strategy, best practices, and new IT models to implement in your organization.
Here’s what you’ll learn:
•How to effectively approach your IT monitoring strategy in this new world of IT
•Build a successful IT infrastructure operating model to get to market faster, innovate, and respond in real-time
•Best practices for integrating LOB owners, application developers and external stakeholders into your strategy
Is the volume of inbound security alerts outpacing the investigation and response capacity of your team? If so, you are not alone. Many organizations are looking for ways to bridge their talent gap, work more efficiently, and respond to threats faster.
Join this recorded panel discussion to hear the journey of two teams who are using the Splunk Phantom security orchestration, automation and response (SOAR) platform to mature their operations.
You will learn:
•Security challenges unique to their environment
•How the Phantom SOAR platform helps
•Lessons learned during their automation journeys
VP, Threat Management
Enterprise Security Manager
Penn State University
Product Marketing, Phantom
Countless platforms promise predictive capabilities for your IT organization. What is your strategy for integrating artificial intelligence and machine learning, and what do you need from your tech stack to be successful?
Watch our webinar with Vodafone and Accenture to understand the 5 critical components to build an effective AI strategy, benefits realized from implementing a predictive IT solution, and what to look for when evaluating predictive analytics solutions.
What you’ll learn:
•5 steps to an effective predictive IT strategy
•How Vodafone with Accenture improved their customer experience with AI
•Where AI can help, and where it can’t
Director, Product Marketing
Head of IT Operations
Application Outsourcing Lead for Vodafone
Jae Lee, Director, Product Marketing, Splunk, Inc.
Security teams are underfunded, understaffed and overwhelmed by constantly putting out fires. They struggle to deal with threats and attacks, while having to answer hard questions from management. Everyone is demanding detailed, accurate answers about cyberthreats and risk and compliance – and they all need answers NOW.
So, how useful is it to know that you’re not alone, since others are in the same boat? The answer is “not useful at all.” What IS useful, is knowing how to work smarter and get answers faster.
Join us in this one-hour technical deep dive and demo to learn:
•How to analyze events from three common data sources to look for malicious activity
•How to get more efficient at discovery, triage and the investigation of potential security incidents
•How to leverage automation methods to accelerate investigations and get answers faster
This webinar will provide demo examples of how to ask questions of your machine data to get security insights. For example, we will explore whether login behavior looks suspicious the root cause of how an attacker entered your network. We’ll show how you can get to investigative findings quickly and make use of those answers just as quickly. This webinar aims to help security teams learn how to stay focused on solving security problems faster so they can get ahead of it all.
For security teams, having the ability to investigate a security incident quickly and accurately is still the most fundamental skill needed to combat the majority of cyberthreats and attacks. The average organization is being attacked on a weekly basis, without the right processes and tools in place to pinpoint root cause without delay, and put the right countermeasures in place in time to minimize damage.
Join us in this 1-hour webinar to learn:
•Why investigating security and non-compliance incidents can be so difficult
•Why machine data generated by your business is so important to security
•How to get better at performing investigations -- regardless of the size or skill level of your security staff
We will provide a methodology to help you align how you think about your organization’s security processes – the goal is to help you develop an investigative mindset that addresses a broad range of security and compliance concerns, in a pragmatic and targeted manner, specific to your own needs.
From falling costs in automation hardware, a boom in manufacturing and the explosion of Machine Learning — the Industrial IoT market is at a turning point. Watch our Industrial Internet of Things webinar and learn about how the latest tech-trends are impacting Manufacturing, Oil & Gas, and other industrial companies.
IoT thought leader, Stanford Lecturer and Alchemist Accelerator Chairman Timothy Chou will be discussing the latest developments around predictive analytics and its impact on the future of industrial operations.
We will also discuss how companies like Shaw Industries, DB Cargo, and Trane are leveraging their machine data to accomplish the following:
•Mitigate unplanned failure and reduce unnecessary costs with predictive maintenance
•Efficiently unify disparate and complex industrial data
•Secure Industrial Control System environments
Watch today and see how Splunk can help drive valuable intelligence from your sensor and machine data. This webinar includes a demo.
Teacher, Student, Board Member, Investor
Author of Precision: Internet of Things
Director, IoT Chief Evangelist
Kara Gillis, Director of Product Marketing, Splunk
You’ve heard about the top trends in IT - but how do you use this information to take meaningful action? How do you encourage collaboration between the business, developers, and operations? How do you up-level IT as a service provider that reduces manual processes and troubleshooting without context to focus on strategic initiatives that impact important KPIs? By avoiding these 8 mistakes IT practitioners makes!
In this webinar, we’ll talk through avoiding:
-Friction between IT and the business
-Cumbersome and difficult root cause analysis
-Not preparing for Incident response
-And many others!
You’ll walk away with an understanding of how to apply lessons learned to your own organization and operate maximum scale!
Jae Lee – Director Product Marketing, Security Markets, Splunk
Assessing and monitoring basic security posture is critical. Security teams need the ability to identify and alert on a particular type of malicious activity, AND determine whether that alert is meaningful in a broader context.
Splunk can help your organization get up and running very quickly with the ability to assess basic security posture. With Splunk, you can centralize security visibility and adopt an investigative mindset to answer questions like:
- How secure are my endpoints?
- What is happening on my network?
- Where is it most critical for me to apply updates?
- Are user accounts configured properly?
- Is there any suspicious traffic going out?
- How is overall security posture in my AWS environment?
This webinar is perfect for organizations that are just getting started with formalizing their security operations. We’ll show you how with Splunk Security Essentials, a use case framework tool that you can download and stand up quickly to immediately glean security value using your own data sources.
Watch this short video demonstration to learn how Splunk Enterprise Security helps security practitioners detect, investigate and respond to internal and external attacks by simplifying threat management while minimizing risk to safeguard your business.
Welcome to the Splunk for Security Investigation Experience. In this video, learn how you can harness the power of analytics to easily detect hidden anomalies in the endpoint, so that you can prevent and mitigate advanced malware such as ransomware.
Andrew Stein, Principal Product Manager, Machine Learning, Splunk
In this first of two deep dive Machine Learning Toolkit (MLTK) webinars you will see Splunk’s MLTK in action. We will use the showcase examples in the MLTK and perform a technical demonstration of the MLTK’s user interface-supported algorithms using Splunk’s Search Processing Language (SPL) to create and operationalize machine learning models for any custom use case. You will learn:
- How to use the components of the MLTK
- How can you combine any MLTK Assistants
- How can you use the MLTK with any search
Lee Calcote, Founder, Layer5.io and James Hodge, Area VP, Field Technology, Splunk EMEA
Join this live 1-on-1 interview with James Hodge, Area VP, Field Technology at Splunk for an in-depth discussion on how to successfully leverage Splunk in Containers.
- What is the specific value that Splunk brings to the AWS customer?
- Why use containers in the first instance?
- What are some recommended use cases for running Splunk in containers?
- What about Kubernetes?
- How would you start thinking about migrating to Splunk or other applications to Cloud?
This interview will be filmed live at AWS re:Invent in Las Vegas. Tun in for live Q&A and get all of your questions answered!
Artificial intelligence and machine learning are the latest buzz words – but what does it actually mean to you and what should you do about it? Watch this webinar to hear ESG analyst Edwin Yuen and our Splunk experts discuss:
● AI & ML trends
● Benefits of leveraging AI & ML
● Barriers to adoption and how to overcome them
● AI & ML approaches – what’s right for you?
Gleb Esman, Senior Product Manager, Fraud Analytics and Research Matthew Joseff, Senior Security Specialist
With the digitalization of our lives, organizations are creating new online services at a faster pace than ever before. Every organization is constantly developing and adding new services, leaving themselves vulnerable to fraudulent activities. The pressure is placed on fraud teams to stay informed and ahead of attackers, who are always creative to exploit new vulnerabilities.
Join this webinar to learn:
● How to recognize examples of fraudulent activities in your environment
● How to more quickly find anomalies of transactions or behaviors of accounts that are fraudulent, acting fraudulently or being taken over
● Recommendations and best practices on how to get started detecting fraudulent patterns and activities
● How using machine data and Splunk’s analytics-driven security platform can help you onboard new data at the speed of the business to ensure that your fraud teams can detect and investigate quickly
Matthias Maier | Ruben van Vreeland | Rolf von Rössing | Ron Peeters
Diese Session wird live aus Nürnberg übertragen.
In diesem exklusiven Panel diskutieren Top-Branchenexperten, welchen Einfluß digitale Informationsinitiativen auf Sicherheitsstrategien haben können.
Lernen Sie mehr über die folgenden Themen:
- Welche Cyber-Risiken sind mit Initiativen zur digitalen Transformation verbunden?
- Welche Rolle spielt das IT-Sicherheitsteam bei digitalen Transformationsprojekten?
- Was sind die benötigten Kernfähigkeiten, und welches Umdenken ist in den IT-Sicherheitsabteilungen erforderlich?
- Welche Technologien unterstützen dabei?
Teilnehmer des Panels:
Matthias Maier, Technology Evangelist, Splunk
Ruben van Vreeland, CEO, BitSensor
Ron Peeters, Managing Director, EMEA, Synack Inc.
Rolf von Rössing, ISACA
Die 'Ask the Expert' Sitzung wird Ihnen live in DEUTSCH aus Nürnberg zur Verfügung gestellt.
In diesem ausgewählten Panel stellen Top-Branchenexperten vor, wie Sie Ihr digitales Sicherheitsprogramm stärken - von der Verwaltung der Sicherheitstools bis zur gelebten Sicherheit.
Erfahren Sie mehr über die Themen:
- Warum reicht es nicht mehr aus, nur Sicherheitswerkzeuge zu implementieren und zu verwalten?
- Was sind die Herausforderungen bei der Entwicklung eigener Sicherheitsfähigkeiten und Security Intelligence?
- Was sind die Reifestufen, um dorthin zu gelangen?
- Welche Personen (Know-how) / Prozesse und Technologien werden für den Erfolg benötigt?
Matthias Maier ist Technical Evangelist für Splunk in EMEA und verantwortlich für die Kommunikation von Splunks Go-to-Market-Strategie in der Region. Er arbeitet eng mit Kunden zusammen, um zu verstehen, wie Maschinendaten neue Einblicke in Anwendungsbereitstellung, Geschäftsanalyse, IT-Betrieb, Internet of Things sowie Sicherheit und Compliance ermöglichen. Matthias hat ein besonderes Interesse und Fachwissen in Sachen Sicherheit und ist Autor der Splunk App für IP Reputation.
Zuvor arbeitete Matthias bei TIBCO LogLogic und McAfee als Senior Technical Consultant. Er ist regelmäßiger Redner auf Konferenzen zu einer Reihe von Themen rund um Enterprise Technologien.
Alex Hilton, Cloud Industry Forum | James Hodge, Splunk | Reuben Thompson, Gospel Technology | Aaron Aldrich, Navisite
Join this live panel discussion with experts at IP Expo Europe 2018 for a deep dive into how technologies such as artificial intelligence and machine learning are forever changing the IT Operations landscape.
Tune into this interactive Q&A session with world renowned IT, Business Intelligence and Data leaders while they discuss the following:
- What AIOps is and what impact it will have on organizations
- How to develop a successful AIOps strategy
- The role of machine learning in driving proactive processes and predictive insights
This live panel will be streamed directly from IP Expo Europe at Excel London! Join us for live Q&A from the comfort of your desk.
Alex Hilton, CEO, Cloud Industry Forum
James Hodge, Area VP, Field Technology, Splunk EMEA
Reuben Thompson, VP Technology, Gospel Technology
Aaron Aldrich, Director of Client Success, Navisite
Nate Smalley, Principal Sales Engineer and Andrew Stein, Staff Business Analytics & IoT Practitioner
Imagine a world without outages. Glorious, isn’t it? We’d like to help you get there. So how do you stop IT events before they escalate into outages? With a little help from machine learning.
The predictive capabilities from the Splunk Machine Learning Toolkit (MLTK) combined with the Event Analytics capabilities in Splunk IT Service Intelligence (ITSI) give operations teams like yours the opportunity to proactively act on an event before it becomes an outage. Whether your current IT state is reactive or you’re already in a somewhat proactive state, these predictive capabilities will be something you’ll want to take note of!
Join our webinar to learn how to:
● Predict a service health score
● Proactively take action based on those predictions
● Employ novel tactics for better incident management using advanced search commands
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
Join this session with Splunk to walk through a typical ‘day in the life of a breach’. From detection to investigation and response, experience the true impact that a breach can have on a business, and the best practices being carried out by organizations today. We will cover:
- What today’s breach response should look like
- What tools and processes should be put in place upfront
- What departments and entities need to be involved beyond IT
- Examples of activities that are happening within organizations to prepare for a breach today
- What the consequences of the breach could be
Splunk Inc. (NASDAQ: SPLK) is the market leader in analyzing machine data to deliver Operational Intelligence for security, IT and the business. Splunk® software provides the enterprise machine data fabric that drives digital transformation. More than 13,000 customers in over 110 countries use Splunk solutions in the cloud and on-premises.
The Future of AIOps: Accelerate IT Ops with Data and Machine Learning PlaformsWill Capelli | Research Analyst, Gartner; Rick Fitz | SVP & GM IT Markets, Splunk[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]31 mins