Peak Hosting to Present at SplunkLive and SplunkConf2014 on Splunk Use and Configuration in a Dedicated Hosting Environment
Portland, Oregon (PRWEB) September 03, 2014 -- Peak Hosting, the leading provider of Operations-as-a-Service® (OaaS) managed hosting, today announced it will participate in two separate events sponsored by Splunk, Inc., a provider of the leading software platform for real-time Operational Intelligence. Security engineers from Peak Hosting will present at the one-day SplunkLive event in Nashville, TN and at Splunk’s annual conference, SplunkConf2014. These events will showcase how Splunk is being used in the managed hosting industry to provide real-time security and intelligence, as well as demonstrate the use of Splunk in a hosted environment.
SplunkLive!
Traditional monitoring approaches alerting based on specific threshold levels for events, but in the new world of big data, these thresholds are moving targets. The way to filter out the noise is to alert on anomalies and statistical outliers. Doing this in real-time or near real-time across large Splunk installations or on overloaded indexers and search heads is extremely difficult. Using summary indexes and built-in Splunk statistical functions, Splunk can effectively provide near real-time or real-time statistically based anomaly detection for large data volumes.
What: SplunkLive!
Who: Jesse Trucks, GCIA, GCUX-Gold, Engineering Director, Peak Hosting
When: September 9, 2014
9:00 AM – 3:30 PM EDT
Where: Nashville Marriott at Vanderbilt University – register here for SplunkLive
SplunkConf2014
Controlling Systems with Splunk Alert Scripts
Setting up alert scripts can allow web services calls to other devices such as intrusion prevention systems, giving Splunk the ability to actively control such systems. Using alert scripts can change Splunk from being just another tool into an IT team member capable of taking actions on your behalf.
Speaker: George Starcher, CISSP, Security Engineer, Peak Hosting
Avoid the SSLippery Slope of Default SSL
Increasingly, production security requires more than using default SSL certificates. The right configuration and steps can provide both encryption and authentication needed for today’s due diligence requirements. This session will cover best practices for implementing your own SSL certificates on all Splunk channels.
Speakers: Duane Waddle, IT Specialist, IBM
George Starcher, CISSP, Security Engineer, Peak Hosting
What: SplunkConf2014
When: October 6-9, 2014
Where: MGM Grand, Las Vegas – register here for the SplunkConf2014
About Peak Hosting
Peak Hosting is more than a managed hosting company – since 2001, we’ve helped design, build, maintain and support some of the world’s largest Internet properties, across every vertical. As an extension of your business, our technical-operations-as-a-service offering handles the 17 elements critical to running a data center. Our industry experts take care of everything but your code®, allowing you to concentrate on moving your business forward. When your business (success??) depends on technology for its survival and you don’t want to handle the internet plumbing, you need more than “just” a managed hosting company. You need Peak Hosting. For more information, visit http://www.peakhosting.com, contact sales(at)peakhosting(dot)com, or call (855) 901-7325 (PEAK).
###
Operations-as-a-Service® is a registered trademark of Peak Hosting.
Lori Mesecke, Nereus for Peak Hosting, http://www.peakhosting.com, +1 503.459.9150, [email protected]
Share this article