SlideShare a Scribd company logo
1 of 9
Copyright © 2011, Splunk Inc. WW Field Operations
Higher Education
Testimonials
Last updated 07/12/2016
Copyright © 2011, Splunk Inc. WW Field Operations
Arizona State University
2
Link to PPT on how ASU uses Splunk:
http://www.slideshare.net/ckurtz-asu/using-splunk-to-protect-students-faculty-and-the-university
This is the best tool we’ve seen in 10 years.
- Jay Steed, VP IT Ops
Arizona State University
Topics covered in this presentation:
• Protecting Direct deposits
• Reduce phishing success
• Enriching your data to make
better decisions:
Is jeff.smith@x.edu the
student, alumnus or tenured
prof with a DOD research
grant?
Copyright © 2011, Splunk Inc. WW Field Operations
Baylor University
3
Link to PPT on how Baylor University uses Splunk
http://www.slideshare.net/Splunk/splunklive-austin-customer-presentation-baylor
Jon Allen, AVP & CISO
Baylor University
“With Splunk, there’s no finger pointing because
we have a place where everybody knows to go
for information and it’s been a huge value. It’s
becoming a kind of universal expectation within
the organization.”
Topics covered in this presentation:
• Why they chose Splunk
• Use cases
• Security
• PCI
• Visibility/Search/Analytics
• Operational Efficiency
• Dashboards
• Who uses Splunk
• What’s next
Copyright © 2011, Splunk Inc. WW Field Operations
University of Maryland, College Park
4
Link to PPT on how University of Maryland, College Park uses Splunk
http://www.slideshare.net/Splunk/splunklive-customer-presentation-umcp
“If Splunk were taken away from me, I
would quite my job. It has solved a ton of
problems and made my life easier. ”
- Kevin Shivers, Mgr Security Tech Services
University of Maryland, College Park
Topics covered in this presentation:
• What was life like before & after
Splunk
• Real-time Campus threat
detection/prevention
• Use Cases
• Intrusion Detection
• Security Alerts & Threat
Response
• Real-life Incident Investigations
• Compliance & Reporting
• Splunk road map
• Best practices and lessons learned
Copyright © 2011, Splunk Inc. WW Field Operations
University of Alberta
5
Link to PPT on how University of Alberta uses Splunk
http://www.slideshare.net/dostatni/splunk-live-university-of-alberta-2015
- Greg Dostatni, Team Lead
University of Alberta
“Splunk allows us to erase these lines and
analyst can see all the data from anywhere
and investigate a problem from end to end”
Topics covered in this presentation:
• History of Splunk at the University
• Example Use cases:
• Infrastructure Applications
• Mail & Authentication
• Network and Security
• Switches and IPS
• Application Hosting
• Apps & databases
• Deployment takeaways
• Aha Moments!
Copyright © 2011, Splunk Inc. WW Field Operations
Weill Cornell Medical College
Link to PPT on how Weill Cornell Medical College uses Splunk
http://www.slideshare.net/Splunk/sl-nycornelmedv3
- Tom McMahon, Security Engineering Manager
Copyright © 2011, Splunk Inc. WW Field Operations
Additional University Splunk Presentations
University of Alabama at Birmingham – George Strarcher, InfoSec Engineer II
– http://www.slideshare.net/Splunk/splunklive-customer-presentation-university-of-alabama-at-birmingham
Duke University – Jeremy Hopkins, Sr. IT Analyst
– http://www.slideshare.net/Splunk/duke-sl-charlotte040215
The Ohio State University – Bill Triest, Security Engineer
– http://www.slideshare.net/Splunk/splunk-for-security-at-the-ohio-state-university
Northern Arizona University – Conner Swann, Student Worker IT Services
– http://www.slideshare.net/ConnerSwann/youve-got-junk-in-your-splunk
University of Scranton - Calvin Krzywiec, Network Engineer
– http://www.slideshare.net/Splunk/splunklive-philadelphia-university-of-scranton
University of Adelaide, Harvard, Ohio State University
– https://conf.splunk.com/session/2013/Using_UniversityOfAdelaide-Harvard-OSU-
Internet2_SplunkInHigherEducationLessonsFromPeersOnAdoptionUseCasesAndScale.pdf
Indiana University – Allen Tucker, Manager, HELPnet Central Systems
– https://conf.splunk.com/session/2015/conf2015_ATucker_IndianaUniversity_ITOPS_SplunkingDistribut
edLogsFor.pdf
Copyright © 2011, Splunk Inc. WW Field Operations
University Splunk Videos & Case studies
Videos
– Laguna College of Art and Design
 https://www.youtube.com/watch?v=n9hegkGPO6c
– Value of Higher Educations and Splunk – UNLV and ASU
 http://www.splunk.com/en_us/resources/video.lsdGVpbzph4iVvFKve_aPGujHolY0Ibs.html
Case Studies:
– Duke University Gains Powerful Security Insights and Fraud Protection
 http://www.splunk.com/en_us/customers/success-stories/duke-university.html
– University of Texas at Austin Ensures Network Security For Distributed Campus
 http://www.splunk.com/en_us/customers/success-stories/university-of-texas-at-austin.html
– University of North Carolina at Chapel Hill Gains Deep Insight Into Mission-Critical
Applications
 http://www.splunk.com/en_us/customers/success-stories/unc-ch.html :
Solution Guide:
– Why Splunk for Higher Education
– http://www.splunk.com/pdfs/solution-guides/splunk-for-higher-education.pdf
Copyright © 2011, Splunk Inc. WW Field Operations9
My Favorite Testimonial
- Mark Runals,
Sr. Security Engineer
The Ohio State University
This picture came from one our best higher education
customers. He sent it out to the Higher Education list
serve he manages (500+ people from more than 150
different schools to discuss Splunk use in Higher
Education.)
If you’re in EDU and interested in Splunk you should join
it to see what your peers are saying.
Join this list here:
https://lists.osu.edu/mailman/listinfo/splunk-
higher-ed

More Related Content

What's hot

SplunkLive! Stockholm 2018 - Customer presentation: Bonnier Books Nova
SplunkLive! Stockholm 2018 - Customer presentation: Bonnier Books Nova SplunkLive! Stockholm 2018 - Customer presentation: Bonnier Books Nova
SplunkLive! Stockholm 2018 - Customer presentation: Bonnier Books Nova Splunk
 
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk
 
A bug's life - Drupal Application Security and Vulnerability Management
A bug's life - Drupal Application Security and Vulnerability ManagementA bug's life - Drupal Application Security and Vulnerability Management
A bug's life - Drupal Application Security and Vulnerability ManagementBalázs Tatár
 
A bug's life - Drupal Application Security and Vulnerability Management
A bug's life - Drupal Application Security and Vulnerability ManagementA bug's life - Drupal Application Security and Vulnerability Management
A bug's life - Drupal Application Security and Vulnerability ManagementBalázs Tatár
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingTripwire
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk
 
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service IntelligenceSplunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service IntelligenceSplunk
 
.conf2016: Splunking the Endpoint: “Hands on!” Ransomware Edition
.conf2016: Splunking the Endpoint: “Hands on!” Ransomware Edition.conf2016: Splunking the Endpoint: “Hands on!” Ransomware Edition
.conf2016: Splunking the Endpoint: “Hands on!” Ransomware EditionSplunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
 
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunk
 
CACR Overview
CACR OverviewCACR Overview
CACR OverviewVon Welch
 
Analytics Driven SIEM Workshop
Analytics Driven SIEM WorkshopAnalytics Driven SIEM Workshop
Analytics Driven SIEM WorkshopSplunk
 
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...Splunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunk
 
Preparing for the inevitable: The mobile incident response playbook
Preparing for the inevitable: The mobile incident response playbookPreparing for the inevitable: The mobile incident response playbook
Preparing for the inevitable: The mobile incident response playbookNowSecure
 
How to increase the technical health of your software?
How to increase the technical health of your software?How to increase the technical health of your software?
How to increase the technical health of your software?Tom Mens
 
Workshop threat-hunting
Workshop threat-huntingWorkshop threat-hunting
Workshop threat-huntingTripwire
 
Skillful scalefull fullstack security in a state of constant flux
Skillful scalefull fullstack security in a state of constant fluxSkillful scalefull fullstack security in a state of constant flux
Skillful scalefull fullstack security in a state of constant fluxEoin Keary
 
SplunkLive! London Enterprise Security & UBA
SplunkLive! London Enterprise Security & UBASplunkLive! London Enterprise Security & UBA
SplunkLive! London Enterprise Security & UBASplunk
 

What's hot (20)

SplunkLive! Stockholm 2018 - Customer presentation: Bonnier Books Nova
SplunkLive! Stockholm 2018 - Customer presentation: Bonnier Books Nova SplunkLive! Stockholm 2018 - Customer presentation: Bonnier Books Nova
SplunkLive! Stockholm 2018 - Customer presentation: Bonnier Books Nova
 
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
 
A bug's life - Drupal Application Security and Vulnerability Management
A bug's life - Drupal Application Security and Vulnerability ManagementA bug's life - Drupal Application Security and Vulnerability Management
A bug's life - Drupal Application Security and Vulnerability Management
 
A bug's life - Drupal Application Security and Vulnerability Management
A bug's life - Drupal Application Security and Vulnerability ManagementA bug's life - Drupal Application Security and Vulnerability Management
A bug's life - Drupal Application Security and Vulnerability Management
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service IntelligenceSplunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
 
.conf2016: Splunking the Endpoint: “Hands on!” Ransomware Edition
.conf2016: Splunking the Endpoint: “Hands on!” Ransomware Edition.conf2016: Splunking the Endpoint: “Hands on!” Ransomware Edition
.conf2016: Splunking the Endpoint: “Hands on!” Ransomware Edition
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
 
CACR Overview
CACR OverviewCACR Overview
CACR Overview
 
Analytics Driven SIEM Workshop
Analytics Driven SIEM WorkshopAnalytics Driven SIEM Workshop
Analytics Driven SIEM Workshop
 
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
 
Preparing for the inevitable: The mobile incident response playbook
Preparing for the inevitable: The mobile incident response playbookPreparing for the inevitable: The mobile incident response playbook
Preparing for the inevitable: The mobile incident response playbook
 
How to increase the technical health of your software?
How to increase the technical health of your software?How to increase the technical health of your software?
How to increase the technical health of your software?
 
Workshop threat-hunting
Workshop threat-huntingWorkshop threat-hunting
Workshop threat-hunting
 
Skillful scalefull fullstack security in a state of constant flux
Skillful scalefull fullstack security in a state of constant fluxSkillful scalefull fullstack security in a state of constant flux
Skillful scalefull fullstack security in a state of constant flux
 
SplunkLive! London Enterprise Security & UBA
SplunkLive! London Enterprise Security & UBASplunkLive! London Enterprise Security & UBA
SplunkLive! London Enterprise Security & UBA
 

Similar to Higher Education Testimonials from Splunk Customers

2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
Introducing Apereo and the Apereo Learning Analytics Initiative
Introducing Apereo and the Apereo Learning Analytics InitiativeIntroducing Apereo and the Apereo Learning Analytics Initiative
Introducing Apereo and the Apereo Learning Analytics InitiativeIan Dolphin
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...Florence Hudson
 
Bigger data as better data an exploration in the context of distance educatio...
Bigger data as better data an exploration in the context of distance educatio...Bigger data as better data an exploration in the context of distance educatio...
Bigger data as better data an exploration in the context of distance educatio...Elizabeth Archer
 
SULAIMON ISIAKA RESUME (Updated)
SULAIMON ISIAKA RESUME (Updated)SULAIMON ISIAKA RESUME (Updated)
SULAIMON ISIAKA RESUME (Updated)isiaka sulaimon
 
Splunk for Security at The Ohio State University
Splunk for Security at The Ohio State UniversitySplunk for Security at The Ohio State University
Splunk for Security at The Ohio State UniversitySplunk
 
Cloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full DocumentaionCloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full DocumentaionVamshi Chowdary
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
Internship resources & Sample companies
Internship resources & Sample companiesInternship resources & Sample companies
Internship resources & Sample companiessmwortman
 
Sphsc fall 2013 Tech Orietation
Sphsc fall 2013 Tech OrietationSphsc fall 2013 Tech Orietation
Sphsc fall 2013 Tech OrietationLaura Jaurequi
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...Splunk
 
Using Splunk to Protect Students, Faculty and the University
Using Splunk to Protect Students, Faculty and the UniversityUsing Splunk to Protect Students, Faculty and the University
Using Splunk to Protect Students, Faculty and the Universityckurtz-asu
 
Hackathon HACk.DATA.KI.BOTS - Pitch "EK"
Hackathon HACk.DATA.KI.BOTS - Pitch "EK"Hackathon HACk.DATA.KI.BOTS - Pitch "EK"
Hackathon HACk.DATA.KI.BOTS - Pitch "EK"Next Iteration
 
NASA Safety Center Communities of Practice
NASA Safety Center Communities of Practice NASA Safety Center Communities of Practice
NASA Safety Center Communities of Practice NASA
 
SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunk
 
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...PacificResearchPlatform
 

Similar to Higher Education Testimonials from Splunk Customers (20)

2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
LinkedIn_Resume
LinkedIn_ResumeLinkedIn_Resume
LinkedIn_Resume
 
Introducing Apereo and the Apereo Learning Analytics Initiative
Introducing Apereo and the Apereo Learning Analytics InitiativeIntroducing Apereo and the Apereo Learning Analytics Initiative
Introducing Apereo and the Apereo Learning Analytics Initiative
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 
Bigger data as better data an exploration in the context of distance educatio...
Bigger data as better data an exploration in the context of distance educatio...Bigger data as better data an exploration in the context of distance educatio...
Bigger data as better data an exploration in the context of distance educatio...
 
SULAIMON ISIAKA RESUME (Updated)
SULAIMON ISIAKA RESUME (Updated)SULAIMON ISIAKA RESUME (Updated)
SULAIMON ISIAKA RESUME (Updated)
 
Splunk for Security at The Ohio State University
Splunk for Security at The Ohio State UniversitySplunk for Security at The Ohio State University
Splunk for Security at The Ohio State University
 
Cloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full DocumentaionCloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full Documentaion
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Internship resources & Sample companies
Internship resources & Sample companiesInternship resources & Sample companies
Internship resources & Sample companies
 
SIN2015-CFP
SIN2015-CFPSIN2015-CFP
SIN2015-CFP
 
Sphsc fall 2013 Tech Orietation
Sphsc fall 2013 Tech OrietationSphsc fall 2013 Tech Orietation
Sphsc fall 2013 Tech Orietation
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
 
Using Splunk to Protect Students, Faculty and the University
Using Splunk to Protect Students, Faculty and the UniversityUsing Splunk to Protect Students, Faculty and the University
Using Splunk to Protect Students, Faculty and the University
 
Hackathon HACk.DATA.KI.BOTS - Pitch "EK"
Hackathon HACk.DATA.KI.BOTS - Pitch "EK"Hackathon HACk.DATA.KI.BOTS - Pitch "EK"
Hackathon HACk.DATA.KI.BOTS - Pitch "EK"
 
NASA Safety Center Communities of Practice
NASA Safety Center Communities of Practice NASA Safety Center Communities of Practice
NASA Safety Center Communities of Practice
 
SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - Interac
 
Mantra for Change - IASSIST 2011
Mantra for Change - IASSIST 2011Mantra for Change - IASSIST 2011
Mantra for Change - IASSIST 2011
 
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Higher Education Testimonials from Splunk Customers

  • 1. Copyright © 2011, Splunk Inc. WW Field Operations Higher Education Testimonials Last updated 07/12/2016
  • 2. Copyright © 2011, Splunk Inc. WW Field Operations Arizona State University 2 Link to PPT on how ASU uses Splunk: http://www.slideshare.net/ckurtz-asu/using-splunk-to-protect-students-faculty-and-the-university This is the best tool we’ve seen in 10 years. - Jay Steed, VP IT Ops Arizona State University Topics covered in this presentation: • Protecting Direct deposits • Reduce phishing success • Enriching your data to make better decisions: Is jeff.smith@x.edu the student, alumnus or tenured prof with a DOD research grant?
  • 3. Copyright © 2011, Splunk Inc. WW Field Operations Baylor University 3 Link to PPT on how Baylor University uses Splunk http://www.slideshare.net/Splunk/splunklive-austin-customer-presentation-baylor Jon Allen, AVP & CISO Baylor University “With Splunk, there’s no finger pointing because we have a place where everybody knows to go for information and it’s been a huge value. It’s becoming a kind of universal expectation within the organization.” Topics covered in this presentation: • Why they chose Splunk • Use cases • Security • PCI • Visibility/Search/Analytics • Operational Efficiency • Dashboards • Who uses Splunk • What’s next
  • 4. Copyright © 2011, Splunk Inc. WW Field Operations University of Maryland, College Park 4 Link to PPT on how University of Maryland, College Park uses Splunk http://www.slideshare.net/Splunk/splunklive-customer-presentation-umcp “If Splunk were taken away from me, I would quite my job. It has solved a ton of problems and made my life easier. ” - Kevin Shivers, Mgr Security Tech Services University of Maryland, College Park Topics covered in this presentation: • What was life like before & after Splunk • Real-time Campus threat detection/prevention • Use Cases • Intrusion Detection • Security Alerts & Threat Response • Real-life Incident Investigations • Compliance & Reporting • Splunk road map • Best practices and lessons learned
  • 5. Copyright © 2011, Splunk Inc. WW Field Operations University of Alberta 5 Link to PPT on how University of Alberta uses Splunk http://www.slideshare.net/dostatni/splunk-live-university-of-alberta-2015 - Greg Dostatni, Team Lead University of Alberta “Splunk allows us to erase these lines and analyst can see all the data from anywhere and investigate a problem from end to end” Topics covered in this presentation: • History of Splunk at the University • Example Use cases: • Infrastructure Applications • Mail & Authentication • Network and Security • Switches and IPS • Application Hosting • Apps & databases • Deployment takeaways • Aha Moments!
  • 6. Copyright © 2011, Splunk Inc. WW Field Operations Weill Cornell Medical College Link to PPT on how Weill Cornell Medical College uses Splunk http://www.slideshare.net/Splunk/sl-nycornelmedv3 - Tom McMahon, Security Engineering Manager
  • 7. Copyright © 2011, Splunk Inc. WW Field Operations Additional University Splunk Presentations University of Alabama at Birmingham – George Strarcher, InfoSec Engineer II – http://www.slideshare.net/Splunk/splunklive-customer-presentation-university-of-alabama-at-birmingham Duke University – Jeremy Hopkins, Sr. IT Analyst – http://www.slideshare.net/Splunk/duke-sl-charlotte040215 The Ohio State University – Bill Triest, Security Engineer – http://www.slideshare.net/Splunk/splunk-for-security-at-the-ohio-state-university Northern Arizona University – Conner Swann, Student Worker IT Services – http://www.slideshare.net/ConnerSwann/youve-got-junk-in-your-splunk University of Scranton - Calvin Krzywiec, Network Engineer – http://www.slideshare.net/Splunk/splunklive-philadelphia-university-of-scranton University of Adelaide, Harvard, Ohio State University – https://conf.splunk.com/session/2013/Using_UniversityOfAdelaide-Harvard-OSU- Internet2_SplunkInHigherEducationLessonsFromPeersOnAdoptionUseCasesAndScale.pdf Indiana University – Allen Tucker, Manager, HELPnet Central Systems – https://conf.splunk.com/session/2015/conf2015_ATucker_IndianaUniversity_ITOPS_SplunkingDistribut edLogsFor.pdf
  • 8. Copyright © 2011, Splunk Inc. WW Field Operations University Splunk Videos & Case studies Videos – Laguna College of Art and Design  https://www.youtube.com/watch?v=n9hegkGPO6c – Value of Higher Educations and Splunk – UNLV and ASU  http://www.splunk.com/en_us/resources/video.lsdGVpbzph4iVvFKve_aPGujHolY0Ibs.html Case Studies: – Duke University Gains Powerful Security Insights and Fraud Protection  http://www.splunk.com/en_us/customers/success-stories/duke-university.html – University of Texas at Austin Ensures Network Security For Distributed Campus  http://www.splunk.com/en_us/customers/success-stories/university-of-texas-at-austin.html – University of North Carolina at Chapel Hill Gains Deep Insight Into Mission-Critical Applications  http://www.splunk.com/en_us/customers/success-stories/unc-ch.html : Solution Guide: – Why Splunk for Higher Education – http://www.splunk.com/pdfs/solution-guides/splunk-for-higher-education.pdf
  • 9. Copyright © 2011, Splunk Inc. WW Field Operations9 My Favorite Testimonial - Mark Runals, Sr. Security Engineer The Ohio State University This picture came from one our best higher education customers. He sent it out to the Higher Education list serve he manages (500+ people from more than 150 different schools to discuss Splunk use in Higher Education.) If you’re in EDU and interested in Splunk you should join it to see what your peers are saying. Join this list here: https://lists.osu.edu/mailman/listinfo/splunk- higher-ed