{"id":6889,"date":"2014-10-01T05:00:29","date_gmt":"2014-10-01T12:00:29","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6889"},"modified":"2014-09-30T16:27:14","modified_gmt":"2014-09-30T23:27:14","slug":"visit-palo-alto-networks-splunk-conf-2014","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/10\/visit-palo-alto-networks-splunk-conf-2014\/","title":{"rendered":"Visit Palo Alto Networks at Splunk .conf 2014!"},"content":{"rendered":"<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:17.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6890 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/BDG-conf2014-Sponsor-575x100-101-500x86.jpg\" alt=\"BDG-conf2014-Sponsor-575x100-101\" width=\"500\" height=\"86\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/BDG-conf2014-Sponsor-575x100-101-500x86.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/BDG-conf2014-Sponsor-575x100-101-230x40.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/BDG-conf2014-Sponsor-575x100-101-510x88.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/BDG-conf2014-Sponsor-575x100-101.jpg 575w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Palo Alto Networks will be participating at .conf 2014, the 5th Annual Splunk Worldwide User Conference, taking place October 6-9 at the MGM Grand in Las Vegas. Here's how to engage with us while at the show:<\/p>\n<p><!--more--><\/p>\n<ul>\n<li>Marc Benoit, Palo Alto Networks Senior Director, Technical Business Development, will be speaking <strong>Wednesday, October 8 at 2:15 p.m. local time:\u00a0<\/strong>\"Mitigating Cybersecurity Risk With Palo Alto Networks and Splunk.\"\u00a0Learn how the attack landscape is continually evolving and how APTs are identified and mitigated in the network and at the endpoint. Use Palo Alto Networks data and Splunk's unique capabilities to identify and prioritize remediation actions.<\/li>\n<li>Visit our booth H3\u00a0at Splunk .conf, where you'll be able to preview the newest version of the Splunk for Palo Alto Networks app. The new version integrates endpoint logs and firewall logs for better correlation to detect indicators of compromise and effect immediate remediation.<\/li>\n<\/ul>\n<p>Palo Alto Networks is currently the <strong>most-downloaded app<\/strong> for Splunk, with more than 10,000 downloads and hundreds of active users worldwide. You can see more details of Splunk for Palo Alto Networks <a href=\"%20http:\/apps.splunk.com\/app\/491\" target=\"_blank\">here<\/a> (login required).<\/p>\n<p>Check out the .conf 2014 website <a href=\"http:\/\/conf.splunk.com\/\" rel=\"nofollow,noopener\"  target=\"_blank\">here<\/a>. We encourage you to tag any event-related social media posts with #Splunkconf.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks will be participating at .conf 2014, the 5th Annual Splunk Worldwide User Conference, taking place October 6-9 at the MGM Grand in Las Vegas. Here's how to engage with &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,133],"tags":[782,128],"coauthors":[709],"class_list":["post-6889","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-events","tag-conf","tag-splunk"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6889"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6889\/revisions"}],"predecessor-version":[{"id":6894,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6889\/revisions\/6894"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6889"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}