Splunk Phantom is an orchestration, automation, and response technology for running “Playbooks” to respond to various conditions. Phantom connects to Splunk Enterprise using the Phantom App for Splunk, so that actions can be taken on knowledge derived from data indexed in Splunk.
Article 17 of the General Data Protection Regulation (GDPR) stipulates the Right to Erasure, often referred to as the Right to be Forgotten. While the regulation specifies some requirements as to what controllers must do with data requested to be “erased”, it does not expressly define what the term erasure means.
The Splunk Adaptive Response Framework (ARF) included with Splunk Enterprise Security (ES) allows actions to be taken in response to data. This is done by creating an alert that triggers when a certain search result condition is received in the Splunk ES Search and Reporting app.
Splunk Enterprise Security (ES) is a major player in the Security Information and Event Management (SIEM) software market. The cloud-based analytic platform combines the indexing and aggregation capabilities of Splunk Enterprise with a range of fit-for-purpose features attendant to SIEM environments.
The “New Multi Table Protection Job …” wizard in IRI Workbench described in this article is one of the ways that IRI FieldShield product (or IRI Voracity platform) users can automatically mask personally identifiable information (PII) in database columns that are part of a foreign key relationship, and thus preserve referential integrity between the tables.
The Internet of Things (IoT) continues to grow at an unbelievable rate, and creates tremendous benefits and opportunities for society. With it grows the demand for products and services that control, manage, and protect the massive amounts of data streaming from all those network-connected devices.
IRI provides multiple data discovery features for personally identifiable information (PII) and other sensitive or need-to-be-found data held in enterprise sources.
Beyond data class, pattern- and fuzzy-match searches described elsewhere in this blog, this article primarily discusses the search for values held in a lookup or ‘set’ file (e.g.,