Blog

The GTRI blog provides insightful, useful and impactful information on a variety of technology topics written by our first-class engineers and technical experts. Stop back often to read about the latest tech trends and insights.

  • Splunk with Hadoop: Three Ways to Play

    Dave Herrald   |   March 30, 2013
    With Splunk's recent announcement of Hunk (Hadoop and Splunk), lots of customers are wondering exactly how these two leading big data platforms can work together.  From a Splunk perspective, there are actually three ways to integrate with... Read more
  • Using Dual Protocol for SIEMs Evasion

    Scott Hogg   |   March 24, 2013
    Attackers using IPv4 and IPv6 can avoid detection by IPS, SIEMs, reputation filtering, and more It is just a fact of life that attackers and defenders are now operating in a dual-protocol world. With the addition of IPv6, attackers are... Read more
  • Five Cyber Security Tips for Computer and Online Safety

    Dave Herrald   |   March 23, 2013
    It's October and that means National Cyber Security Awareness Month is upon us. What better time for some quick tips to make yourself more secure online? I decided to pull together the top five recommendations I often find myself giving to... Read more
  • Splunk Boot Camps

    Micah Montgomery   |   March 18, 2013
    Here at GTRI and we have had the pleasure of hosting multiple Splunk Boot Camps, informative sessions that help anyone interested in how to work with Splunk software to manage their data.  Multiple Splunk Boot Camps happen here at GTRI and... Read more
  • Cisco AnyConnect and ASA

    Dave Herrald   |   March 18, 2013
    Easily Manage Borderless Security The Cisco AnyConnect Secure Mobility Solution provides a comprehensive, highly secure enterprise mobility solution. It combines industry-leading Cisco web security with next-generation remote access... Read more
  • Security Assessments (Part 1)

    Dave Herrald   |   March 12, 2013
    I'm very excited to contribute my first series of posts to the new GTRI Technology Blog! Recently, I have spent some time talking with GTRI customers about how to assess the information security posture of their organizations. While... Read more
  • Splunk Security Overview and Demo

    Dave Herrald   |   March 9, 2013
    You may have heard that more than 2,500 organizations are now using Splunk for information security.  It's an impressive statistic, but what does it really mean?  Why do so many organizations find Splunk valuable for security?  Are they... Read more
  • All Machine Data is Security Data

    Dave Herrald   |   March 6, 2013
    Over the last month I've had a really cool opportunity to do a deep dive using Splunk to deliver IT security intelligence.  Splunk is much more than a security tool.  In fact it's a platform for collecting, analyzing, and reporting on all... Read more
  • To iPad or not to iPad, that is the question

    Craig Jeske   |   March 5, 2013
    I’ve been a pretty big proponent of mobile devices for many years now.  I jumped into e-mail on the phone early on.  I pushed the limits of the early laptops to disconnect from my desk as often as possible.  Now, with tablets I have... Read more
  • Don’t marry your data to the Cloud without a pre-nup

    Craig Jeske   |   March 5, 2013
    Cloudity cloud cloud cloud.  This is what I hear in my head nearly every time someone says they “have” to move their data to the Cloud.  And every time I hear that I have concerns.  Had a great round table discussion last week with a... Read more