Cloud, Data Analysis, Cybersecurity

Skip to content
Menu
  • Home
  • Explore
  • Cloud
  • Splunk
  • Consultancy
  • Contact Us

Month: March 2018

Architecting Splunk Deployment

by Upen PatelPosted onMarch 31, 2018April 24, 2018

Architecting Splunk Deployment Scale Splunk Enterprise functionality to handle the data needs for enterprises of any size and complexity. Access diverse or dispersed data sources.…

Read More

Characteristics of IaaS, PaaS and SaaS

by Upen PatelPosted onMarch 30, 2018April 24, 2018

IaaS Characteristics Scale Converged network and IT capacity pool Self-service and on-demand capacity High reliability and resilience IaaS key Benefits Usage is metered and price…

Read More

How to configure Splunk Multi site Indexer Cluster

by Upen PatelPosted onMarch 30, 2018April 24, 2018

Deploy a multisite indexer cluster To deploy a multisite cluster, you configure the set of nodes for each site: A single master resides on one…

Read More

USB Storage Device Monitoring using ELK

by Sumesh MSPosted onMarch 29, 2018April 24, 2018

USB storage devices are commonly used in almost all organizations to store or transfer data. These devices act as the primary sources of malware or…

Read More

Splunk deployment server configuration

by Upen PatelPosted onMarch 29, 2018April 24, 2018

Deployment Server is for distributing configuration, and apps to Splunk Universal Forwarder, and allows you to manage remote Splunk forwarder centrally. Sending configuration file like…

Read More

Logstash GROK Filter

by Sumesh MSPosted onMarch 27, 2018April 24, 2018

Grok is a filter used by Logstash to parse unstructured data to structured format which is queryable by elasticsearch. Logstash comes with almost 120 patterns…

Read More

Cloud Benefits

by Upen PatelPosted onMarch 27, 2018April 24, 2018

Private Cloud Benefits Increased control over data, underlying systems, and application Ownership and retention of governance controls. Assurance over data location, removal of multiple jurisdiction…

Read More

Basic Security Considerations for Cloud

by Upen PatelPosted onMarch 27, 2018April 24, 2018

Knowledge of the computer hardware and physical IT infrastructure are important elements of information security.    One must understand where the information physically reside on…

Read More

PHP-LDAP Authentication for Single Sign-On

by Sumesh MSPosted onMarch 26, 2018April 24, 2018

Implementation of LDAP-Authentication using php and OpenLDAP library which can be used for authentication of Active directory users in php forms. OpenLDAP Software is an…

Read More

Posts pagination

Page 1 Page 2 Page 3 Next Page
  • Contact us
  • Team
  • Privacy Policy

2023 | www.cloudcybersafe.com

Cambium Theme by BestBlogThemes ⋅ Powered by WordPress