Resources
A collection of Anvilogic blogs, webinars, and solution deep dives to explore our products, use cases, and integrations.
.avif)

On-Demand Webinar
The Tines and Anvilogic Playbook for Slick Detection-to-Response
All Resources
.png)
On-Demand Webinar
The State of Detection Engineering in 2025: Key Insights from a SANS & Anvilogic Survey Report
Webinar

Blog
Detection Engineering Goes Mainstream: 80% of Surveyed Organizations Actively Investing

Report
2025 State of Detection Engineering

Blog
Top 10 KQL Queries Every DE Should Know
Blog
The Biggest Detection Engineering Pet Peeve and How to Fix It
Blog
Detection Engineering Escalation and Recommendation (DEER) Framework
Watch

On-Demand Webinar
Revolutionizing the SIEM: How Data Lakes are at the Center of a Modern Security Architecture
Webinar

On-Demand Webinar
Strategies for Decoupling Your Security Analytics and Adopting a Modern Security Data Lake
Webinar

Post Splunk: Your roadmap to adopting a cost-effective cloud-native security data lake at your own pace
Webinar

Demos
Stop Alert Fatigue: Understanding the Importance of Sequence-Based Detections

Demos
Exploring New Capabilities for Snowflake Users with Anvilogic

Demos
Anvilogic Automates Investigations with Generative AI and Snowflake
Podcast

Does the SOC have a Memory Problem?? A better approach to your field notes feat. K.C Yerrid
.png)
The New Definition of Visibility & the Evolving Role of IOCs: Detection Engineering Through a UFO Lens with David Burkett

The SOC Then vs Now...a 'Possible Travel' Season 2 Special Feat. Matt Konwiser & Chris Liccardi
.png)
Cool Story, Bro: Making Detection Engineering Matter Up the Chain

To AI SOC or not to AI SOC? Feat. Dennis Chow
.png)
Spencer Pratt on Agentic RAGs + Chicago Reccs for Newbies
Read

External
Calculator

Solution Brief
AI SOC Executive Overview

Solution Guide
AI-Powered Agents for the Modern SOC

Solution Guide
Detection-as-Code

Blog
Beyond Copilots: Building Triage Agents That Eliminate Investigation

Blog
The Agentic Detection Engineer: Automating the Scientific Method for Cybersecurity
Build Detections You Want, Where You Want


