Resources

A collection of Anvilogic blogs, webinars, and solution deep dives to explore our products, use cases, and integrations.

All Resources

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Event
GBI: Los Angeles, CA
Event
Gartner Security & Risk Management Summit
Event
Minneapolis Forum
Event
GBI: Toronto, Canada
Event
IANS: Dallas, TX
Blog
A Technical Guide to Automating SOC Operations with Anvilogic Blueprints

Watch

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security Data Lake Implementation: Beyond the SIEM?
Webinar
On-Demand Webinar
The Tines and Anvilogic Playbook for Slick Detection-to-Response
Webinar
On-Demand Webinar
SAP’s Playbook for AI-Native Threat Detection with Anvilogic and Databricks
Webinar
On-Demand Webinar
How Leading Teams Use Sentinel + Anvilogic to Correlate More with Confidence
Webinar
On-Demand Webinar
Anvilogic for Databricks: Decoupled Detection Engineering Meets Cost-Effective Lakehouse Power
Webinar
On-Demand Webinar
The State of Detection Engineering in 2025: Key Insights from a SANS & Anvilogic Survey Report
Webinar

Podcast

Malware Trends, Credential Soup and Scream Therapy
What Your EDR Doesn’t See...Kostas Drops Receipts from the Telemetry Trenches
SIEMs & Data Lakes can be friends...it isn't Either/Or, It’s Yes, And.
Detection in Flux: Riding the Chaos with Day Johnson
A New Way to UBA feat. Snowflake’s Insider Threat Team
Prompted to Fail: When LLMs Go Rogue

Read

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Blog
Introducing Monte Copilot Now on its 2nd Generation
Blog
Cribl Introduces New Integration with Anvilogic’s Multi-Data Platform SIEM
Solution Guide
Anvilogic for Microsoft Sentinel Guide
Solution Guide
Elevate Security Operations Efficiency with GenAI
Solution Guide
Unify Your SIEM and Data Lake Without Replacing Splunk
Solution Guide
Harness the Power of Predictive & Generative AI in Security Operations

Build Detections You Want, Where You Want