Resources
A collection of Anvilogic blogs, webinars, and solution deep dives to explore our products, use cases, and integrations.
.avif)

On-Demand Webinar
Security Data Lake Implementation: Beyond the SIEM?
All Resources

Event
GBI: Los Angeles, CA
.avif)
Event
Gartner Security & Risk Management Summit
.png)
Event
Minneapolis Forum

Event
GBI: Toronto, Canada

Event
IANS: Dallas, TX

Blog
A Technical Guide to Automating SOC Operations with Anvilogic Blueprints
Watch
.png)
Transforming SecOps: A Discussion With McDonald’s & Snowflake
Webinar
.png)
It’s Not the Number of Alerts, It’s How You Use ‘Em Feat. eBay
Webinar
.png)
See How a Fortune 500 Financial Customer Detects Attacks
Webinar
.png)
Optimize Your Detection, Hunting, Triage & Response Lifecycle
Webinar
.png)
Don’t Let a Headline Alert Ruin Happy Hour
Webinar
-min.png)
Security (Re)evolution with Twitter, CSC, Regeneron & Medallia
Webinar
Podcast

Does the SOC have a Memory Problem?? A better approach to your field notes feat. K.C Yerrid
.png)
The New Definition of Visibility & the Evolving Role of IOCs: Detection Engineering Through a UFO Lens with David Burkett

The SOC Then vs Now...a 'Possible Travel' Season 2 Special Feat. Matt Konwiser & Chris Liccardi
.png)
Cool Story, Bro: Making Detection Engineering Matter Up the Chain

To AI SOC or not to AI SOC? Feat. Dennis Chow
.png)
Spencer Pratt on Agentic RAGs + Chicago Reccs for Newbies
Read
-min.png)
Blog
The Fundamentals of Detection Engineering for Splunk Users

Blog
Forge Charged News: The Most Electrifying News From June 2023

Blog
Find Gold in the Mundane: How Common Linux System Activity Reveal Hidden Insights
-min.png)
Blog
Reduce the Complexities of Detection Engineering, Tuning, Maintenance and Hunting with Anvilogic for Splunk
-min.png)
Blog
Meet the Logician: Sota Aoki
-min.png)
Blog
Revealing Behaviors: The Key to Foiling Stealthy Threat Actors
Build Detections You Want, Where You Want


