Resources

A collection of Anvilogic blogs, webinars, and solution deep dives to explore our products, use cases, and integrations.

All Resources

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Event
GBI: Los Angeles, CA
Event
Gartner Security & Risk Management Summit
Event
Minneapolis Forum
Event
GBI: Toronto, Canada
Event
IANS: Dallas, TX
Blog
A Technical Guide to Automating SOC Operations with Anvilogic Blueprints

Watch

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security Data Lake Implementation: Beyond the SIEM?
Webinar
On-Demand Webinar
The Tines and Anvilogic Playbook for Slick Detection-to-Response
Webinar
On-Demand Webinar
SAP’s Playbook for AI-Native Threat Detection with Anvilogic and Databricks
Webinar
On-Demand Webinar
How Leading Teams Use Sentinel + Anvilogic to Correlate More with Confidence
Webinar
On-Demand Webinar
Anvilogic for Databricks: Decoupled Detection Engineering Meets Cost-Effective Lakehouse Power
Webinar
On-Demand Webinar
The State of Detection Engineering in 2025: Key Insights from a SANS & Anvilogic Survey Report
Webinar

Podcast

Freeing Data for Better Security: The Latest Cribl Stream and Anvilogic Integration
2024 Mid-Year Attacks & Trends
Oliver Rochford on AI Chatbots in Security
Andrew Vanvleet on Advanced Detection Engineering Approach and Threat Hunting
Cybersecurity Incident Report Writing Workshop
Cloud Security Detections: Practical Insights from Attack Emulations

Read

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Blog
The Fundamentals of Detection Engineering for Splunk Users
Blog
Forge Charged News: The Most Electrifying News From June 2023
Blog
Find Gold in the Mundane: How Common Linux System Activity Reveal Hidden Insights
Blog
Reduce the Complexities of Detection Engineering, Tuning, Maintenance and Hunting with Anvilogic for Splunk
Blog
Meet the Logician: Sota Aoki
Blog
Revealing Behaviors: The Key to Foiling Stealthy Threat Actors

Build Detections You Want, Where You Want