Splunk4Rookies – IT Service Intelligence (ITSI)
Splunk4Rookies – IT Service Intelligence (ITSI) Read More »
Somerford Blog Why Organisations Need Privileged Access Management (PAM) Systems Author: Ewan Brown Release Date: 03/02/2025 In the modern digital landscape, securing an organisation’s sensitive data and infrastructure is critical. Cyber threats are constantly evolving, and one of the primary targets for attackers is privileged accounts. These accounts hold elevated permissions, allowing users to access
Why Organisations Need Privileged Access Management Systems Read More »
Somerford Blog What is SASE? A Guide to Secure Access Service Edge Author: Saul Mulcrow Release Date: 29/01/2025 With businesses shifting towards remote and hybrid environments, alongside the digital transformation of organisations, there has been a need for more secure and flexible network architectures. This is where we can utilise Secure Access Service Edge (or
What is SASE? A Guide to Secure Access Service Edge Read More »
Fireside Chat End-to-End Monitoring: Volume 2 – Cisco Updates Shaping Splunk, AppDynamics, and ThousandEyes Cisco’s updates enhancing end-to-end monitoring for Splunk, AppDynamics, and ThousandEyes. Available to Watch on Demand Virtual, GoToWebinar Please complete a GoToWebinar System Check to ensure device compatibility Featuring SIGN UP TO MAILING LIST End-to-End Monitoring v2: Cisco Live Updates Join us
Somerford Blog How HashiCorp’s Solutions Suite Secures Kubernetes for Business Success Author: John Jarvis Release Date: 22/01/2024 Kubernetes has become a cornerstone of modern architecture. But managing it at scale, and securely, can be a big challenge. That’s where HashiCorp’s suite of tools comes in. From secrets management with Vault to service mesh security with
How HashiCorp’s Solutions Suite Secures Kubernetes for Business Success Read More »
Somerford Blog Why is Cloud Visibility Important? Author: Jake Hammacott Release Date: 09/01/2025 What is Cloud Visibility? Cloud Visibility is the ability for an organisation to assess and monitor cloud resources. From the actual infrastructure being run in the cloud, how resources are used and changed by processes and users, to the actual cost and
Why is Cloud Visibility Important? Read More »
Somerford Blog How Does Varonis MDDR Help to Mitigate Complex Threats Author: Beth Laws Release Date: 23/12/2024 The new Varonis Managed Data Detection and Response (MDDR) offering provides 24/7, 365 days a year service. MDDR combines the data security platform’s award winning threat detection technology alongside the Varonis team of cyber experts to investigate and
How Does Varonis MDDR Help to Mitigate Complex Threats? Read More »
Introductory Webinar Confluent: Event-Driven Architecture (EDA) 101 How Event-Driven Architecture (EDA) can transform real-time data processing and integration. Available to Watch on Demand Virtual, GoToWebinar Please complete a GoToWebinar System Check to ensure device compatibility SIGN UP TO MAILING LIST WATCH NOW Introduction to Event-Driven Architecture (EDA) Join Jamie Turbill, Certified Confluent Technical Expert, for
Confluent: Event-Driven Architecture (EDA) 101 Webinar Read More »