Carl Parker

Information banner about 4 part webinar series, securing data sovereignty

Securing Data Sovereignty in the Cloud Era with Netskope: Webinar Series

Delivering the Central Pillars of Zero Trust Securing Government Data and Ensuring Sovereignty Securing public sector data and defending against threats with Netskope’s UK cloud services.​ Full Webinar Series Available to Watch On-Demand Virtual, GoToWebinar Please complete a GoToWebinar System Check to ensure device compatibility WATCH NOW SIGN UP TO MAILING LIST Series Summary As

Securing Data Sovereignty in the Cloud Era with Netskope: Webinar Series Read More »

Why Should Businesses Utilise Real-Time Data Streaming

Why Should Businesses Utilise Real-Time Data Streams?

Somerford Blog Why Should Businesses Utilise Real-Time Data Streams? Author: Jamie Turbill Release Date: 25/07/2024 Increasingly and in the last decade, data has become one of the most important assets in business. As services become ever more digital, we expect things to be available on-demand in an instant. Organisations are reliant on data-driven systems to

Why Should Businesses Utilise Real-Time Data Streams? Read More »

Privilege Access Management Maturity Showcase with Delinea

Introductory Webinar Privileged Access Management Maturity Showcase with Delinea Reduce risk associated with privileged accounts, enhance business agility, & boost efficiency.​ Available to Watch on Demand Virtual, GoToWebinar Please complete a GoToWebinar System Check to ensure device compatibility WATCH NOW SIGN UP TO MAILING LIST Meet the Experts Mark Lillywhite,Enterprise Sales Engineer at Delinea Ewan

Privilege Access Management Maturity Showcase with Delinea Read More »

What Is Data Security Posture Management (DSPM)

What is Data Security Posture Management (DSPM)?

Somerford Blog What is Data Security Posture Management (DSPM)? Author: Beth Laws Release Date: 28/06/2024 DSPM is a term being used frequently throughout the Security world. DSPM stands for Data Security Posture Management and focuses on improving businesses’ overall security stance when it comes to their data and compliance requirements. Protecting company data and proprietary

What is Data Security Posture Management (DSPM)? Read More »

What Is Attack Path Analysis

What is Attack Path Analysis?

Somerford Blog What is Attack Path Analysis? Author: Jake Hammacott Release Date: 17/06/2024 Attack path analysis is a generic term used for solutions that attempt to link and visualise risky assets that could be exploited in tandem to progress the state of a cyber-attack. The purpose of this is to enrich compliance, vulnerability and entitlement

What is Attack Path Analysis? Read More »

Scroll to Top