Saul Mulcrow

Varonis & Microsoft Better Together – Helping Customers Maximise Investment with Purview + E5​​

Varonis & Microsoft Better Together – Helping Customers Maximise Investment with Purview + E5​​ View Other Series Request a Session With One of Our Consultants WATCH NOW Series Sponsors: SIGN UP TO MAILING LIST About the Episode In today’s digital landscape, it’s vital for organisations to go beyond native Microsoft capabilities and implement data-centric security […]

Varonis & Microsoft Better Together – Helping Customers Maximise Investment with Purview + E5​​ Read More »

Somerford Splunk Technical Value Assessment Explained

Video Somerford Splunk Technical Value Assessment Explained All Videos Video Summary The Somerford Splunk Technical Value Assessment (TVA) is a complimentary service designed to help organisations maximise their use of the Splunk platform. The TVA is a two-stage process, starting with a full technical assessment, often referred to as a Splunk health check. This phase

Somerford Splunk Technical Value Assessment Explained Read More »

Splunk for Security: SSE – Security Data Journey New Terms – Episode 10

Video Splunk for Security: SSE – Security Data Journey New Terms Episode 10 Series Overview Video Summary This video explores the Splunk Security Data Journey, outlining the four maturity levels that organisations follow to enhance their security operations. It begins with foundational data insights, focusing on collecting and normalising high-value security data to improve visibility

Splunk for Security: SSE – Security Data Journey New Terms – Episode 10 Read More »

Delinea Explained: What’s the Difference Between Password Management and Privileged Access Management?

Video Delinea Explained: What’s the Difference Between Password Manager and Privileged Access Management? Episode 2 Series Overview Video Summary Password management and privileged access management (PAM) serve distinct but complimentary roles in cybersecurity. Password management tolls enable users to securely create, store, and manage passwords, ensuring strong authentication practices while remaining cost-effect and user-friendly. However,

Delinea Explained: What’s the Difference Between Password Management and Privileged Access Management? Read More »

Delinea Explained: What is Delinea and PAM?

Video Delinea Explained: What is Delinea and PAM? Episode 1 Series Overview Video Summary Delinea are a leading provider of Privileged Access Management (PAM) solutions, designed to secure privileged accounts, manage access controls, and mitigate cyber threats. With a focus on seamless scalable, and cloud-ready PAM solutions, Delinea serves organisations of all sizes. Formed from

Delinea Explained: What is Delinea and PAM? Read More »

Regulatory Requirements in Saudi Arabia – Navigating Compliance Landscape

🇦🇪 Regulatory Requirements in Saudi Arabia – Navigating Compliance Landscape Secure your cloud, simplify your stack, and meet regulatory requirements with Netskope. View Series Overview Request a Session With One of Our Consultants WATCH NOW Series Featuring: SIGN UP TO MAILING LIST About this Episode This webinar provides essential guidance on navigating Saudi Arabia’s specific

Regulatory Requirements in Saudi Arabia – Navigating Compliance Landscape Read More »

Zero Trust Network Access – Securing the Distributed Workforce

🇦🇪 Zero Trust Network Access – Securing the Distributed Workforce Learn how to effectively deploy ZTNA to keep your sensitive data and applications secure. View Other Series Request a Session With One of Our Consultants WATCH NOW Series Featuring: SIGN UP TO MAILING LIST About this Episode This session explores the importance of Zero Trust

Zero Trust Network Access – Securing the Distributed Workforce Read More »

Tool Consolidation – Simplifying Security in a Complex World

🇦🇪 Tool Consolidation – Simplifying Security in a Complex World Discover how to effectively streamline your security tools to cut costs and boost your security incident response. View Other Series Request a Session With One of Our Consultants WATCH NOW Series Featuring: SIGN UP TO MAILING LIST About this Episode Our first video will explore

Tool Consolidation – Simplifying Security in a Complex World Read More »

Securing and Ensuring Data Sovereignty: Securing AI – Episode 4

Video Securing and Ensuring Data Sovereignty: Securing AI Episode 4 Series Overview Video Summary This video explores the growing integration of generative AI tools, such as ChatGPT, GitHub CoPilot, and Grammarly, within organisations, and how businesses can effectively manage and secure their use. The discussion highlights the challenges associated with AI’s data handling, particularly in

Securing and Ensuring Data Sovereignty: Securing AI – Episode 4 Read More »

Securing and Ensuring Data Sovereignty: Data Movement – Episode 2

Video Securing and Ensuring Data Sovereignty: Data Movement Episode 2 Series Overview Video Summary In this video, we explore how Netskope’s advanced Data Loss Prevention (DLP) solution offers comprehensive security coverage across various channels, ensuring data is protected wherever it resides or moves. From web traffic to endpoints, email attachments, and cloud applications like OneDrive,

Securing and Ensuring Data Sovereignty: Data Movement – Episode 2 Read More »

Scroll to Top