Blog

What is Varonis’ Database Activity Monitoring (DAM)?

Somerford Blog What is Varonis’ Database Activity Monitoring? Author: Beth Laws Release Date: 09/09/2025 Once again, Varonis has expanded its security capabilities as it now introduces next-generation Database Activity Monitoring (DAM). This comes after Varonis acquired Cyral earlier this year. The Cyral cloud-native DAM solution fits rather perfectly with Varonis security offerings, allowing Varonis customers […]

What is Varonis’ Database Activity Monitoring (DAM)? Read More »

Why Choose Splunk Observability Cloud?

Somerford Blog Why Choose Splunk Observability Cloud? Author: Owais Ghaffar Release Date: 28/08/2025 Understanding Observability: More Than Just Monitoring Modern IT environments are sprawling, dynamic, and increasingly complex. From containerised microservices to hybrid cloud infrastructure, the sheer scale and fluidity of today’s systems present a unique challenge: ensuring performance, availability, and reliability without getting buried

Why Choose Splunk Observability Cloud? Read More »

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 1)

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 2)

Somerford Blog Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 2) Author: Laurence Everitt Release Date: 29/05/2024 Introduction This is the second part of a 3 part explanation of how to uplift SplunkWeb from presenting a regular HTTP website to using full-blown SSL/TLS HTTPS website, end-to-end. For further information, please

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 2) Read More »

How Advanced Persistent Threats (APTs) Work

Somerford Blog How Advanced Persistent Threats (APTs) Work Author: Carl Parker Release Date: 19/01/2024 What are Advanced Persistent Threats? When belligerent parties target a business’ data and infrastructure in threatening attacks, the most commonly considered strategy is a fast, quickly spreading virus that searches for valuable information, then retreats as quickly as it entered. Advanced

How Advanced Persistent Threats (APTs) Work Read More »

Stronger Together: SecurityScorecard and Splunk

Somerford Blog Stronger Together: SecurityScorecard and Splunk Author: Andrew Weston – Security Consultant Release Date: 04/04/2019 Splunk Customers can now utilise SecurityScorecard’s certified app to improve 3rd party risk intelligence as well as gaining insights into their own cybersecurity risk. The SecurityScorecard application is now available on Splunkbase. Integrating SecurityScorecard security ratings and findings into Splunk

Stronger Together: SecurityScorecard and Splunk Read More »

Phishing Managed Service – Maximise your Defence with KnowBe4

Somerford Blog Phishing Managed Service – Maximise your Defence with KnowBe4 Author: Becca Lambert Release Date: 10/10/2023 What is KnowBe4 as a Managed Service? With KnowBe4 as a Managed Service from Somerford, we will help you to deploy your KnowBe4 Platform effectively, without taking up valuable IT or admin resources. Helping you eliminate the human

Phishing Managed Service – Maximise your Defence with KnowBe4 Read More »

What is HashiCorp Vault & How Does It Work

Protecting HashiCorp Vault against Insider Threats

Somerford Blog Protecting HashiCorp Vault against Insider Threats Author: John Jarvis Release Date: 20/09/21 We’ve talked before about HashiCorp Vault’s many features, and how it can help organisations manage their secrets. To securely do so, however, requires much from many teams across your organisation. This includes from your Vault deployment’s inception, through design to Day

Protecting HashiCorp Vault against Insider Threats Read More »

Scroll to Top