Blog

Mastering Data Security Posture Management

Mastering Data Security Posture: A Strategic Imperative in a Complex Landscape

Somerford Blog Mastering Data Security Posture: A Strategic Imperative in a Complex Landscape Author: Bill Balfour Release Date: 21/10/2024 With 35 years of navigating the cybersecurity battlefield, I’ve seen the stakes around data security evolve into a business-critical issue that no organisation can afford to overlook. In the current landscape, cyber threats are more sophisticated,

Mastering Data Security Posture: A Strategic Imperative in a Complex Landscape Read More »

What is HashiCorp Vault & How Does It Work

What is HashiCorp Vault and How Does it Work?

Somerford Blog What is HashiCorp Vault? Author: John ‘JJ’ Jarvis Release Date: 21/02/2023 By now, you’ve probably heard about HashiCorp, or at least their flagship product: Terraform, which automates the provisioning of infrastructure through what’s dubbed Infrastructure as Code, or IaC, for short. But HashiCorp offers a number of solutions in this automation space, collectively

What is HashiCorp Vault and How Does it Work? Read More »

Simplify Infrastructure Provisioning with Somerford's ATIP App

Simplify Infrastructure Provisioning with Somerford’s ATIP App

Somerford Blog Simplify Infrastructure Provisioning with Somerford’s ATIP App Author: Jordan Phillpotts Release Date: 05/01/2024 It’s the age-old problem, how do I host my applications or web services? Okay maybe not age old but certainly it’s something any burgeoning tech company would be thinking about, do you go for on-premises, off-site, or cloud? And how

Simplify Infrastructure Provisioning with Somerford’s ATIP App Read More »

How to Provision and Deprovision users within Okta

Somerford Blog How to Provision and De-Provision users within Okta Author: Shaq Duffus-Gordon Release Date: 05/07/2023 How do you Provision an Un-Provisioned user? The benefits of provisioning with Okta are that Okta can create/read/update accounts for all users and can remove accounts when users get deactivated. Provisioning can also save time when setting up new

How to Provision and Deprovision users within Okta Read More »

What is the Splunk Edge Hub

Splunk Edge Hub Use Cases

Somerford Blog Splunk Edge Hub Use Cases Author: Becca Lambert Release Date: 22/08/2024 What is the Splunk Edge Hub? Splunk Edge Hub is a fully integrated hardware and software solution with integrated sensors and all the necessary connectivity libraries already integrated into it. Providing the user with a quick and easy to use solution of

Splunk Edge Hub Use Cases Read More »

What are the Benefits of Splunk’s Fraud Analytics Add-On

What are the Benefits of Splunk’s Fraud Analytics Add-On?

Somerford Blog What are the Benefits of Splunk’s Fraud Analytics Add-On? Author: Oliver Knapp Release Date:10/10/2024 In the modern business world, there are many ways and platforms to sell products, be that through word of mouth, in person or, especially in recent years, online. However, this recent broadening of selling surface area and business operation

What are the Benefits of Splunk’s Fraud Analytics Add-On? Read More »

Threat Detection and Investigation with Splunk & Varonis

Threat Detection and Investigation with Splunk & Varonis

Somerford Blog Threat Detection and Investigation with Splunk & Varonis Author: Charlotte Fletcher Release Date: 21/05/2021 Ultimately, we want to reduce the mean time to detection and, more importantly, mean time to response. We need human resources for other tasks and that’s why we rely on technologies like Splunk and Varonis to integrate and provide

Threat Detection and Investigation with Splunk & Varonis Read More »

What is Confluent TableFlow

What is Confluent TableFlow?

Somerford Blog What is Confluent TableFlow? Author: Sam Ward Release Date: 13/09/2024 Understanding the Fundamentals: Apache Iceberg and Data Structures To first understand what TableFlow does, and how Confluent makes use of it, we first need to dive into what Apache Iceberg is, what Data Lakehouses are, and how we can take advantage of them.

What is Confluent TableFlow? Read More »

Scroll to Top