Blog

Automated Threat Analysis from Splunk and Somerford

Blog post: Splunk ITSI – getting to the heart of the problem

Somerford Blog ITSI – Getting to the Heart of the Problem Author: Andy Gibbs Release Date: 26/06/2019 Its 3 o’clock in the morning and you are unceremoniously awoken by your smartphone. That beautiful dream you were just having dissolves into a stark reality – you’re being beckoned onto a priority 1 emergency incident call. Critical […]

Blog post: Splunk ITSI – getting to the heart of the problem Read More »

Varonis deployment at a leading multinational organisation

Somerford Blog Deploying Varonis at a Leading Multi-National Organisation Author: Matt Woodhams Release Date: 29/09/2022 SIGN UP TO MAILING LIST Linkedin Twitter Youtube As a Project Manager at Somerford, I am involved in delivering projects across our broad range of partner products. Each project is customer-specific and can involve unique challenges and issues, however there

Varonis deployment at a leading multinational organisation Read More »

What Is Data Security Posture Management (DSPM)

What is Data Security Posture Management (DSPM)?

Somerford Blog What is Data Security Posture Management (DSPM)? Author: Beth Laws Release Date: 28/06/2024 DSPM is a term being used frequently throughout the Security world. DSPM stands for Data Security Posture Management and focuses on improving businesses’ overall security stance when it comes to their data and compliance requirements. Protecting company data and proprietary

What is Data Security Posture Management (DSPM)? Read More »

Why Are ZTNAs Replacing Traditional VPNs?

Somerford Blog Why Are ZTNAs Replacing Traditional VPNs? Author: Ben Norcutt Release Date: 27/03/2025 In today’s evolving cybersecurity landscape, traditional Virtual Private Networks (VPNs) are increasingly being replaced by Zero Trust Network Access (ZTNA) solutions. As organisations shift to remote and hybrid work models, securing remote access efficiently and effectively has become a top priority.

Why Are ZTNAs Replacing Traditional VPNs? Read More »

A Deep Dive into Splunk Mission Control and TIM

A Deep Dive into Splunk Mission Control and TIM: Unlocking the Power of Incident Response

Somerford Blog A Deep Dive into Splunk Mission Control and TIM: Unlocking the Power of Incident Response Author: Jack Hancox Release Date: 30/08/2024 In today’s fast-paced digital landscape, cybersecurity incidents are not a matter of “if,” but “when.” The ability to swiftly detect, investigate, and respond to these incidents is paramount in safeguarding organisations against

A Deep Dive into Splunk Mission Control and TIM: Unlocking the Power of Incident Response Read More »

Scroll to Top