Videos

Delinea Explained: Tier 0 Server Security

Video Delinea Explained: Tier 0 Server Security Episode 4 Series Overview Video Summary Tier Zero servers refer to the most critical systems within an organisation’s infrastructure, such as domain controllers, databases, and core Unix servers, whose compromise would have a significant impact on business operations. These assets are prime targets for attackers who exploit lateral […]

Delinea Explained: Tier 0 Server Security Read More »

Delinea Explained: Lateral Movement

Video Delinea Explained: Lateral Movement Episode 3 Series Overview Video Summary Preventing lateral movement is a crucial challenge in modern cybersecurity, particularly as organisations scale their digital infrastructure. Lateral movement refers to the ability of users, whether legitimate or malicious, to access one system and then traverse to others within a network without restriction. Traditional

Delinea Explained: Lateral Movement Read More »

Varonis for SaaS Security: Real-Time Visibility and Control​

Varonis for SaaS Security: Real-Time Visibility and Control View Other Series Request a Session With One of Our Consultants WATCH NOW Series Sponsors: SIGN UP TO MAILING LIST About the Episode As organisations increasingly rely on SaaS applications to drive productivity, they also face new security challenges, ranging rom the exposure of sensitive data to

Varonis for SaaS Security: Real-Time Visibility and Control​ Read More »

Varonis & Microsoft Better Together – Helping Customers Maximise Investment with Purview + E5​​

Varonis & Microsoft Better Together – Helping Customers Maximise Investment with Purview + E5​​ View Other Series Request a Session With One of Our Consultants WATCH NOW Series Sponsors: SIGN UP TO MAILING LIST About the Episode In today’s digital landscape, it’s vital for organisations to go beyond native Microsoft capabilities and implement data-centric security

Varonis & Microsoft Better Together – Helping Customers Maximise Investment with Purview + E5​​ Read More »

Somerford Splunk Technical Value Assessment Explained

Video Somerford Splunk Technical Value Assessment Explained All Videos Video Summary The Somerford Splunk Technical Value Assessment (TVA) is a complimentary service designed to help organisations maximise their use of the Splunk platform. The TVA is a two-stage process, starting with a full technical assessment, often referred to as a Splunk health check. This phase

Somerford Splunk Technical Value Assessment Explained Read More »

Splunk for Security: SSE – Security Data Journey New Terms – Episode 10

Video Splunk for Security: SSE – Security Data Journey New Terms Episode 10 Series Overview Video Summary This video explores the Splunk Security Data Journey, outlining the four maturity levels that organisations follow to enhance their security operations. It begins with foundational data insights, focusing on collecting and normalising high-value security data to improve visibility

Splunk for Security: SSE – Security Data Journey New Terms – Episode 10 Read More »

Delinea Explained: What’s the Difference Between Password Management and Privileged Access Management?

Video Delinea Explained: What’s the Difference Between Password Manager and Privileged Access Management? Episode 2 Series Overview Video Summary Password management and privileged access management (PAM) serve distinct but complimentary roles in cybersecurity. Password management tolls enable users to securely create, store, and manage passwords, ensuring strong authentication practices while remaining cost-effect and user-friendly. However,

Delinea Explained: What’s the Difference Between Password Management and Privileged Access Management? Read More »

Delinea Explained: What is Delinea and PAM?

Video Delinea Explained: What is Delinea and PAM? Episode 1 Series Overview Video Summary Delinea are a leading provider of Privileged Access Management (PAM) solutions, designed to secure privileged accounts, manage access controls, and mitigate cyber threats. With a focus on seamless scalable, and cloud-ready PAM solutions, Delinea serves organisations of all sizes. Formed from

Delinea Explained: What is Delinea and PAM? Read More »

Securing and Ensuring Data Sovereignty: Securing AI – Episode 4

Video Securing and Ensuring Data Sovereignty: Securing AI Episode 4 Series Overview Video Summary This video explores the growing integration of generative AI tools, such as ChatGPT, GitHub CoPilot, and Grammarly, within organisations, and how businesses can effectively manage and secure their use. The discussion highlights the challenges associated with AI’s data handling, particularly in

Securing and Ensuring Data Sovereignty: Securing AI – Episode 4 Read More »

Securing and Ensuring Data Sovereignty: Control Insider Risk – Episode 3

Video Securing and Ensuring Data Sovereignty: Control Insider Risk Episode 3 Series Overview Video Summary In this video, we walk through the process of managing user and device risk within an organisation, focusing on data protection and compliance requirements. The session highlights how contextual controls, device compliance, and behavioural analytics can work together to secure

Securing and Ensuring Data Sovereignty: Control Insider Risk – Episode 3 Read More »

Scroll to Top