Videos

Delinea Explained: Comparison of VPN and VNP-less Tech

Video Delinea Explained: VPN vs VPN-less Technologies Episode 6 Series Overview https://www.youtube.com/watch?v=YFD5wZoVEaA Video Summary In today’s hybrid and cloud-centric world, organisations must provide secure, scalable and efficient access to internal systems – particularly for privileged users. Traditionally, this has been achieved using Virtual Private Networks (VPNs), which establish encrypted connections between devices over less secure […]

Delinea Explained: Comparison of VPN and VNP-less Tech Read More »

Splunk Machine Learning Toolkit for Security – Part 4

Video Splunk MLTK for Security Episode 4 Video Summary Machine Learning Models and Training in the MLTK Oliver Knapp explores the four types of machine learning models—supervised, unsupervised, semi-supervised, and reinforcement learning—and explains how they can be trained and applied within Splunk ES to detect anomalies, identify patterns, and enhance risk-based alerting. This episode equips

Splunk Machine Learning Toolkit for Security – Part 4 Read More »

Splunk Machine Learning Toolkit for Security – Part 3

Video Splunk MLTK for Security Episode 3 Video Video Summary Developing Your Own Machine Learning Use Cases This episode guides viewers through building custom machine learning use cases in Splunk ES. Oliver explains how to assess current workflows, plan model implementation, test and train ML models, and deploy them in production to ensure minimal false

Splunk Machine Learning Toolkit for Security – Part 3 Read More »

Splunk Machine Learning Toolkit for Security – Part 2

Video Splunk MLTK for Security Episode 2 Video Video Summary Machine Learning Use Cases in Splunk ES Oliver Knapp dives into practical use cases for the MLTK, highlighting ways to optimise SIEM performance, automate event filtering, and enhance risk-based alerting. The episode demonstrates how pre-built models and predictive analytics can be applied across real-world security

Splunk Machine Learning Toolkit for Security – Part 2 Read More »

Splunk Machine Learning Toolkit for Security – Part 1

Video Splunk MLTK for Security Episode 1 Video Video Summary Introduction to Machine Learning in Splunk Security Somerford Connect provides expert guidance on how machine learning can be applied within Splunk Enterprise Security to enhance threat detection, automate event grouping, and enrich security insights. In this first episode, Oliver Knapp introduces the Splunk Machine Learning

Splunk Machine Learning Toolkit for Security – Part 1 Read More »

Splunk AppDynamics — Business Transactions Explained

Video Series — Splunk AppDynamics Explained AppDynamics Business Transactions Explained View Other Series Sign Up To Mailing List Video Summary This video dives into Business Transactions (BTs) in Splunk AppDynamics, showing how they provide end-to-end visibility into application performance. Our Splunk expert Bhuvnesh Yadav demonstrates how BTs map real user actions, like logins, checkouts, and

Splunk AppDynamics — Business Transactions Explained Read More »

Confluent WarpStream — A New Approach to Kafka Streaming

Video Series — Getting to Grips with Confluent Confluent WarpStream — A New Approach to Kafka Streaming View Other Series Sign Up To Mailing List Video Summary In this video, Oscar Moores explores Confluent WarpStream, a modern bring-your-own-cloud approach to running Kafka-compatible workloads without traditional brokers. WarpStream leverages cloud object storage (like AWS S3) instead

Confluent WarpStream — A New Approach to Kafka Streaming Read More »

Confluent Features — An In Depth Breakdown

Video Series — Getting to Grips with Confluent Confluent Features — An In Depth Breakdown View Other Series Sign Up To Mailing List Video Summary Confluent builds on Apache Kafka to provide a complete, enterprise-ready platform for data streaming, adding powerful capabilities around security, scalability, governance, and operational management. As part of our Confluent learning

Confluent Features — An In Depth Breakdown Read More »

Delinea Explained: Classification Priority

Video Delinea Explained: Classification Priority Episode 5 Series Overview https://www.youtube.com/watch?v=pETyjMxzsYk Video Summary In today’s complex digital environments, establishing robust cyber security begins with effective classification – of data, networks, and identities. Intuitively, most organisations prioritise data classification first, and rightly so: data is at the heart of what both legitimate users and malicious actors seek

Delinea Explained: Classification Priority Read More »

Splunk AppDynamics — Server Monitoring Explained

Video Series — Splunk AppDynamics Explained AppDynamics Server Monitoring Explained View Other Series Sign Up To Mailing List Video Summary This video demonstrates server monitoring in AppDynamics, extending observability beyond the application layer into servers, processes, containers, and Kubernetes clusters. Our Splunk expert Bhuvnesh Yadav shows how machine agents and cluster agents collect detailed metrics

Splunk AppDynamics — Server Monitoring Explained Read More »

Scroll to Top