Videos

What is Splunk Observability Cloud?

Video What is Splunk Observability Cloud? Episode 8 Series Overview Video Click the image to sign up to receive access to our video guide explaining ‘What is Splunk Observability Cloud?’. Video Summary Introducing Splunk Observability Cloud Splunk Observability Cloud provides full-stack monitoring across infrastructure, applications, and user experience. The platform is designed to reduce both […]

What is Splunk Observability Cloud? Read More »

What is Cisco XDR?

Video What is Cisco XDR? Episode 7 Series Overview Video Click the image to sign up to receive access to our video guide explaining ‘What is Cisco XDR?’. Video Summary Overview of Cisco XDR What is Cisco XDR? Cisco XDR (Extended Detection and Response) is a cloud-based security solution that helps teams detect, prioritise, and

What is Cisco XDR? Read More »

What is Splunk SOAR?

Video What is Splunk SOAR? Episode 4 Series Overview Video Click the image to sign up to receive access to our video guide explaining ‘What is Splunk SOAR?’. Video Summary Splunk SOAR (Security Orchestration, Automation and Response) is a market-leading platform that empowers security teams to automate repetitive tasks, orchestrate workflows, and respond to incidents

What is Splunk SOAR? Read More »

What is Splunk SIEM?

Video What is Splunk SIEM? Episode 2 Series Overview Video Click the image to sign up to receive access to our video guide explaining ‘What is SIEM?’. Video Summary Core Capabilities of Splunk ES Splunk Enterprise Security acts as the central nervous system of the security operations centre (SOC), delivering a range of advanced features,

What is Splunk SIEM? Read More »

Delinea Explained: Comparison of VPN and VNP-less Technologies

Video Delinea Explained: VPN vs VPN-less Technologies Episode 6 Series Overview https://www.youtube.com/watch?v=YFD5wZoVEaA Video Summary In today’s hybrid and cloud-centric world, organisations must provide secure, scalable and efficient access to internal systems – particularly for privileged users. Traditionally, this has been achieved using Virtual Private Networks (VPNs), which establish encrypted connections between devices over less secure

Delinea Explained: Comparison of VPN and VNP-less Technologies Read More »

Delinea Explained: Classification Priority

Video Delinea Explained: Classification Priority Episode 5 Series Overview https://www.youtube.com/watch?v=pETyjMxzsYk Video Summary In today’s complex digital environments, establishing robust cyber security begins with effective classification – of data, networks, and identities. Intuitively, most organisations prioritise data classification first, and rightly so: data is at the heart of what both legitimate users and malicious actors seek

Delinea Explained: Classification Priority Read More »

Scroll to Top