Blog

HashiCorp Consul 2

What is HashiCorp Consul?

Somerford Blog What is HashiCorp Consul? Author: John ‘JJ’ Jarvis Release Date: 24/01/2024 Consul is a service networking solution. But what do we mean by that? Well, when we’re talking about what HashiCorp calls the Cloud Operating Model, we have to change our approach, on many fronts: if there is still a ticketing system of […]

What is HashiCorp Consul? Read More »

Simplify Infrastructure Provisioning with Somerford's ATIP App

Simplify Infrastructure Provisioning with Somerford’s ATIP App

Somerford Blog Simplify Infrastructure Provisioning with Somerford’s ATIP App Author: Jordan Phillpotts Release Date: 05/01/2024 It’s the age-old problem, how do I host my applications or web services? Okay maybe not age old but certainly it’s something any burgeoning tech company would be thinking about, do you go for on-premises, off-site, or cloud? And how

Simplify Infrastructure Provisioning with Somerford’s ATIP App Read More »

How to Provision and Deprovision users within Okta

Somerford Blog How to Provision and De-Provision users within Okta Author: Shaq Duffus-Gordon Release Date: 05/07/2023 How do you Provision an Un-Provisioned user? The benefits of provisioning with Okta are that Okta can create/read/update accounts for all users and can remove accounts when users get deactivated. Provisioning can also save time when setting up new

How to Provision and Deprovision users within Okta Read More »

What is the Splunk Edge Hub

Splunk Edge Hub Use Cases

Somerford Blog Splunk Edge Hub Use Cases Author: Becca Lambert Release Date: 22/08/2024 What is the Splunk Edge Hub? Splunk Edge Hub is a fully integrated hardware and software solution with integrated sensors and all the necessary connectivity libraries already integrated into it. Providing the user with a quick and easy to use solution of

Splunk Edge Hub Use Cases Read More »

What Is Data Security Posture Management (DSPM)

What is Data Security Posture Management (DSPM)?

Somerford Blog What is Data Security Posture Management (DSPM)? Author: Beth Laws Release Date: 28/06/2024 DSPM is a term being used frequently throughout the Security world. DSPM stands for Data Security Posture Management and focuses on improving businesses’ overall security stance when it comes to their data and compliance requirements. Protecting company data and proprietary

What is Data Security Posture Management (DSPM)? Read More »

What are the Benefits of Splunk’s Fraud Analytics Add-On

What are the Benefits of Splunk’s Fraud Analytics Add-On?

Somerford Blog What are the Benefits of Splunk’s Fraud Analytics Add-On? Author: Oliver Knapp Release Date:10/10/2024 In the modern business world, there are many ways and platforms to sell products, be that through word of mouth, in person or, especially in recent years, online. However, this recent broadening of selling surface area and business operation

What are the Benefits of Splunk’s Fraud Analytics Add-On? Read More »

Threat Detection and Investigation with Splunk & Varonis

Threat Detection and Investigation with Splunk & Varonis

Somerford Blog Threat Detection and Investigation with Splunk & Varonis Author: Charlotte Fletcher Release Date: 21/05/2021 Ultimately, we want to reduce the mean time to detection and, more importantly, mean time to response. We need human resources for other tasks and that’s why we rely on technologies like Splunk and Varonis to integrate and provide

Threat Detection and Investigation with Splunk & Varonis Read More »

What is Confluent TableFlow

What is Confluent TableFlow?

Somerford Blog What is Confluent TableFlow? Author: Sam Ward Release Date: 13/09/2024 Understanding the Fundamentals: Apache Iceberg and Data Structures To first understand what TableFlow does, and how Confluent makes use of it, we first need to dive into what Apache Iceberg is, what Data Lakehouses are, and how we can take advantage of them.

What is Confluent TableFlow? Read More »

Scroll to Top