Channel Avatar

Somerford Associates @UCv0ZL6nwghTSBAPR15LOEMg@youtube.com

2.7K subscribers

Providing innovative Business Intelligence and Information S


26:02
What is Splunk? Enterprise & Cloud Overview (2025)
27:06
Building Next‐Gen Manufacturing Operations with AI and ML — Splunk for OT (Ep3)
13:56
How to Strengthen IT/OT Security and Build Resilience — Splunk for OT (Ep2)
17:19
What Is Energy Management in Manufacturing and How to Optimise It — Splunk for OT (Ep1)
08:10
Why VPNless is Transforming Secure Access and Why VPNs Still Matter — Delinea Explained Series (Ep6)
30:54
How Splunk is Bridging IT and OT — The Somerford Podcast, S6E7
53:07
Dame Alison Rose & Major General Sarah Johansen: Lessons in Leadership — The Somerford Podcast, S6E6
09:55
Why Data Classification Comes First and Why Admins Are Still a Risk — Delinea Explained Series (Ep5)
05:13
What Is a Tier 0 Server and How to Secure It — Delinea Explained Series (Ep4)
05:47
How to Really Prevent Lateral Movement — Delinea Explained Series (Ep3)
09:34
Password Managers vs PAM: What’s the Difference? — Delinea Explained Series (Ep2)
51:26
Zand’s AI-Powered Digital-First Approach to Banking — The Somerford Podcast: Season 6 Episode 5
50:27
Network International's SASE Journey with Netskope — The Somerford Podcast: Season 6 Episode 4
12:56
What Is Privileged Access Management? — Delinea Explained Series (Ep1)
29:16
How Splunk Attack Analyzer Speeds Up SOC Investigations | Deep Dive Demo
24:00
How to Secure AI Use in Business with Netskope — Securing Data Sovereignty (Ep. 4)
28:38
How TGW Uses Splunk for Operational Resilience — The Somerford Podcast: Season 6 Episode 3
26:05
Controlling Insider Risk with Netskope—Securing Data Sovereignty (Ep. 3)
28:54
Securing Data Movement with Netskope DLP—Securing Data Sovereignty (Ep. 2)
48:03
The Urgency for AI Governance — The Somerford Podcast: Season 6, Episode 2
27:52
Transforming Legacy Data Centre Access with Netskope Zero Trust—Securing Data Sovereignty (Ep.1)
04:01
Understanding the New Security Data Journey Level 4 Tiers—Splunk for Security Tutorials: SSE (Ep.10)
05:41
Simulating Real-Time Water Treatment Monitoring with Splunk and Confluent (Demo)
09:05
How to Track Aircraft with Splunk and Confluent (Monitoring Real-Time Data Demo)
30:20
Discussing PAM Maturity Curve — Delinea's Roadmap to Secure Access (Webinar)
02:01
Splunk Security Essentials (SSE) Short Tutorial Series — Introduction
03:31
Stages of Security Maturity in Splunk Security Essentials—Splunk for Security Tutorials: SSE (Ep.9)
44:28
Navigating Through the DORA Effect — The Somerford Podcast: Season 6, Episode 1
03:32
Understand Security Content in Splunk Security Essentials—Splunk for Security Tutorials: SSE (Ep.8)
01:52
How to Onboard Data Sources in Splunk Security Essentials—Splunk for Security Tutorials: SSE (Ep.7)
03:28
Recommendations and Reports in Splunk Security Essentials—Splunk for Security Tutorials: SSE (Ep.6)
01:51
Enabling Security Dashboards in Splunk Security Essentials—Splunk for Security Tutorials: SSE (Ep.5)
26:23
What's New with Splunk ES 8.0? — Demoing Enterprise Security 8.0 Update and Features
01:55
Varonis MDDR Explained — 24/7 Threat Detection and Response for Complete Data Security & Protection
03:17
Organising Data Sources with Splunk Security Essentials — Splunk for Security Tutorials: SSE (Ep. 4)
01:35
Monitoring Data Latency with Splunk Security Essentials — Splunk for Security Tutorials: SSE (Ep. 3)
02:48
Mapping and Managing Content in Splunk Security Essentials—Splunk for Security Tutorials: SSE (Ep.2)
04:00
Detecting Anomalies with Splunk Security Essentials — Splunk for Security Tutorials: SSE (Ep.1)
44:22
Being Data Observant: Embracing Observability and AI Resilience with Splunk — The Somerford Podcast
12:10
Splunk Log Observer Connect: Rapid Issue Detection & Resolution—Observability Cloud Explained (Ep.5)
08:23
Splunk IM: End-to-End Infrastructure Monitoring & Optimisation—Observability Cloud Explained (Ep.4)
07:32
Splunk RUM: Real User Monitoring, Identify Errors & Enhance UX—Observability Cloud Explained (Ep. 3)
09:28
Splunk APM: Microservices Monitoring, Tracing, & Error Analysis—Observability Cloud Explained (Ep.2)
07:19
Splunk Synthetic Monitoring: Real-Time App Performance Tracking—Observability Cloud Explained (Ep.1)
56:49
Splunk Security Essentials (SSE) Deep Dive | Threat Detection & Response | Splunk for Cybersecurity
05:56
Setting Up Windows DNS Monitoring in Splunk Stream — Splunk for Security Tutorials: Expansion (Ep.4)
03:39
Analysing Data & Network Traffic with Stream Dashboards — Splunk for Security: Expansion (Ep. 3)
03:15
What Are Stream Data Flows and How Do They Work? — Splunk for Security Tutorials: Expansion (Ep. 2)
03:25
Understanding Splunk Stream Architecture — Splunk for Security Tutorials: Expansion (Ep. 1)
29:42
Varonis SaaS: Threat Detection, UBA Models, AI-Powered Alerts & MDDR Service Explained | Webinar
03:52
Maximising the Common Information Model (CIM) — Splunk for Security Tutorials: Normalisation (Ep. 3)
03:35
How to Accelerate CIM Data Models — Splunk for Security Tutorials: Normalisation (Episode 2)
03:26
What are Splunk CIM Data Models? — Splunk for Security Tutorials: Normalisation (Episode 1)
22:25
Splunk Observability Cloud 101 | Beginner's Guide to Real-Time Monitoring & Observability
43:31
Generative AI and Its Role in Real-Time Data Streaming Platforms (DSPs) | Confluent Showcase
34:22
Varonis SaaS: Microsoft Copilot Security, What to Consider Before Copilot | Webinar
24:33
Splunk IT Service Intelligence 101 | Advanced Infrastructure Monitoring, Event Management & AIOps
21:42
Splunk .conf24 Key Announcements Summarised: AI Features, ES 8.0, Asset & Risk Intelligence and More
54:41
Stories of Success: Women Leadership, Diversity, and Resilience — The Somerford Podcast
01:45
Splunk Ingesting Data from a Drone - Real-time Analytics