Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Three Steps to Monitor Cloud Services Usage

Are you using cloud services and don’t know why they are slow or how much data is transferred? The answers are in Flowmon.

Read More

QRadar Technical Blog: Connect QRadar to a phone using SMS messaging

Using a script from the Custom Action selection, QRadar may now communicate with a mobile phone using SMS messaging. The console must have direct Internet access for this feature to function properly.

Read More

CyberKombat University Partnership

Satisnet’s CyberKombat SOC Training platform has recently partnered with 2 cybersecurity universities in the UK!

Read More

Fake News

Another few weeks has passed without my words gracing your screens and alas, the time has come once again for me to pick up my methaphorical pen.

Read More

SecurityCenter Dashboards

Dashboards are one of the most common tools that are found in nearly every security tool that is available on the market today. However I often still find customers that are completely underutilising these valuable dashboards, and if utilised correctly can provide important metrics in a quick and easy to view manner.

Read More

SIEMONSTER OVERVIEW

If you are not too clued up on what a SIEM is and how it works have a read below. SIEM’s are becoming very popular with a lot of big companies adopting the solution to manage their IT security.

Read More

DDoS Attack Explained

DDoS implies Circulated Refusal of Administration and it happens when an assailant overpowers an objective, that is for the most part a server, with a heap of activity that the objective can't oversee. DDoS is an uncommon sort of DoS, Distributed denial of service, and it is critical to see the contrast between them.

Read More

What's New in Splunk 7.0

Way back in the end of September, Splunk quietly did a major version bump of their core product, Splunk Enterprise to version 7.0. Several new features come built into this new version to enable enhanced searching and reporting in many ways, so while the overall feel of Splunk remains much the same as 6.x the underlying power has been greatly improved. In this article we will cover some of the new features and how to use them successfully in your environment.

Read More

Tenable Allows Least Privilege SSH Scans

Credentialed scans have long been encouraged as the quickest and most accurate way to perform a vulnerability assessment against any network. However, customer always run into problems which are related to users or process which need to be followed.

Read More

Tips to Secure Your Network and Reduce The Chance of Being Hit By KRACK

A vulnerability has recently been discovered named KRACK. It targets the link between your device and the Wi-Fi access point, i.e. a router either in your home or office. The following tips can help to improve the security of your connection.

Read More

Pages