Claranet | Cybersecurity
The expertise you need to keep your business safe and secure.
Webinar | Demystifying EDR
Join Paul Jack from Sec-1, part of Claranet Cyber Security, to discover how the Endpoint protection market has evolved and which key product capabilities you can implement to protect on-prem/cloud/con
- Watch now
Blog | 10 Reasons why every business needs SentinelOne security
Why should your business adopt SentinelOne security? Here are ten reasons why the XDR platform is a no-brainer.
Blog | SentinelOne Review
SentinelOne is a 2021 Gartner Magic Quadrant for Endpoint Protection Platforms Leader.
- Go there now
Blog | A new attack on cloud: economic denial on sustainability
While security in the Cloud becomes ever more bulletproof, it will always be a game of cat and mouse with the hackers out there.
Blog | SentinelOne vs. Crowdstrike
SentinelOne, in our view, offers higher levels of protection across a broader range of platforms than CrowdStrike.
Blog | What is SentinelOne?
SentinelOne's Singularity Platform is a unified, AI-powered XDR platform that uses data to analyse security threats, manage vulnerabilities, protect endpoints, and support IT operations.
Blog | How to identify and stop a compromised AWS account
Don't let the hackers win. Here's how you can identify and stop an unauthorised user on your AWS account.
Whitepaper | Hunting postMessage Vulnerabilities
Claranet partnered with AppCheck.com to undertake a research project investigating the security challenges posed by next generation web applications. The project included an investigation of...
Whitepaper | Defense Against Client-Side Attacks
In this Whitepaper, we discuss Client-Side attacks and defenses of those attacks.
Blog | 5 AWS S3 security best practices you should adopt today
If you're using AWS S3, you'll want to adopt these five security best practices today.
- View webinar
Blog | 3 reasons why your business needs AWS managed services
Over the past 18 months, for all-too-familiar reasons, cloud adoption increased dramatically. The trend looks to continue throughout 2021.
Blog | 3 IT security threat detection best practices to protect your business
When it comes to the IT security of your AWS environment, prevention is better than any cure.
Blog | Top five vulnerabilities and how to avoid them
Although no two networks or domains are the same, there are a number of common security weaknesses that penetration testers will almost certainly encounter on every internal security assessment.
Webinar | Web application security review
Level 1 MSSP Competency Program Overview - Amazon Web Services
Webinar | Through an Attacker's Eyes Your Web Applications
Blog | A day in the life of a SOC Analyst
More than ever, organisations are looking to establish a Security Operations Centre (SOC) to protect their applications infrastructure.
Webinar | Application Security for Developers Learning Defence by Offense
Webinar | DevSecOps What, Why, and How
Webinar | Cloud Storage
Presenter: Scott Issac, Black Hat Trainer, and accredited Pen Tester. In the session, Scott will explore cloud storage specific security considerations.