Claranet | Videos

The latest videos from Claranet.

  • Video | Why you need a Microsoft 365 Security Health Check1:55

    Video | Why you need a Microsoft 365 Security Health Check

    Is your business secure in Microsoft 365? Get involved in our Microsoft 365 Security Health Check to make sure you are configured to industry best practice.

    Watch Video
  • Microsoft Sentinel: what, why, and how it works with your business1:07:01

    Microsoft Sentinel: what, why, and how it works with your business

    With an estimated 85%* of organisations expected to embrace a cloud-first principle by 2025, and with new cloud-based vulnerabilities being discovered constantly, securing your cloud environment is no

    Watch Video
  • Exploitation at speed: beating bad actors to find vulnerabilities in your systems58:10

    Exploitation at speed: beating bad actors to find vulnerabilities in your systems

    New vulnerabilities are being found constantly. A 12-month penetration test will find these once a year, but it is possible to identify and fix these bugs immediately with continuous monitoring.

    Watch Video
  • Go there now
  • Endpoint Detection and Response4:41

    Endpoint Detection and Response

    Endpoint Detection and Response helps you protect what matters by fortifying every edge of your network with real-time autonomous protection.

    Watch Video
  • DevSecOps: What, Why and How58:34

    DevSecOps: What, Why and How

    This webinar discusses how to address security issues by automating security in a DevOps environment to obtain a better level of assurance.

    Watch Video
  • Why Train With Claranet Cyber Security1:57

    Why Train With Claranet Cyber Security

    Thinking about coming on a course? Here we will explain exactly what is involved, why it might be of value to you, how it works in practice, what you need and most importantly, what you get out of it.

    Watch Video
  • Through an Attackers Eyes: Your Infrastructure1:06:24

    Through an Attackers Eyes: Your Infrastructure

    Join Anthony from NotSoSecure, on our Advanced Infrastructure Hacking webinar. With diverse modern infrastructure making waves, our organizational footprint is everywhere, from private internal netw

    Watch Video
  • Through an Attackers Eyes  Your Web Applications1:10:44

    Through an Attackers Eyes Your Web Applications

    This webinar covers current hacking techniques used to compromise web applications, API's and associated end-points, as well as Advanced vulnerability identification and exploitation techniques.

    Watch Video
  • Webinar | Beating bad actors to find vulnerabilities in your systems1:00:50

    Webinar | Beating bad actors to find vulnerabilities in your systems

    Rob Jepson, Research and Innovation Lead at Claranet, unveils our brand new webinar surrounding finding vulnerabilities in your systems.

    Watch Video
  • Key threats to sensitive data in the cloud58:37

    Key threats to sensitive data in the cloud

    Anthony explores cloud storage specific security considerations, examining real-world examples of how common misconfigurations can lead to vulnerabilities being exploited by unethical hackers.

    Watch Video
  • From point in time to continuous testing: how application security is changing1:42

    From point in time to continuous testing: how application security is changing

    In the past, cybersecurity threats were slow to emerge and relatively easy to contain. But then the world changed. Business applications multiplied and the pace of development increased. In today’s w

    Watch Video
  • Continuous Security Testing: how to move fast and stay secure2:21

    Continuous Security Testing: how to move fast and stay secure

    Continuous Security Testing is a new approach that enables penetration testing at scale and at much greater frequency. Thinking continuously provides a cost-effective approach to advanced testing and

    Watch Video
  • Demystifying EDR0:00

    Demystifying EDR

    Join Paul Jack from Sec-1, part of Claranet Cyber Security, to discover how the Endpoint protection market has evolved and which key product capabilities you can implement to protect on-prem/cloud/con

    Watch Video
  • Webinar | Web application security review51:05

    Webinar | Web application security review

    Watch Video
  • Through an Attacker's Eyes  Your Web Applications1:03:16

    Through an Attacker's Eyes Your Web Applications

    Watch Video
  • Application Security for Developers  Learning Defence by Offense56:02

    Application Security for Developers Learning Defence by Offense

    Watch Video
  • DevSecOps  What, Why, and How1:02:33

    DevSecOps What, Why, and How

    Watch Video
  • Cloud: Stealing the Silver Lining1:01:38

    Cloud: Stealing the Silver Lining

    Watch Video
  • Smishing: A New Take on a Classic Trick24:21

    Smishing: A New Take on a Classic Trick

    Watch Video
  • Cloud Storage1:00:56

    Cloud Storage

    Presenter: Scott Issac, Black Hat Trainer, and accredited Pen Tester. In the session, Scott will explore cloud storage specific security considerations.

    Watch Video
  • loading
    Loading More...