we deliver a select range of IT security technologies and services to help organisations
Prevent Significant Data Breaches

Usually this means as a client you will have a complex IT environment, as well as 500 plus users.
Alternately, you may have external security requirements such as driven by compliance or your own customers' needs.
Industries we work in regularly include government (Federal and State), finance, business services, healthcare, telecommunication and retail.

we're currently working on parts of the site - apologies if you find a link or two missing

__CONFIG_optin__{"optin": 0,"color":"red","size":"medium","text":"Yes, Sign Me Up!","layout":"horizontal"}__CONFIG_optin__

Technologies and Services we Deliver


Strong Authentication

Enforce strong (multi-factor) user authentication to assets.
Simplify the cost and complexity of B2B, B2C and M2M authentication management.

Privileged Access Management

Tools to help attain a least privilege approach – where permissions are granted to those that need it, when they need it and only as required.

Vulnerability Management

Large-scale, cross-platform, prioritised vulnerability assessment and remediation, with configuration compliance and compliance reporting available.

SIEM

Intrusions happen, threats emerge – see them when they do and neutralize them fast. Knowing what to investigate after detection, and how to respond quickly, is imperative.

Gateway Security

Manage what does and doesn’t reach your users and applications through traffic filtering at the gateway or in the cloud. Including web, email, WAF and DDOS.

Encryption and Key Management

Advanced transparent encryption, powerful access controls, and centralized key management lets organizations encrypt everything efficiently, with minimal disruption.

Advanced Endpoint

From anti-ransomware protection to least privilege and all in between. Including outstanding defence against zero day attacks and powerful root cause analysis.

Security Consulting

Strategy development, programme reviews, risk assessments, gap analysis, red teaming and pen testing.  We use in-house and external experts to deliver great results.

Advanced Analytics

The ability to 'put it all together' and see the bigger picture is essential when dealing with stealthy attackers.  A range of technologies to complement your existing tools.

Multimedia and Reports More Your Thing?

Current Video:  PowerBroker Enterprise Password Security


​More Like This?


If you'd like to know when more of this type of content is added, simply sign up here and we'll keep you up to date.
You can expect videos, whitepapers, analyst reports - and we'll try to make it relevant.

Vendors we Partner with Include:

BeyondTrust

BeyondTrust security technologies provide the visibility to reduce risks and the control to act against internal and external data breach threats.

LogRhythm

LogRhythm’s security intelligence and analytics platform enables organizations to detect, prioritize and neutralize cyber threats that penetrate the perimeter or originate from within.

Vormetric

Regardless of content, database, or application — whether physical, virtual, or in the cloud — Vormetric Data Security enables confidence, speed, and trust by encrypting the data that builds business.

Sophos

Network and endpoint protection, centrally managed and communicating together. For stronger, simpler, security.

Imperva

Whether in the cloud or on-premises, Imperva delivers cyber security that protects all your data and applications.

SecurEnvoy

SecurEnvoy provide a solid and reliable innovative solution for two factor authentication that millions of users experience everyday that’s easy to use, manage and deploy.

Authy (Twilio)

Everybody should use two-factor authentication.  Want a better solution to Google’s Authenticator app?

Varonis

Varonis provides a data security platform that protects enterprise data from cyberattacks and insider threats.

Core Security

Core Security offer threat-aware identity, access, authentication and vulnerability management solutions to help your team control access, reduce risk, and maintain compliance.

Trusted Impact

Trusted Impact are a security consultancy focused entirely on helping you achieve your business objectives across the scope of information security.



Barracuda

We work with Barracuda across their range of content security, data protection and disaster recovery technologies.

Recent Updates:

How Even Small Security Breaches Can Cost You Big Bucks
Things you don't want to hear.  “You have been breached.”  There are many ways to find out - a systems[...]
BeyondTrust Available on Azure
Flexibility. You can’t overstate the importance of flexibility in both delivering solutions to complex IT problems.  That’s what the cloud[...]
Steps to Protect Against Healthcare Security Breaches
(by Imprivata) At HIMSS16 Imprivata hosted a healthcare security discussion around “Protecting health information: thinking beyond cybersecurity.” The panel of[...]

Contact:

Fill out my online form.