Security Operations
Threat Assessment
Our Threat Assessment includes the profiling of your organisation, development of a cyber security threat profile, and identification of real world threats with Tactics, Techniques and Procedures aligned to the Mitre Att&ck framework.
Security Operations Centre
Our SOC analysts perform round-the-clock monitoring of an organization's network and investigate any potential security incidents. If a cyberattack is detected, the SOC analysts are responsible for taking any steps necessary to remediate it.
Security Monitoring
Security monitoring is the practice of capturing information at different layers of the service (infrastructure, application, operations) to gain awareness of suspicious activities.
Incident Response
Incidents occur from cyber attacks such as denial of service, malware, ransomware or phishing attacks. Cyber Incident Response (CIR) gives organisations direct support when they become victims of cyber attack.
Disaster Recovery
We help ensure the continuity of business functions in the event of system or service failure, or the loss of an entire data centre. Mitigation activities are also designed to contain or limit the impact of any compromise.
Attack Simulation
Simulate the main cyber threats, in a safe environment, as many times as you want. The service includes everything you need for setting up, planning, delivery, and post-exercise activity, all in one place.
Network Security
Next Gen Firewalls
Next Gen Firewalls are security appliances that process network traffic and block potentially dangerous traffic. They have capabilities such as deep packet inspection, application awareness, intrusion prevention, and threat intelligence.
Browse Down
In a ‘browse-down’ model, riskier IT activities (i.e. web browsing) are performed in a separate security zone, maintaining the integrity of the trusted environment used to administer your business systems.
Zero Trust
Zero Trust is a security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network perimeter.
End User Computing Security
Endpoint Protection
Endpoint protection, or endpoint security, is the cybersecurity approach to defending endpoints — such as desktops, laptops, and mobile devices, from malicious activity.
Mobile Device Management
Mobile Device Management (MDM) is the administration of mobile devices, such as smartphones and tablet computers, using cloud-based admin consoles to set security policies and add/remove software.
Cloud PC
A Cloud PC is a virtual computer hosted in our data centre. It runs an operating system and applications in the same way as a traditional PC. It's useful for preventing data leakage, resolving application compatibility issues, and specialist tasks that require lots of computing power.
Remote Browser
Using a Remote Browser you can seperate your web browsing from your PC/laptop to minimise risks associated with cyber-threats and privacy-invading cookies. Accept cookies from every web site you visit, knowing they won’t persist when your Remote Browser is terminated!
Multi-Factor Authentication
Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism.
Password Management
Password Management is essential when following the guidelines provided by security experts. Passwords must be strong (long and random - using four random words if you must commit them to memory), and they should also be unique for every account you use.
DKIM, DMARC & SPF
SPF, DKIM, and DMARC help authenticate emails you send by verifying your originating domain. Without these three authentication methods your email may get marked as spam, or as a phishing attempt, and get quarantined on the recipients system.