Many businesses have similar cyber security gaps and requirements. We provide a common set of high-quality services that ensure your business is following best practice and has access to expertise when it is really needed. Select the option that suits your needs and budget.
If you operate in an industry with specialist requirements, such as financial services, insurance, legal or healthcare, we have you covered. We can customise our packages and solutions for your specific needs.
We offer a full suite of cyber security services that can be added to your package, as a one-off or an ongoing solution. We’ll put something together that works for you.
Security solutions and devices are only useful if someone is actively watching and responding to the information they can provide. We provide the eyes-on plus the knowledge on how to respond.
Security Operations Centre, providing full-time monitoring, alerting and response services for security and privacy related events.
Security Incident and Event Management as a service. Whether or not we provide your managed firewall, web, email and cloud security solutions, our SOC can monitor your key security systems for events and incidents, and provide expert analysis and response.
Comprehensive periodic or one-off reports designed for business decision-makers, highlighting key risks, risk assessments, security performance, and actions for improvement.
We provide training for your staff, including management, execs and the board, and even IT staff, on how to be as safe as possible with your business. Training can be provided via on-site sessions or online – whatever works best for you.
POLICIES & PROCEDURES
We assess your existing security, privacy and acceptable use policies, if you have them, and bring them up to a level that is comprehensive, pragmatic and workable. These are policies that all staff should be aware of – and ours are policies you will be pleased to share and enforce.
PHISH TRAINING & TESTING
We can both train and test your staff on safe use of email – how to recognise a phishing email, what not to do if you suspect one, or fall for one, and how to safely share information via email. We can also perform random or periodic testing of your staff to help reinforce and measure compliance. Phish training complements email policy control services and is a key aspect of keeping your business safe.
Ask us anything relating to security and privacy. Security is what we do and we love to talk about it! We offer a dedicated escalation path for both easy and hard security and privacy questions, for your users, management and governance team, as well as your IT experts.
Compare notes on the security aspects of your technology, policy and business decisions. We are experts in secure network and applications designs, as well as being experienced in the business and financial impact of technology and security decisions.
Have one of our experts join your management or governance team. They will be a specialist on both security and your business and talk with broad market knowledge about your business’s security posture, performance and key decisions.
Our Cyber Security Incident Response Team is trained and prepared to help your business take the right steps rapidly and effectively in the event of a security or privacy incident.
Do you know who can help you in the event of a cyber insurance claim? First you want to avoid a claim, then you want to be sure you are covered. But then you need to be rapid and effective with your response. We specialise in cyber insurance policies, claims and response.
One of the key steps in response to a security incident is to contain and mitigate the effects, both technically and in terms of stakeholder communication. We work with your teams to limit and neutralise the threat quickly and effectively.
We assist with the steps involved in restoring systems and services to their normal state, including use of baseline images plus close monitoring to ensure that the threat has been permanently neutralised.
Incident response requires analysis and understanding of the root cause and normally requires new controls to prevent recurrence of the breach. We help your teams to agree the most effective measures and to implement those quickly and cost-effectively.
Effective incident response requires forethought and prior planning. Meaningful internal reporting requires that monitoring, metrics and baseline reporting are already in place before the incident. We help with preparation as well as intra-event and post-event reporting both internally and to external agencies and authorities.
There are many different risks associated with email and numerous approaches to addressing them. We are vendor-neutral experts on how best to protect your business communications. As well as email protection solutions we also offer important staff training around safe email and instant message communications, including reinforcement via phish testing and reporting.
WEB POLICY CONTROL
Applying policy control and knowing what your company is doing with your internet, without obstructing the business. We understand the trade-offs and alternatives and provide advice plus product-neutral designs and solutions.
As your business moves into the cloud, we provide the expertise and experience on how to migrate safely and stay secure in the cloud. We help ensure that your security policy and practices extend seemlessly to your cloud services, and that convenience and economics complement safety rather than eroding it.
How secure is information you share with customers, partners and third parties? We are experts in keeping valuable information private without getting in the way of the business.
MANAGED FIREWALL, WAN
We can provide leading firewall/UTM solutions as a fully managed service, including secure and dynamic branch office and remote connectivity. We are partners with numerous key product vendors and select the brand and model that best fits your business requirements, provided as a simple managed service.