Capabilities
-
Information Risk Assessment and Management (Risk, Governance, Assurance, ISO27001, Vulnerability, Cyber Essentials)
Products or services that support in managing cyber risks, for example, around security compliance and data leakage.
- Identification, Authentication and Access Control (Identity, Authentication, PKI, User access, encryption)
Products or services that control user access, for example, with passwords, biometrics or multi-factor authenticators.
- Network Security, incl. perimeter and application (Firewall, Appliance, Perimeter, Network security)
Hardware and software designated to protect the usability and integrity of a network.
- Endpoint and mobile security (Anti-virus, Malware, Protection, Root of Trust, Patch, Update, mobile solutions)
Hardware and software solutions that protect devices when accessing networks.
- Threat Intelligence, Monitoring, Detection and Analysis (Analytics, event, intrusion, SOC, Anomaly, Intelligence, Attack)
Monitoring and detection systems of varying forms of threats to networks and systems.
- Incident Response and Management (Incident, Mitigation, Forensics, SIEM)
Consultants to that help organisations to reacht, respond or recover from cyber-attacks.
- SCADA and ICS (Cyber Physical, industrial cyber)
Cyber security solutions specially designed for industrial control systems, critical national infrastructure and operational technologies.
- Awareness, Training and Education (Certification, skills development, SANS, CREST, CISP)
Products and services in relation to cyber awareness, training and education.
- Cyber Professional Services (Consulting, Penetration Testing)
Contractors and consultants to advise on, or implement, cyber security products, solutions or services.
- IoT (Devices, automotive, connected home)
Products and services to embed or retrofit security for Internet of Things devices and networks.
|