Skip links

Our Services

A well proven cybersecurity framework (NIST)

Our services are articulated around a number of stages defined by a well-proven Cybersecurity Framework (NIST).  These include the following:

Identify

Our experts can help you identify the risks surrounding your technical platforms, processes and internal and external resources to ensure your organization has awareness of its vulnerabilities. This is a fundamental step in preparing yourself for the occurrence of a black swan, your organisation tolerance for risk will then dictate how to respond.

Protect

Our cybersecurity engineers can design and implement robust solutions to address the risks around unauthorized access and potential data leaks. We can assist you in maintaining this edge on an ongoing basis via scheduled maintenance and upgrades to these technical solutions. Equally importantly, we can help you establish a culture of security via training, awareness, and education of your staff to ensure that you have the required processes and procedures to minimise the potential attack surface.

Detect

We can provide services and solutions to continuously monitor and track the smallest signs of intrusion and take actions if it happens, including coordination of the required investigative actions and stakeholder communication about what has happened.

Respond

Black swans exist. Irrespective of being able to identify risks, and whether you are protected, you need a response plan to resume business and minimise business impact in the event that an incident happens. The key is in preparation and planning. Via our Respond process we will work with you to develop response planning and mitigation procedures based on various scenarios, and to implement improvement actions as required.

Recover

Our teams are trained to offer an effective and rapid response in case of incident. We would help you recover from that situation and assist you in executing a communication plan both internally and externally to allow you to coordinate your business response to all stakeholders. In addition our teams would collect any forensic evidence required to support any legal action. Our teams would also help you implement an improvement plan and lessons learned to ensure that your systems and processes become more resilient.

Our service levels include:

Scan

Secure

Sustain

Starting from £5,000

Starting from £7,500

Starting from £7,500 pa

Identify

Risk Assessment

Ethical hack of your systems

Risk Management Strategy

Protect

Remediation Plan

Protective Technology

Access Control

Data Security

Protection Processes and Procedures

Awareness and Training

Detect

Security Continuous Monitoring

Detection Processes

Respond

Response Planning

Forensic Analysis

Mitigation

Improvements

Communications

Recover

Recovery Planning & Execution

Improvements

Communications

Our services can either be offered in isolation or as part of your organization’s efforts to obtain a formal security certification.
The “Audit” and “PEN test” assist as a fulfilment of many of the ISO 27001 controls that are used on an ongoing basis. We can identify gaps in your processes and vulnerabilities in your systems and technologies.
Specifically, the PEN test can be used as part of ISO27001 Annex .12.6.1