This article showcases our top picks for the best United Kingdom based Network Security companies. These startups and companies are taking a variety of approaches to innovating the Network Security industry, but are all exceptional companies well worth a follow.
We tried to pick companies across the size spectrum from cutting edge startups to established brands.
We selected these startups and companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Top United Kingdom Network Security Companies
Most security teams still can’t confidently address or predict people-related cyber risk. The CybSafe behavioural security platform delivers instant, personalised support for users.
It also tracks and measures security behaviour to improve security controls, awareness activities and understand risk. CybSafe is designed to educate, support and assist users whenever and wherever they need it.
It improves security culture in a way that can be measured and gives unparalleled risk insights in a way that allows our customers to pre-empt security problems. The platform is for organisations who believe that eventually they’ll want to do more than rely just on security awareness e-learning and phishing simulations.
It’s a platform that can support them whatever their stage of maturity, and grow with them through to when they are ready to measure behaviour change.. .
G4S is the world’s leading international security solutions group. They specialise in outsourced business processes in sectors where security and safety risks are considered a strategic threat.
G4S has a truly global business with large established market positions in developed markets and outstanding positions in fast growing emerging markets G4S has a unique global footprint with operations in over 110 countries, including a strong presence in higher growth developing markets. G4S employ 623,000 people world-wide, and are the largest security solutions provider in the world.
Whether you require a security solution in one location or across multiple continents, their global experience is always on hand to bring you advantages.. .
Callsign has built a secure mobile multi-factor authentication and authorisation engine, through the introduction of patented machine-learning biometric, behavioural, geo-location and identity analysis, combined with traditional methods. Designed for the Financial Services and IOT markets, Callsign’s crypto-engine provides unparalleled security across the enterprise, retail and consumer sectors to enable secure access, and to combat real-time phishing, Man-in-the-Middle and malware threats.
Their pre-defined API connectors simplify integration into existing directory and fraud solutions, enabling highly configurable, seamless and secure access that replaces costly and unpopular device-based solutions.. .
Cado Security builds a software platform for responding to cyber-security incidents and performing digital forensics. It builds a platform to push digital forensics forward into the cloud era.
They help organizations big or small tackle cyber threats and make informed decisions, bringing clarity through times of uncertainty. Cado Security was founded in 2020 is headquartered in London, England..
Garrison Technology Limited develops technologies for enterprise cybersecurity needs. The company was incorporated in 2014 and is based in London, United Kingdom.
It aims to serve the growing enterprise market with its anti-malware product. It wants to address the large and growing enterprise cyber security market.
The company has pioneered in an anti-malware product that efficiently sidesteps the highest impact cyber threats to modern organizations, i.e. internet-borne targeted attacks.
Due to Garrison’s unique technology, a previously inconceivable brand of ultra-secure internet connectivity, user experience, and enterprise scalability can be achieved.. .
Risk Ledger is the world’s most innovative vendor risk management solution, securing the global third-party ecosystem. The Risk Ledger platform combines a secure social network with a risk management platform to enable organisations to run a gold standard risk assurance programme against their vendors while making it painless for vendors of all sizes to respond to risk assurance assessments through a ‘do once, use many’ assessment model.
Risk Ledger won the National Cyber Security Centre’s 2019 CyberDen competition and the 2019 TechUK Cyber Innovation Den competition. Organisations running a risk assurance programme using Risk Ledger benefit from scaling their programme up to a higher proportion of their vendors due to low per-supplier costs, simple, efficient work flows, a standardised assessment framework, high quality continuous vendor monitoring and insight beyond third-parties to fourth, fifth and sixth parties.
Suppliers benefit from free access to the platform where they can complete one comprehensive assessment for each risk domain and share that assessment with any client who runs risk assurance against them – saving a significant amount of time and effort by doing away with spreadsheet and word based questionnaires.. .
Nu Quantum is a telecommunications company that develops end-to-end quantum cryptography systems. It secures communications within and between cities through urban and satellite free-space optical links.
The system helps with the realization of commercial deliverable photonic technologies by combining novel materials and semiconductor technology. This enables clients to secure the exchange of cryptographic keys for the ultra-sensitive detection of light.
Yuri Andersson, Mete Atatüre, and Carmen Berraquero founded Nu Quantum in Cambridge, Cambridgeshire in 2018.. .
CyberOwl develops an innovative early warning system for attacks through real-time monitoring of high-value targets for malicious behavior. The technology, based on research shortlisted for the Lloyd’s Science of Risk Prize 2015, is aimed at addressing the challenges of increasingly anonymous and persistent threats to rapidly-expanding global networks, particularly in the wake of Smart Cities and the Internet of Things.
The system raises early warning on network assets for possible undesirable activity, by applying a Bayesian-based framework to systematically analyze indicators associated with early stages of such activity. This approach dramatically reduces the processing overheads of monitoring.
The benefits to the security operation include scalability to networks exceeding 1 billion devices, providing earlier visibility of risk and improving prioritization and decision-making in deploying countermeasures. CyberOwl is developing its minimum viable product and is looking for two or three strategic industry design partners for validation, verification, and further development.
The ideal design partner would provide access to real-world security problems in a large network, high-volume data environment. CyberOwl was founded on 2016 and is headquartered in London, England..
Skurio is a cybersecurity company that gives every organization the ability to reveal their spectrum of digital risk. The company’s solutions safely reveal the threats to the data that exist outside the network and illuminate digital risk to take action to mitigate it.
Its digital risk protection platform helps to manage brands using keywords to monitor posts on the company, brands, and products. It also detects data breaches and notifies if the data appears on the dark web.
Skurio was founded in 2011 and is headquartered in Belfast, United Kingdom.. .
SOC.OS is an alert correlation and triage automation tool. SOC.OS is a spin-out of BAE Systems Applied Intelligence.
SOC.OS enriches, correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond to cyber incidents.. .
BitNinja is an easy-to use server security tool, which can be installed on your server within a couple of minutes and requires virtually no maintenance. It is a mixture of an on-premise and cloudbased solution.
It is an agent which sits on your infrastructure and sends the attack information to the central server which is in the cloud. We have a new technology called defence network, which means that every BitNinja protected server learns from each attack and shares the learned information with the central server and with all the other BitNinja enabled servers, so the shield just gets stronger and stronger with every single attack..
Zeetta Networks spun out of the renowned High-Performance Networks Group of Bristol University in 2015 to commercialise the group’s leading Network Virtualisation & Slicing technology. Our patent-protected software technology, NetOS®, enables network operators to virtualise their networks, and then automate operations and expose the network’s capabilities in a way that cannot be done today by any of Zeetta’s competitors.
We have strong market traction and engaged with world leading players, including Deutsche Telecom, Orange, BT, Colt, Facebook, and Vodafone, amongst others. Moreover, NetOS® includes a powerful Virtualization Engine which uniquely operates across different types of networks.
This enables the development of “network slices” i.e. logical and isolated sub-networks which can be used like real physical networks for the development of applications.
Network Virtualization enables the most efficient use of the network resources because they can be shared among many users with guaranteed Quality of Service (QoS) for each service and user.. .
MWR InfoSecurity is an international company that provides information security, compliance, and management services and solutions. The company also offers training on proactive web defense, secure C++, proactive mobile defense, and more.
MWR InfoSecurity was founded in 2002 and is based in Basingstoke, England.. .
SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated platform, it drives security visibility, so decisions can be better prioritised and response time is dramatically reduced.
With SIRP, the entire cybersecurity function works as a single, cohesive unit. SIRP combines security orchestration, playbook automation and case management capabilities to integrate your team, processes and tools together.
SIRP makes security data instantly actionable, provides valuable intelligence and context, and enables adaptive response to complex cyber threats and vulnerabilities. SIRP enables organisations to optimise processes for threat response and vulnerability management for improved organisational efficiency.
SIRP Security Score (S3) calculates an organisation’s security score based on a number of internal and external factors. This enables organisations to more effectively prioritise risks, make informed decisions faster and respond more quickly to incidents..
MaidSafe provides developers with a distributed platform that enables them to engineer fast and very secure applications. We work with the Open Source community to constantly improve our software and to promote its free distribution and use.
MaidSafe also makes user friendly consumer products that help ensure their privacy, security and freedom while simplifying their digital lifestyle.. .
Capslock is a revolutionary new school where adults can kick-start their new career in cyber security, in just 4 months. Instead of paying tuition up-front, Capslock learners pay tuition in monthly instalments once they land a high paying job.
Learn via live, instructor-led tuition and get workplace-ready with a curriculum built around real-life problems and hands-on skill development. In 2021, Capslock will be re-skilling 200 adults in cyber security, helping to bridge the UK’s urgent skills gap..
The Q-Branch Labs Vektor is a cyber-security and VPN management device for remote and work from home employees. The Vektor extends the enterprise security perimeter into the home network, segregating corporate assets from untrusted home networks, providing protection with AI-powered threat intel, and makes VPN transparent for employees.
Prevent your company from being hacked through insecure employee home networks with the Vektor!. .
Convo is a mobile application that delivers free chat/messaging and calling functionality to its users as well as content from leading publishers. Convo works just as well on 2G networks as it does on the latest 4G or WiFi networks.
Giving the ability for all to consume, even if they are in a low/poor connectivity areas whilst also consuming far less data so you can make the most of your phone’s data package.. .
drie Secure Systems
drie allows teams to rapidly develop and deploy applications to the cloud without compromising on security. Security conscious organisations currently find it difficult to take full advantage of cloud based services as these services do not meet the standards required for holding and transacting with sensitive data.
At drie we fix this by putting security at the core of our product, using encryption and isolation technologies to ensure that your data is safe when you use the cloud.. .
Crugo is an out of the box, communication platform that increases your business’s productivity by streamlining communications and organising your team more efficiently. Communicate in an instant with our direct and group chat.
Make planning projects or schedules a breeze with the help of shared tasks and calendars. Share, search and store any file type on your own private network and stay connected wherever you are through our mobile and desktop apps.
With Crugo there is no need for development or third party integrations. Instead Crugo aims to make your working life easier by offering you all the business communication and planning essentials within one simple platform..
NCC Group provides information assurance solutions to organizations worldwide. The company operates through three segments: group escrow, assurance testing, and domain services.
It offers software escrow and verification services such as software escrow, registry data escrow, software-as-a-service assured, and software verification as well as single and multi licensee escrow agreements; and security testing, audit, and compliance services comprising technical security assessment and penetration testing, information security software, forensic and cyber incident response, and managed security services as well as audit, compliance, and governance services. NCC Group also provides software testing services; website performance optimization and monitoring, and website load testing services; and trust domain and domain abuse monitoring services.
NCC Group was founded in 1999 and is headquartered in Manchester, United Kingdom.. .
MVNO in starting in the UK and rapidly expanding to Brazil, Spain, Italy and Germany. Focused on Value Added Services instead of the common calling card ethnic concentration, Acqua brings value to customer’s mobile service embracing the mobile applications environment and bringing social networking to a new level of integration with the user.
Acqua is launching in the UK in January 2014 and in Brazil in August 2014. Acqua is looking for Angel investors interested in been part of very successful team of telecom professionals ready to launch a major telecom operator with a global vision..
Acunetix is the market leader in automated web application security testing, and is the tool of choice for many Fortune 500 customers. Acunetix detects and reports on a wide array of web application vulnerabilities.
Acunetix also includes integrated vulnerability management features to extend the enterprise’s ability to comprehensively manage, prioritise and control vulnerability threats – ordered by business criticality. Acunetix is a privately held company with its offices in Malta and the UK.
It is a Microsoft Certified Partner. It also has a sister company 3CX, a developer of IP PBX software for Windows..
Established in 1999, Secon Cyber has a long-standing experience of providing cyber security solutions to customers ranging from small to large enterprises. Secon Cyber’s expertise lies in its deep understanding of the cyber security market and unique position in bringing some of the best of breed products and services to provide a fit for purpose and value for money security solution.
This is evidenced by the company’s high customer retention rate.. .
AppsPicket is a start-up in the Strong Authentication (2FA) and Cloud Security space founded by ex-IITians and ex-Microsoft folks. We have developed an innovative Two Factor Authentication (2FA) technology (patent pending) that permits users to be authenticated without the hassles of OTPs/hardware tokens or additional Authenticator apps.
This technology removes a big pain point associated with strong user authentication in both consumer (Banking & Payments) and enterprise space (Single Sign-On & Strong Authentication to Cloud Apps). .
Traffic Observation via Management
UK cyber security start up spun out of Queens University Belfast. SpriteGuard has been built to protect users of public open access Wi-Fi hotspots and the whole of the Wi-Fi infrastructure both internally and externally.
It is completely independent of existing access points and totally agnostic to devices. With cyber security and Wi-Fi so prevalent in the news today from data loss to prisoners stealing access to neighbouring Wi-Fi access points and children being exposed to inappropriate content whilst at school, after three years of development SpriteGuard brings a unique and disruptive solution to the space.
Development of the product is now just about complete with launch date q4 2017 and as a start up we are, no hiding this, trying to make as much noise as possible. We have global interest in deploying the product and are keen to make sure both the UK and other government policy is seen to reflect the ever growing threat posed by Wi-Fi hacking to both the public and business.
We would like to be an ally of government policy, given the past three years of our development cycle, to help aid Governments in meeting both their policy and social obligations if possible, lofty ambitions but well placed nevertheless. We are seeking a follow on round having been seed funded by Mercia to the value of £350K.
Our market research and contacts within the cyber security space lead us to believe that this unique offering dedicated to protecting the built environment both inside and out has global reach and enormous ability to scale. If you would like to meet and discuss, be given a face to face demonstration of the power of SpriteGuard then please email your thoughts to [email protected]
For more information please www.spriteguard.com. .
Netacea takes a smarter approach to bot management. Intent Analytics™ powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs from automated threats while prioritising genuine users.
Actionable intelligence with data-rich visualisations empowers you to make informed decisions about your traffic. The Netacea approach offers incredible speed, accuracy and transparency, solving the growing problem of credential stuffing and account takeover at scale.
The technology is designed to complement existing controls such as WAF rulesets, rate limiting and threat databases to provide a deep analysis of all website visitors, actionable intelligence and real-time threat. The Netacea approach continuously monitors your web traffic to pinpoint the difference in automated bot activity vs genuine visitors, keeping you ahead of evolving bot threats.
Choose to automatically block, redirect or challenge automated attacks in real-time, or receive alerts notifying you of potential threats. With access to rich dashboards and data, you can easily identify and stop account takeover attempts early in the attack chain.
Learn more at www.netacea.com. .
Teneno is a leading provider of simple, secure and affordable networking-on-demand solutions for Small and Medium Sized Businesses (SMBs). The service is cloud-based, providing an inherently more robust approach to network security when compared to traditional models.
With Teneno, network access can also easily be provided to personal devices, making it straightforward to implement a BYOD (Bring Your Own Device) strategy. The new Software Defined Network (SDN) model used by Teneno is an open platform developed at Stanford University: it extracts network software functionality from expensive hardware components and hosts them in the cloud.
This drastically reduces costs by using industry standard hardware devices rather than proprietary boxes; and because these costs – inexpensive to begin with – are shared across multiple users. Teneno’s subscription-based business model therefore delivers core network functionality at a fraction of the cost of traditional providers..
Device Authority provides simple, innovative solutions to address the challenges of securing the Internet of Things (IoT). We help our customers simplify the process of establishing a robust, end-to-end security architecture within the IoT and deliver efficiencies at scale through security automation.
IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions.
The Device Authority IoT security platform is purpose-built to address these challenges through automated device provisioning, credential management, secure updates and policy-driven data encryption. The IoT promises countless efficiencies, increased competitiveness, improved customer service and even brand new market opportunities.
However, deploying strong security is hard and always has been. Deploying strong IoT security is even harder.
According to Gartner, by 2020, around 25% of all identified security breaches will involve IoT. To address this, Device Authority introduces a new paradigm of IoT Security Automation that accelerates and simplifies the deployment of strong IoT security.
Advanced, policy driven security automation is critical for industrial, healthcare, transportation and other large scale security sensitive IoT environments. Our patented dynamic key technology provides the essential device-based trust anchor for IoT devices, enabling policy-driven provisioning, access control and data protection for mission-critical IoT applications and services.
Pen Test Partners
Pen Test Partners LLP is a limited liability partnership for one very good reason; being in a partnership means that our people are heavily invested the company. It’s that employee ownership which inspires and drives quality in what They do.
It means that They can meet and exceed the needs of people like you who may feel underserved by their pen testing providers.. .
Context Information Security
Context is independently operated with FTSE250 backing. An exceptional level of technical expertise informs all our work and our strong track record is based above all on the technical skills, professionalism, independence and integrity of our consultants.
Many of the world’s most successful organisations turn to us for advice, technical assurance, incident response and investigation services, because they believe Context sets the standards that others within the industry strive to follow. Context helped to establish CREST, we helped to shape the development of the Bank of England’s CBEST scheme and was one of the first companies to be certified as an approved supplier of the UK Government’s Cyber Incident Response (CIR) Scheme..
Conjunct, Ltd. designs, develops, and produces technology for high-speed optical communications.
It offers Dynamic Serial Optical Interconnect (DSOI), an optical transceiver that enables integration of optics into FPGA based systems. The companyâ€™s DSOI product is used in cable extension, encoding and extension, blade servers, multi protocol switches, digital cinema, interface cards, sensors or transducers, and interface cards applications.
Conjunct, Ltd. also provides transceiver design and consultancy services.
Its products and services provide benefits to connections in storage area networks, local area networks, and network attached storage. The company was incorporated in 2004 and is based in Livingston, the United Kingdom..
Swivel Secure is a pioneering network security solutions provider. Its adaptive authentication platform, underpinned by PINsafe, the company’s patented one-time-code extraction technology, is recognized as a leading standard in authentication technology.
Swivel’s range of risk based authentication tools helps enterprises manage the increasing data security risk posed by cloud services and bring your own device policies. The Swivel authentication platform, first launched in 2000, is now used by major blue chip companies as well as SME and public sector organizations.
Customers vary from Health Care and Public Sector to multi-national logistics organizations, pharmaceutical companies, high street retailers, financial institutions and one of the world’s largest IT hardware components manufacturers. Swivel Secure’s established customer base spans over 35 countries and its solution is used to secure VPN, desktops, web and Cloud-based applications.
Offering a wide range of user deployment options, the Swivel platform delivers two factor authentication via mobile apps, SMS, OATH Tokens and interactive voice response channels and stronger authentication through integrated in-browser imagery.. .
The Defence Works
The Defence Works provide security awareness training and simulated phishing that finally delivers a positive security culture by focusing on what matters most – your employees. No more tedious security awareness training videos, pointless interactions or tick-box questions.
Instead, The Defence Works delivers brand-new content each and every month – providing employees with interactive, immersive, real-life scenarios (based on recent, real world events) to finally help them understand cyber and data security in an engaging, entertaining and relevant way.. .
RedHunt Labs, an information security company that offers SaaS-based Attack Surface Management (ASM) product, NVADR which helps enterprises discover, track and secure their exposed Assets continuously. Our “asset” definition goes beyond subdomains and IP ranges and extends to items such as mobile apps, code repos, cloud storage instances, docker machines, leaked Keys, credentials, and much more.
A unified solution to give enterprises a holistic view of their constantly changing asset inventory and the associated risk profile.. .
CSL DualCom are the UK market leader for dual signalling systems trusted in hundreds of thousands of security installations. DualCom reduces the total cost of signalling for the entire security chain; keyholder, installer and ARC.
The DualCom GradeShift® range and WorldSIM® help to ensure happy keyholders by reducing line faults, whilst the Gemini Managed Network has the technology to pre-empt problems before they happen helping to reduce unnecessary site visits. CSL DualCom will continue to provide Alarm Installers with credible, trustworthy secure signalling at affordable costs whilst meeting the needs of the Insurance Industry and the stringent European standards..
DeepView protects companies from data leakage by staff. Real time alerts to public data leaks and opt-in encrypted channel recording make personal devices in the workplace safer.
DeepView’s unrivalled, patent pending technology and AI algorithm is built to read photos. It is the only solution that allows companies to manage data leakage from photos, videos and text shared by employees.
Thereby protecting companies from inadvertent and intentional data leaks. The advanced, slick encryption recording is the only solution to meet GDPR and MiFID II standards.
The platform instantly notifies you to confidential company data being shared for immediate action. Whilst also recording and archiving all business communications across current and emerging social channels..
Cable-Sense is dedicated to maximising the potential of your businesses cabling infrastructure. Cable-Sense makes existing Intelligent Infrastructure Management solutions look expensive and hard to use.
In the past, ROI models for IIMS have focused on patch fields; Cable-Sense’s extensive functionality delivers significant savings across your cabling network reducing costs in material, energy, capital expenditure and operations.. .
Deep-Secure Limited, a Reading, UK-based internet security company. Deep-Secure provides products protecting against threats to security via high defence network border gateway technology.
It enables customers to maintain network separation and apply content inspection so as to defend sensitive and protected information from intruders.. .
Intercede® is a cybersecurity company specializing in identity, credential management and secure mobility to enable digital trust. It provides software and services that help organizations ensure the safety and security of their people, facilities, networks and information in an increasingly mobile, digital world.
Intercede has been delivering solutions to high profile customers, from the US and UK governments to some of the world’s largest corporations, telecommunications providers and information technology firms, for over 20 years.. .
Cossack Labs provides easy-to-use and pragmatic customised data security solutions to large enterprises, startups, and tech-savvy SMEs from healthcare, traditional and innovative financing, modern fintech, critical infrastructures, banking and unbundled banking, and other industries. Cossack Labs takes on complete sensitive data protection and mitigating data leakages, without hindering their customers’ operations.
Cossack Labs’ products include a high-level open-source cryptographic library Themis, a database security suite Acra, and a security framework for enabling multi-user end-to-end encrypted data storage Hermes. Cossack Labs’ services are built around building secure software: information security advisory, security and cryptography engineering, secure software development training and consulting.
Its headquarters is in London, United Kingdom, with R&D in Kyiv, Ukraine. —– Find more about Cossack Labs products: Themis is a cross-platform high-level open-source cryptographic library for mobile, web, and server platforms.
easy-to-use and hard-to-misuse library. https://github.com/cossacklabs/themis Acra is a database security suite with searchable field-level encryption and leakage prevention.
https://github.com/cossacklabs/acra Hermes is a security framework for enabling multi-user end-to-end encrypted data storage, sharing and access control in the application. https://github.com/cossacklabs/hermes-core.
ClearSky Cyber Security
ClearSky Cyber Security offers cyber solutions specializing in threat intelligence services. It mainly covers the financial sector, critical infrastructure, public sector, and the pharma sector.
The company was founded in 2010 and is headquartered in Cambridge.. .
CyberSafe offers a range of Kerberos-based security solutions for SAP business applications. The company’s product portfolio includes ActiveTRUST Security Software, TrustBroker Security Suite, Defensor, and Centrax, all designed to enable secure electronic transactions and reduce administration costs.
CyberSafe was founded in 1991 and is headquartered in Issaquah, Washington.. .
Noble was founded “To Help Free Society from the Burden of Cyber Crime.” This is our Vision and core belief. This is what drives our ambition and gives us a competitive advantage.
We are not only a cyber security company. We are Cyberwarriors in the fight against corruption, crime and the dark side of the digital revolution.Our company was founded in London in 2016 to develop innovative network cyber security applications using advanced AI-based technology..
Enclave Networks (formerly Westgate Cyber Security) is a UK-based company engaged in the research and development of new computer security technologies, and board-level cybersecurity risk awareness training. Enclave Networks helps business and public sector bodies understand and overcome emerging cybersecurity threats, and believe in adopting more preventative methods to deal with cybercrime which lower complexity barriers to secure and effective digital communication.
Their experienced senior team engages directly with our clients and we pride ourselves on our ability to substantially reduce the risk of their clients falling victim to cyberattacks. Enclave Networks builds one-to-one connections and cloaks their applications with invisible network access gates using “authenticate-then-connect” technology, which only materialises when certain trust standards met – protecting from discovery, targeting, and attack.
Enclave Networks undertakes executive training on a bespoke basis delivered by its directors. Sometimes this is designed to highlight risk and governance, sometimes to address specific awareness.
By improving their awareness they can substantially reduce the risk of their organization falling victim to cyberattacks. They deliver programmes and short courses covering topics from digital hygiene and assurance through to data governance and control..
Cygenta was created in 2014 to support clients dealing with the multi-dimensional challenge of cybersecurity. With more than 30 years combined experience across a wide field of sectors, their co-founders are driven by securing the success of their clients.
We understand that true security means having digital, human and physical security working in harmony.. .
Deepnet Security is a leading vendor in Multi-Factor Authentication (MFA) and Identity & Access Management (IAM). Its award-winning product, Deepnet DualShield, is a Versatile Authentication System (VAS) that unifies all types of two-factor authentication methods in one single platform.
DualShield seamlessly integrates with all commonly used business applications with multi-factor authentication out of the box. Over 1,000 organisations world-wide rely on Deepnet DualShield to secure their VPN, desktop, web and cloud applications as well as Outlook emails.
Deepnet Security headquarters in London, United Kingdom with regional offices in Europe, North America, South America and Asia. Deepnet Security also operates an extensive world-wide network of value-added distributors, resellers, system integrators and solution providers.
Deepnet Security is led by an experienced management team with extensive experience in network and application security, and is supported by a talented development team. These teams guarantee that they will continue to be the leading developer of network and application security products that respond to the current and future needs of the market..
Fusion Global Capital
Fusion Global Capital is a growth-equity firm investing in b2b technology. At Fusion Global Capital, we combine our operational and investing experience, our global network and a focused strategy to produce superior returns.
We are focused on b2b technology companies, especially in enterprise software, where we see the potential for their products to transform businesses in all sectors, across the world, over the next one to two decades.. .
Ace Security in london can assist make your commercial enterprise or event that much more at ease. We focus on safety guards that offer a wide variety of services and are enormously educated.
Whether you want a protection protect for a private or public event, ACE Security has the understanding you need in london and surrounding regions. All of our guards are very well vetted to make certain they’ve the proper training and revel in to hold you safe.
We additionally make sure they are properly informed at the present day possible threats and how to cope with them in any scenario.. .
edgeNEXUS – The New home of jetNEXUS technology We develop the most elegant, easiest to use and flexible edge computing products that include jetNEXUS Loadbalancing, ADC – Application Delivery Controller , WAF Web Application Firewall, GSLB Global Server load balancing and Edge Cloud computing technology Our Story 18 years ago we starting building technology to make the internet faster. Since then our passion for speed has only been out shone by our dedication to simplicity and usability.
Every day we challenge ourselves to make our products easier to use whilst at the same time adding more advanced features. It is this dichotomy that powers our best innovation! It is this challenge that drives us forward..
“We work to protect your business from criminal Interference” Unicus, with the UOS hardened Operating System is the only integrated & effective defence against the threats facing RTC services. Communication patterns have changed.
Real-Time Communications (RTC) services moved to IP service delivery. IP based phone system are now found in virtually all major companies and IP is becoming the dominant service delivery mechanism with SIP trunks growing fast and all major service providers committed to switching from legacy technology to IP for all connections.
Add to this the benefit of using IP for remote connections to enable connectivity for remote and roaming users, then all RTC services, voice and video calls, Instant Messaging and Presence (tracking the availability of colleagues) migrate to the IP world. Just as the growth of email and web lead to the development of new attacks and security threats, moving RTC to IP networks has had the same result.
Without adequate security controls, IP based RTC systems (including IP-PBX from well-known vendors and the growing range of Unified Communications Services) are all open to attack. These attacks include denial of service (DoS) attacks, loss of confidential data and potentially expensive fraud attacks.
The cyber security products developed for the first wave of Internet applications do not adequately protect IP based RTC services. These products can hamper the successful deployment of RTC.
RTC services face threats at multiple levels, network, application and content. Effective security controls must address the threats at each level.
Actix helps the worldâ€™s leading mobile network operators optimize their customer experience and dramatically reduce the cost of network ownership. Over a billion people in 106 countries benefit from our technology.
Year on year, mobile operators are faced with increasingly fierce competition and sky-high customer expectations. They need to extract the maximum value and performance from one of the biggest communication assets – the radio access network (RAN).
All over the world, Actix delivers intelligent, automated network performance engineering and network status management systems. Creating measurably higher performance at lower cost, we help leading wireless carriers increase their revenue and improve operating margins..
Authentication based only on one factor – the password – cannot be considered reliable enough for systems with a high level of security requirements. Using several factors in the authentication system simultaneously significantly increases the system’s level of protection against unauthorized access.
Many companies offer their solutions for implementing multifactor authentication, but their problem is that they are bureaucratic monsters with all the predictable consequences: poor communication and subpar service; cumbersome, inconvenient and inflexible products; unavailability of the current information and lack of means to obtain it promptly. Besides, these companies are monopolists; they bill their customers for huge amounts after completing the stage of negotiations with each client, without publically disclosing their prices.
Protectimus aims to offer the best solution in the sphere of two-factor authentication in terms of price and ease of use and ensure a high level of quality and system reliability.. .
Cyberlumeneer was established to solve challenges faced daily by security operations and management teams through designing world class solutions that provide near-real-time visibility, board ready reporting, digital foot printing and continuous security control monitoring. Our flagship product, CORE, has been built leveraging experienced MSS providers, technical product experts, CISO’s, InfoSec Managers and offensive and defensive security practitioners to deliver a unified single-pane-of-glass.
CORE installs within hours , and does not tie you into contracts, we are firm believers that we either provide you value, or you can cancel with no obligation. CORE provides instant, cross correlated data and visualisations that enable organisations of any size to: • Speed up decision-making process with accurate, real-time information • Improve organizational cybersecurity posture and maturity • Improve compliance and coverage through accurate data • Enable SOC teams to obtain user and device context when investigating incidents • Manage threats and minimise the attack surface • Ensure better ROI from existing investments • Enable organisations to hold service providers accountable • Provide proof and visibility of security.
Established in 1997, their spirit and accountability is what sets us apart. These core values are at the heart of everything they do.
It results in the very highest standards and enables us to maintain a financially stable business based on an outstanding reputation. Their vision is simple – to give every business the technology to succeed..
Ensoft Ltd. provides software solutions for service provider networks.
Ensoft delivers software solutions for high-end computer networking and telecommunications systems. It works intimately with major US product vendors on industry-leading platforms for core/edge routing, Carrier Ethernet, broadband, mobile, and video.
Tegen offer outsourced IT services to local businesses who are looking to grow. With Tegen you get a complete team of strategic IT Managers as well as a service help desk of certified and full tiered engineers to support your entire staff count and IT Infrastructure.
We off Cloud Solutions, Disaster Recovery Services and Vendor Management to help with any IT Project, office move or expansion.. .
Kite Distribution is a UK focused, value-added distributor that specialises in bringing innovative and disruptive technologies to the UK channel. Our management have over 50 years of accumulated channel experience, including launching and building markets for some of the most readily recognisable security & networking brands around today.
Their aim at Kite Distribution is to provide each of our vendor and reseller partners with a market leading distribution engine for building incremental revenue. They are also ardent believers in maintaining quality at all times.
They endeavour to set a very high level of partner satisfaction from the point the enquiry is picked up, our understanding of the vendors proposition, quote accuracy and turnaround all the way through to delivery and post-sale professional services.. .
You may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.