Industry Spotlight Archives - Cyber Secure Forum | Forum Events Ltd
Posts Tagged :

Industry Spotlight

INDUSTRY SPOTLIGHT: Protect your top attack vectors, across all channels by Perception Point

960 640 Stuart O'Brien

Perception Point is a Prevention-as-a-Service company for the fastest and most accurate next-generation detection, investigation, and remediation of all threats across an organization’s main attack vectors – email, web browsers, and cloud collaboration apps. Perception Point streamlines the security environment for unmatched protection against spam, phishing, BEC, ATO, ransomware, malware, Zero-days, and N-days well before they reach end-users.

The use of multiple layers of next-gen static and dynamic engines along with patented technology protects organizations against malicious files, URLs, and social engineering-based techniques. All content is scanned in near real-time, ensuring no delays in receipt, regardless of scale and traffic volume. Cloud-based architecture shortens development and deployment cycles as new cyber attacks emerge, keeping you steps ahead of attackers.

The solution’s natively integrated, free of charge, and fully managed incident response service acts as a force multiplier to the SOC team, reducing management overhead, improving user experience and delivering continuous insights. By eliminating false negatives and reducing false positives to bare minimum, the solution provides proven best protection for all organizations.

Perception Point empowers security professionals to control their full security stack with one solution, viewed from an intuitive, unified dashboard. Users can add any channel, including cloud storage, CRM, instant messaging, and web apps, in just one-click to provide threat detection coverage across the entire organization.

Deployed in minutes, with no change to the enterprise’s infrastructure, the patented, cloud-native and easy-to-use service replaces cumbersome legacy systems.

Fortune 500 enterprises and organizations across the globe are preventing attacks across their email, web browsers and cloud collaboration channels with Perception Point.

Contact us to learn more about how Perception Point can secure your business. 

Connect with us on LinkedIn, Twitter, and Facebook.

INDUSTRY SPOTLIGHT: iSTORM – Your trusted advisory service

960 640 Guest Post

iSTORM believe that strong privacy and information security practices are beneficial to every organisation.

Their team has more than 2 decades experience covering information security, cyber security, ISO 27001, information governance, data protection and penetration testing.

iSTORM understand the issues that 21st century businesses face and our hand-picked team of experts are here to provide pragmatic support to cover all your governance, risk management and compliance needs.

  • CREST approved penetration testing – including Red Team engagements
  • Cyber Essentials & Cyber Essentials Plus certification
  • ISO27001 Gap Analysis, Internal Auditing & Implementation
  • ISO23301 Business Continuity Management Systems
  • GDPR Consultancy and an Outsourced DPO service

To find out more visit https://istormsolutions.co.uk/

INDUSTRY SPOTLIGHT: HANDD Business Solutions

960 640 Stuart O'Brien

HANDD Business Solutions (HANDD) are a data centric cyber security service partner. We work within the IT security channel marketplace to provide software and the services required to address your business security needs.

As a result, we do not author our own product sets and instead offer consultancy, sales and aftersales support for the product offerings provided by our vendors.

The simplest way to think of the services a channel partner or Value-Added Reseller provides is that we go over and above what the vendors will provide themselves;

  1. Local Support; lots of technology vendors are based in the United States. If you’re elsewhere in the world you don’t want to wait for the west coast to wake up to get a major issue fixed. Here at HANDD we provide follow-the-sun support enabling our customers to get prompt resolution when experiencing issues regardless of their location.
  2. Agnostic Approach; we’re not tied to one solution, and as such focus solely on providing the right fit for your business challenge. This could encompass X number of solutions to get the job done.
  3. Services; because we’re vendor agnostic we’ve experience of engineering different solutions together, migrating from one or another and integrating existing pieces of technology which may exist already in your business.

Fundamentally, using HANDD to deploy your project you’re going to get more for your money! More time, care and attention discover more at https://www.handd.co.uk/data-services/.

Industry Spotlight: tenfold Software

960 640 Stuart O'Brien

tenfold is an Identity and Access Management solution designed to meet the needs of mid-market organizations. Thanks to a data importing tool and a large set of out-of-the-box plugins, tenfold can be set up quickly and easily, providing businesses with a central platform for managing users and permissions across all their systems.

The ability to automate routine tasks like user provisioning and joiner-mover-leaver processes not only lowers your IT workload, but also makes user management more secure. Eliminating outdated and unnecessary permissions helps businesses avoid security risks and meet compliance standards

More and more laws and regulations, including the UK’s own NIS directive, demand that companies take control of access rights by restricting them to a need-to-know-basis and regularly reviewing all existing permissions. Without proper support, keeping track of the hundreds and thousands of permissions used in mid-market organizations is next to impossible!

tenfold provides you with the tools needed to face cybersecurity and compliance challenges head on. With automatic notifications for access reviews and full documentation of every change made to user accounts, preparing for audits has never been easier.

Twitter – @tenfoldsecurity

Facebook – https://www.facebook.com/tenfoldsoftware

LinkedIn – https://www.linkedin.com/company/tenfold-software-gmbh/

Visit our website to sign up for a free trial and find out more about tenfold’s wide range of powerful features.

INDUSTRY SPOTLIGHT: The UK Cyber Security Association (UKCSA)

960 640 Stuart O'Brien

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals, small businesses, SME’s and corporate companies who are involved in the cyber security industry or who want to gain access to information to help them be more cyber aware.

Members receive a wide range of benefits including access to the latest cyber security industry news, networking events (virtual at the moment of course),  a yearly conference (also virtual at the moment), training, discounts on cyber security software products, insurance and much more.  

The UKCSA also raises awareness of cyber security awareness, cyber skills, training and best practice as well as helping more women enter careers in the industry neurodiversity in cyber security, the cyber skills gap and education as to the importance of cyber security and why businesses should take it seriously. 

Twitter – @ukcybersecassoc
LinkedIn – https://www.linkedin.com/company/uk-csa/
Facebook – https://www.facebook.com/ukcybersecassoc 

www.cybersecurityassociation.co.uk.

INDUSTRY SPOTLIGHT: Falanx penetration testing

960 640 Guest Post

To minimise risks from hackers you need to think and act like a hacker.

Penetration testing does just that, pseudo hackers attack your systems to help expose and fix vulnerabilities.

Whether it’s web applications, internal networks, mobile devices or wireless networks, penetration testing is critical to ensure high levels of cyber security. But why, when and how often should you penetration test?

Find out more at: https://falanx.com/cyber/why-when-and-how-often-should-you-pen-test/

INDUSTRY SPOTLIGHT: EveryCloud – Email Security

960 640 Stuart O'Brien

EveryCloud partners with Gartner and Forrester cloud security leaders to access, compare and improve your cloud security capabilities.

We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our solutions offer you the full protection and control to keep your business safe.

Solution Focus:

We assist business’ to secure their mailbox and not just their email server! Providing up to the minute intelligence and protection from mature and emerging threats.

INDUSTRY SPOTLIGHT: EveryCloud – Identity Access & Management

960 640 Stuart O'Brien

EveryCloud partners with Gartner and Forrester cloud security leaders to access, compare and improve your cloud security capabilities.

We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy.

From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our solutions offer you the full protection and control to keep your business safe.

Solution Focus:

We assist you to securely connect to the technologies and services that your business uses, with one integrated service that is born and built in the cloud.

INDUSTRY SPOTLIGHT: EveryCloud Cloud Access Security

960 640 Stuart O'Brien

EveryCloud partner with Gartner and Forrester, cloud security leaders to access, to compare and improve your cloud security capabilities.

We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our solutions offer you the full protection and control to keep your business safe.

Solution Focus:

We assist you to govern your business’ cloud usage with visibility and control, protect and prevent the loss of sensitive data and guard against cloud-based threats such as malware and ransomware.

INDUSTRY SPOTLIGHT: Gallagher access control systems

1024 683 Stuart O'Brien

Does your access control system allow you to implement, enforce and report on business policies and processes at every point using physical security infrastructure and command centre?

If not, it should. Access management can be based on individual competencies allowing your business to effectively manage compliance with business policy and government regulations.

Features and benefits

  • Check personnel at the door to make sure they are capable, qualified and compliant.
  • Monitor inductions, licenses, training and qualifications to only allow people access to areas they are qualified to be in.
  • Use random cardholder selection to check competencies and licensing.
  • Import competencies, images, roles and access rights from existing human resources, contractor management, or enterprise identity management systems.
  • Real-time audit trail provides prompt and reliable decision-making information.

Competency-based access management

  • Access management can be based on individual competencies.
  • Safety – is the employee inducted, trained, licensed and fit for work?
  • Equipment – does the employee have the right safety equipment?
  • Security – does the employee have the right clearance?
  • Regulatory compliance – are there other requirements the employee has to meet?
  • Validity periods and competence expiry can also be monitored. Access decisions are delivered to the individual instantly by the door reader or display monitor, or via SMS.
  • A variety of messages can be displayed which prompt the employee to proactively address any forthcoming issues that arise. If access is denied, then the individual is immediately informed of the appropriate corrective action.

The benefits of competency-based access management are:

  • Automatic enforcement of business OH&S rules and policies.
  • Reducing production disruption caused by presence of non-compliant staff.
  • Tangible evidence of duty of care to staff and customers.
  • Automatic compliance with government regulations.
  • Reduction in financial penalties for non-compliance.
  • Reduction in legal risks arising from employee accident claim.
  • Reduced likelihood of an employee failing to maintain access requirements.

www.gallagher.com

  • 1
  • 2