Managed Services
25 products
SOC, MDR, penetration testing, and advisory services
Fully managed Security Operations Centre with dedicated tier-2 and tier-3 analysts, continuous SIEM monitoring, threat hunting, and guaranteed 15-minute MTTR SLA.
Cost-effective SOC service for SMBs with business-hours monitoring, monthly threat reports, and direct analyst access via dedicated Slack channel.
Full-lifecycle MDR service combining EDR, NDR, and cloud telemetry with expert-led investigation and response. Includes managed endpoint agents and unlimited incident response hours.
Analyst-led MDR with 24/7 alert triage, threat containment, and weekly executive reports. Ideal for organisations without in-house SOC capability.
OWASP-methodology manual web application penetration test covering authentication, authorisation, injection, business logic, and API endpoints. Full report with CVSS scoring.
External and internal network penetration test covering perimeter defences, lateral movement paths, and Active Directory privilege escalation vectors. PTES-compliant.
Goal-based adversary simulation mimicking APT tactics with physical, digital, and social engineering vectors. Provides a realistic measure of detection and response maturity.
Automated and manual vulnerability assessment across your entire network perimeter and internal estate. Prioritised remediation roadmap with technical and executive reports.
Architecture-level cloud security review covering IAM policies, network segmentation, data protection, logging, and compliance posture across your cloud environment.
Comprehensive assessment against ISO 27001:2022 controls. Identifies gaps, quantifies risk, and delivers a prioritised implementation roadmap towards certification.
Full assessment against the EU Digital Operational Resilience Act (DORA) requirements. Covers ICT risk, incident reporting, TLPT, and third-party risk frameworks.
Technical audit of data processing systems against GDPR requirements. Covers encryption, access controls, data retention, breach detection, and DPIA readiness.
Pre-agreed IR retainer providing guaranteed analyst availability within 2 hours of a declared incident. Includes proactive IR readiness assessment and tabletop exercise.
Court-admissible digital forensics investigation covering disk, memory, network, and cloud artefacts. Chain-of-custody maintained throughout. Expert witness available.
Curated STIX/TAXII threat intelligence feed covering IOCs, TTPs, threat actor profiles, and sector-specific intelligence. Updated every 15 minutes with analyst-validated data.
Continuous monitoring of dark web forums, markets, paste sites, and Telegram channels for leaked credentials, stolen data, and threat actor chatter about your organisation.
Managed phishing simulation service with 1000+ customisable templates, automated remediation training, and click-rate trending dashboards for board reporting.
Engaging, role-based security awareness training with 500+ content modules covering phishing, social engineering, data handling, and compliance. LMS integration included.
Fractional CISO service providing strategic security leadership, board reporting, programme governance, and regulator liaison. Includes 40 hours of advisory per month.
End-to-end Zero Trust strategy and implementation roadmap. Covers identity segmentation, micro-segmentation, continuous verification, and technology stack alignment.
Structured crisis simulation exercise testing your incident response playbooks against realistic threat scenarios (ransomware, data breach, supply chain attack).
Structured vendor security evaluation covering questionnaire review, evidence validation, and technical scanning. Risk-rated output aligned to NIST CSF.
BCP development aligned to ISO 22301. Covers BIA, recovery strategy design, BCM documentation, and a tested continuity plan ready for certification audit.
Expert review of your current security architecture identifying weaknesses, redundancies, and alignment gaps against TOGAF and SABSA frameworks.
Structured onboarding engagement covering asset inventory, SIEM log source integration, use-case configuration, and runbook development. Ready-to-operate in 30 days.