ThreatLocker

Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions….

read more

Mimecast

Mimecast was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our customers around the globe; always putting them first. Our intentional and scalable design ideology solves the number one cyberattack vector – email, and thoughtfully integrates other essential capabilities….

read more

One Identity

One Identity helps organizations establish an identity-centric security strategy. Our identity and access management (IAM) portfolio, including identity governance, AD-centered IAM, privileged access management and identity SaaS solutions….

read more

Trend Micro

Trend Micro is a global cybersecurity leader with a mission to make the digital world safer. Our unified cybersecurity platform protects over 500,000 organisations globally including many high-profile customers in UK government, healthcare and higher education sectors. They benefit from Trend Micro’s 35 years of security expertise and global threat research – with a focus…

read more

Rubrik

Rubrik, the Multi-Cloud Data Control™ Company, enables enterprises to maximize value from data that is increasingly fragmented across data centers and clouds. Rubrik delivers a single, policy-driven platform for data recovery, governance, compliance, and cloud mobility. For more information, visit https://www.rubrik.com/ and follow @rubrikInc on Twitter….

read more

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

How to Design Your Security Integrations
A Mimecast product manager shares tips for integrating best-of-breed tools via APIs to more quickly identify, analyze and respond to threats. In a rapidly evolving threat environment, effective cyber defense requires a diverse set of focused, best-of-breed security tools. Integrating those tools is key to faster threat identification and response, helping security teams do more...
8 Questions CISOs Should Be Asking About AI
Blog By: Illumio  Trevor Dearing | Industry Solutions Marketing Director Chief information security officers (CISOs) are faced with the daunting task of protecting their organizations against increasingly sophisticated threats — and this will only get more difficult in the years to come with the rise of artificial intelligence (AI). AI is now a tool for both...
Risk management and Cyber Intelligence is key to public sector security
Blog By: One Identity This year the UK government broke new ground in protecting national infrastructure by launching the GovAssure programme. The GovAssure programme promises to be transformative change in government cyber security, by bringing rigour and objectivity to the table. In short, this initiative aims to audit all government departments by semi-independent entities. GovAssure...