Service finder
Vendors
Click here for AppGuard resources
Click here for CRM-uk resources
Click here for CubedMobile resources
Click here for Cyglass resources
Click here for DaBoost resources
Click here for ESET resources
Click here for Fortanix resources
Click here for Jamf resources
Click here for Metomic resources
AppGuard applies patented technology to protect endpoints, servers, and ATMs against all Zero-Day threats.
AppGuard Enterprise is a centrally managed host-based endpoint protection solution, originally developed for US Defence organisations and prevents malware and all advanced cyber-attacks from harming the system. It blocks attacks from detonating without having to explicitly recognize the attack. It is intended for organisations with high numbers of endpoint devices to protect.
Documentation
Multimedia
Conquering Zero-Day Threats
Preparing for what’s next,
not what was last
theCRM by CRM-uk delivers security by design and privacy by default. It is powerful CRM software, personalised to your exact needs and ensures robust Data Management at the core of your business.
Documentation
theCRM Overview
theCRM for Marketing
theCRM for Sales
theCRM for Enterprise
theCRM for Customer Success
theCRM Case Study Mercedes
theCRM Case Study Garnell
theCRM Case Study Capita
theCRM Case Study Kingspan
BYOD – Bring Your Own Device: Cubed Mobile transforms one mobile into two, encapsulating an entire business smartphone in a super-app on a personal phone. Delivering a complete workspace combined with a unified communication hub, the self-contained, centrally managed virtual smartphone, can be installed on any device.
Documentation
Multimedia
CubedMobile Overview
CubedMobile Datasheet
CubedMobile Testimonial
CubedMobile Introduction
CubedMobile – When two becomes one
CubedMobile – Enterprise virtual smartphone
Cubed Mobile – Worried about your employees using their personal devices for business?
Cubed Mobile – Personal and business number on your mobile device
CyGlass eXtended Cloud Defense protects hybrid network/cloud threat surfaces with a single 100% cloud-native, AI driven solution.
Documentation
Network Threat Detection
and Response
Hybrid Cloud Datasheet
Network Defence Risk and Compliance Reports
DaBoost have developed an advanced sequence algorithm which is a unique, highly efficient, parallel multi-pattern search technology significantly increasing digital processing speeds by up to 100 times!
Documentation
DaBoost general datasheet
DaBoost versus other methods
DaBoost versus other methods (technical)
AI & Big Data Datasheet
Bioinfomatics Datasheet
Cyber Security Datasheet
Hardware Acceleration Datasheet
ESET protects your endpoints, business data and users with multilayered technology. The ESET PROTECT platform offers customizable security solutions, and is managed easily from a cloud or on‑premises console.
Documentation
7 Reasons why MSPs love ESET
ESET Business Solutions
ESET PROTECT Elite Overview
ESET Datasheet – Vulnerability & Patch Management
Case Study – Abbotswood Junior School
Case Study – Dorset Police
Case Study – Dorset County Council
Case Study – CCS Media
A unified data security platform powered by confidential computing that delivers a wide-range of data security services, including encryption, multi-cloud key management, tokenization, TDE and multiple other capabilities— from one single console.
Documentation
Data Security Manager Overview
Data Security Manager Datasheet
Data Security Manager Sales Training
Data Security Manager Hardware Appliance FX2200 Series II-DS
Confidential Computing for Dummies
Jamf is the standard for managing and securing Apple at work. Jamf is trusted by 71,000+ businesses, schools and hospitals, managing and securing over 30 million devices to maximize their tech initiatives.
Documentation
Jamf Pro Brochure
Jamf Protect Brochure
Jamf Connect Product Brochure
Executive Threat Protection
Mobile Endpoints Threat Protection
Discover and control sensitive data in the cloud.
Discover: Accurately identify sensitive data across all of your cloud apps and infrastructure, so you know precisely where it is, and who has access to it.
Control: Precisely control sensitive data across thousands of locations. Block data being uploaded to the wrong place, and automatically delete it when it’s no longer needed.
Documentation
Metomic Overview
Metomic Datasheet
Quantum Evolve Touchstone protects your business against real-world cybersecurity threats.
Quantum Evolve’s Cybersecurity Posture & Protection digital platform is an innovative approach to capture & understand the cyber risks across your business. It provides a “single pane of glass” view of your digital ecosystem.
It identifies gaps, emerging threats, existing vulnerabilities & cyber risks with an independent & expert 360-degree view of your current cybersecurity maturity.
Documentation
Application Security Risk Assessment Information Sheet
Cloud Security Posture Information Sheet
Third Party Risk Management Information Sheet
Communications Governance & Control Information Sheet
Asset Risk Assessment Information Sheet
Phishing Assessment Information Sheet
Threat Assessment Information Sheet
Security Control Validation Information Sheet
Cryptographic Assessment Information Sheet
Domain & API Risk Assessment Information Sheet
Data Discovery Information Sheet
Mobile Device Assessment Information Sheet
Secure, manage & transform OT, IT and cloud operations. Deliver access management, remote access, and secure data. Don’t just detect attacks – stop them.
Documentation
Multimedia
Zero Trust and Remote Access
Zero Trust Data Exchange
Xage Security – Company Overview
Xage Security – Company Overview
Privileged Access Management
Zero Trust File Transfer
Zero Trust for the Real World
Complying with TSA’s Pipeline Security Directives
NIST Compliance
MFA for Industrial Operations
Xage Zero Trust Remote Access & Data Transfer Explainer
Zero Trust Remote Access & Data Transfer Benefit
Securing DERs
Xage Enforcement Point
IAM for OT Cyberattacks on Critical Infrastructure & Colonial Pipeline
Zero Trust Session Collaboration
NERC-CIP Compliance
Multi-Factor Authentication & Credential Rotation for Devices
End-to-end Dynamic Data Security Demo
Zero Trust Remote Access Authorization & Session Management
Xage Fabric Secure File Transfer
Case Studies in Industrial/OT Cybersecurity – Part 1
Mobile attacks are finally visible! ZecOps Mobile EDR empowers security professionals to discover and analyze mobile cyber attacks
Documentation
Multimedia
ZecOps + MTD
ZecOps for Applications Product Details
ZecOps for Mobile FAQs
ZecOps for Mobile On-Premises Deployment on VMs
ZecOps Kiosk Generic
ZecOps Managed Services
ZecOps Mobile EDR
ZecOps Sample Tier 4 Digital Forensics Report
ZecOps vs Cellbrite Battlecard
ZecOps Market Positioning
Mobile Endpoint Security: Zimperium empowers enterprises to secure their mobile endpoints, enabling employees to access sensitive data and mission critical systems safely and securely. Our enterprised-focused, advanced mobile security solution integrates with IAM, UEM, XDR platforms and is deployable on any cloud, on-premises, and air-gapped environments.
Mobile Application Protection: Zimperium enables enterprises to build safe and secure mobile apps. Their solution detects and prevents app compromises that disrupt business, damage reputation, and result in regulatory penalties. Zimperium is the only unified solution that combines comprehensive protection with centralized threat visibility.
Documentation
Zimperium Sample Mobile Threat Risk Report
Zimperium Mitre Att&ck for Mobile Matrix
Zimperium Security into Vision
VMWare + Zimperium at a Glance
Zimperium zConsole API Guide
Zimperium zConsole Configuration Guide
Zimperium zConsole VMWare Workspace Integration Guide
Zimperium Mobile Threat Defence vs MDM
Zimperium Crowdstrike Compete Campaign
Zimperium Corporate Fact Sheet
Zimperium + VMWare CRWD Takeout Play
Zimperium – Why Hackers Love your Mobile Banking App
Zimperium – 95% of mobiles are not connected securely
Zimperium – MDM is not MTD
Zimperium – Mobiles are modern end points
Zimperium – WFH 60% are end points
Zimperium – Personal Mobiles are under attack
Zimperium – Where do you take your mobile device?
Zimperium – Mobile apps are highly vulnerable to attack
Zimperium – Few enterprise organisations know the risks to their mobile device estate
Posts
Using your personal mobile for work might feel like it’s great for productivity, but…
We’ve all done it. Or should that be we’re all doing it and don’t feel like stopping. What I’m referring to is using our own personal devices, whether that’s a smartphone or tablet, for our employer’s daily work. These devices all have email clients, or a client is...
CubedMobile Testimonial
Zimperium – Mobiles are modern end points
CubedMobile – When 2 becomes 1
Zimperium – WFH 60% are end points
Zimperium – 95% of mobiles are not connected securely
Zimperium – Personal Mobiles are under attack
Zimperium – MDM is not MTD
Zimperium – Where do you take your mobile device?
Cubed Mobile – Worried about your employees using their personal devices for business?
Cubed Mobile – Personal and business number on your mobile device
Zimperium – Mobile apps are highly vulnerable to attack
Zimperium – Few enterprise organisations know the risks to their mobile device estate
Podcasts, webinars and videos
Managing Cyber and Compliance Risk
in 3rd party suppliers