Service finder
Vendors

Click here for AppGuard resources

Click here for CubedMobile resources

Click here for Cyglass resources

Click here for DaBoost resources

Click here for Firescope resources

Click here for Fortanix resources

Click here for Jamf resources

Click here for Matrix42 resources

Click here for Metomic resources

Click here for Parsyfal resources

Click here for Zimperium resources

Click here for ZecOps resources

AppGuard applies patented technology to protect endpoints, servers, and ATMs against all Zero-Day threats.
AppGuard Enterprise is a centrally managed host-based endpoint protection solution, originally developed for US Defence organisations and prevents malware and all advanced cyber-attacks from harming the system. It blocks attacks from detonating without having to explicitly recognize the attack. It is intended for organisations with high numbers of endpoint devices to protect.
Documentation
Multimedia
Conquering Zero-Day Threats
Preparing for what’s next,
not what was last

BYOD – Bring Your Own Device: Cubed Mobile transforms one mobile into two, encapsulating an entire business smartphone in a super-app on a personal phone. Delivering a complete workspace combined with a unified communication hub, the self-contained, centrally managed virtual smartphone, can be installed on any device.
Documentation
Multimedia
CubedMobile Overview
CubedMobile Datasheet
CubedMobile Testimonial
CubedMobile Introduction
CubedMobile – When two becomes one
CubedMobile – Enterprise virtual smartphone
Cubed Mobile – Worried about your employees using their personal devices for business?
Cubed Mobile – Personal and business number on your mobile device

CyGlass eXtended Cloud Defense protects hybrid network/cloud threat surfaces with a single 100% cloud-native, AI driven solution.
Documentation
Network Threat Detection
and Response
Hybrid Cloud Datasheet
Network Defence Risk and Compliance Reports

DaBoost have developed an advanced sequence algorithm which is a unique, highly efficient, parallel multi-pattern search technology significantly increasing digital processing speeds by up to 100 times!
Documentation
DaBoost general datasheet
DaBoost versus other methods
DaBoost versus other methods (technical)
AI & Big Data Datasheet
Bioinfomatics Datasheet
Cyber Security Datasheet
Hardware Acceleration Datasheet

Secure Discovery and Dependency Mapping
Discovery that sees everything all the time – Our Persistent Observation is always listening to the network flow traffic and finds every asset that communicates on your network.
Multi-layer Baseline Service Maps – FireScope baseline service maps provide multiple dependency layers of your critical tier1 and tier2 applications across your technology stacks ensuring every asset and dependency is accounted for.
Documentation
Multimedia
Battling an invisible threat
SDDM The GPS for your IT Landscape
Service centric security strategy
SDDM Factsheet
How to safeguard patient data – healthcare sector guide
Firescope pitch
FireScope’s Multi-layer Dependency Maps
SDDM Root Cause Analysis
SDDM – Building complex service dependency maps
IT Asset & Service Management Landscape Change
SDDM – Configuration ITEM (CI) Compliance

A unified data security platform powered by confidential computing that delivers a wide-range of data security services, including encryption, multi-cloud key management, tokenization, TDE and multiple other capabilities— from one single console.
Documentation
Data Security Manager Overview
Data Security Manager Datasheet
Data Security Manager Sales Training
Data Security Manager Hardware Appliance FX2200 Series II-DS
Confidential Computing for Dummies

Jamf is the standard for managing and securing Apple at work. Jamf is trusted by 71,000+ businesses, schools and hospitals, managing and securing over 30 million devices to maximize their tech initiatives.
Documentation
Jamf Pro Brochure
Jamf Protect Brochure
Jamf Connect Product Brochure
Executive Threat Protection
Mobile Endpoints Threat Protection

Building a secure and efficient IT workspace – Matrix42 help organisations digitise the workspace environment of their employees. The software for its digital workspace manages devices, applications, processes and services in a simple, secure and compliant way.
Matrix42 Egosecure’s Insight Module collects information on the data security situation of your network to determine the initial deployment of protective measures. It is then used to constantly monitor your organisation’s protection requirements as they change with time. The IntellAct Module analyses the data from Insight and automatically activates protective measures based on pre-defined rules.
Documentation
Multimedia
Matrix42 Use Case – Kingston

Discover and control sensitive data in the cloud.
Discover: Accurately identify sensitive data across all of your cloud apps and infrastructure, so you know precisely where it is, and who has access to it.
Control: Precisely control sensitive data across thousands of locations. Block data being uploaded to the wrong place, and automatically delete it when it’s no longer needed.
Documentation
Metomic Overview
Metomic Datasheet

Parsyfal is a Data Protection platform that operates across the entirety of your business. It is powered by a.i. that identifies and measures escalating threats to your business as well as vulnerabilities and weaknesses within your operation.
Through a comprehensive dashboard you will see real-time status of vulnerabilities and their locations, each triaged for urgency of response and remediation.
Documentation
Parsyfal Overview
Parsyfal Expertise
Parsyfal Full Brochure
Parsyfal Testimonials
The Parsyfal Story

Mobile attacks are finally visible! ZecOps Mobile EDR empowers security professionals to discover and analyze mobile cyber attacks
Documentation
Multimedia
ZecOps + MTD
ZecOps for Applications Product Details
ZecOps for Mobile FAQs
ZecOps for Mobile On-Premises Deployment on VMs
ZecOps Mobile EDR
ZecOps Kiosk Generic
ZecOps Managed Services
ZecOps Mobile EDR
ZecOps Sample Tier 4 Digital Forensics Report
ZecOps vs Cellbrite Battlecard
ZecOps Market Positioning

Mobile Endpoint Security: Zimperium empowers enterprises to secure their mobile endpoints, enabling employees to access sensitive data and mission critical systems safely and securely. Our enterprised-focused, advanced mobile security solution integrates with IAM, UEM, XDR platforms and is deployable on any cloud, on-premises, and air-gapped environments.
Mobile Application Protection: Zimperium enables enterprises to build safe and secure mobile apps. Their solution detects and prevents app compromises that disrupt business, damage reputation, and result in regulatory penalties. Zimperium is the only unified solution that combines comprehensive protection with centralized threat visibility.
Documentation
Zimperium Sample Mobile Threat Risk Report
Zimperium Mitre Att&ck for Mobile Matrix
Zimperium Security into Vision
VMWare + Zimperium at a Glance
Zimperium zConsole API Guide
Zimperium zConsole Configuration Guide
Zimperium zConsole VMWare Workspace Integration Guide
Zimperium Mobile Threat Defence vs MDM
Zimperium Crowdstrike Compete Campaign
Zimperium Corporate Fact Sheet
Zimperium + VMWare CRWD Takeout Play
Zimperium – Why Hackers Love your Mobile Banking App
Zimperium – 95% of mobiles are not connected securely
Zimperium – MDM is not MTD
Zimperium – Mobiles are modern end points
Zimperium – WFH 60% are end points
Zimperium – Personal Mobiles are under attack
Zimperium – Where do you take your mobile device?
Zimperium – Mobile apps are highly vulnerable to attack
Zimperium – Few enterprise organisations know the risks to their mobile device estate

Posts
Using your personal mobile for work might feel like it’s great for productivity, but…
We’ve all done it. Or should that be we’re all doing it and don’t feel like stopping. What I’m referring to is using our own personal devices, whether that’s a smartphone or tablet, for our employer’s daily work. These devices all have email clients, or a client is...
CubedMobile Testimonial
Zimperium – Mobiles are modern end points
CubedMobile – When 2 becomes 1
Zimperium – WFH 60% are end points
Zimperium – 95% of mobiles are not connected securely
Zimperium – Personal Mobiles are under attack
Zimperium – MDM is not MTD
Zimperium – Where do you take your mobile device?
Cubed Mobile – Worried about your employees using their personal devices for business?
Cubed Mobile – Personal and business number on your mobile device
Zimperium – Mobile apps are highly vulnerable to attack
Zimperium – Few enterprise organisations know the risks to their mobile device estate
Podcasts, webinars and videos
Managing Cyber and Compliance Risk
in 3rd party suppliers