Use cases

ransomware attack

Fighting ransomware

Adopting best practice measures set out in security frameworks, like Cyber Essentials, can reduce the chance of ransomware impacting your business by up to 86%. These security measures help identify any gaps in your cyber defences so you can fix them before being infected with ransomware or other viruses. We have identified three key steps that should be taken to reduce the chances of a ransomware infection

Asset management & inventory

The Cybersecurity and Infrastructure Security Agency (CISA), National Cyber Security Center (NCSC), SANS Institute and more recommend a Cyber Security Asset Management approach to reduce your chances of a cyber-security breach. Analysts, including Gartner, are seeing an emerging technology Cyber Asset Attack Surface Management (CAASM) as a critical response to rising cyber risks.

Behaviour monitoring

NetFlow for Cyber Security. NetFlow allows administrators to automate monitoring the behaviour of devices connected to a network. It allows insight into network abuse and anomalies that may represent a threat – such as the spread of malware infection, users attempting accessing known malware sites and providing early indication of hacks and data breaches. NetFlow is a networking feature that was introduced by Cisco in the 90’s and taken up by many others

Perimeter security

Perimeter security is an integral part of cybersecurity frameworks. Standards like ISO27001 and Cyber Essentials help organisations to secure their networks. Perimeter security focuses on controlling connections between network devices. We call these “edge connections”. These are distinct from end-point device connections (often called access ports). “Securing all edge connections is crucial. Without them, unauthorised users could gain access to systems and data, potentially leading to a breach

Detect and protect IoT

Detect & protect IoT Many companies are adopting new, networked systems like buildings management systems, card access control systems, and industrial control monitoring sensors to improve efficiency and cut costs. Though useful, these Internet of Things (IoT) systems often use very lightweight software that often can’t accommodate traditional security controls designed to deter malware and intrusions. “IoT usage is rapidly growing year-on-year, with 75.44 billion installed IoT devices predicted worldwide by 2025