Our Services

Learn More


A comprehensive set of Security and Governance Services supported with state-of-the-art innovation

  • Cyber Health Check - 2 day Risk Assessment
  • PCI-DSS - Payment Card Compliance
  • Information Security Compliance - ISO 27001 and COBIT
  • Data Integrity and Protection - GDPR Compliance
  • Governance and Business Continuity - ISO 9001
  • Penetration Testing
  • Innovation Roadmaps


  • GASS - Compliance Tool
  • ASCEMA - Data Integrity
  • PROSA - Security By Design
  • CensorNet - Realtime Monitoring
  • ZenEdge - Packet Filtering and DDOS
  • RedSeal - Network Mapping
  • DarkTrace - Realtime Protection

Information Security

COBIT and ISO 27001 - Best practice for implementing an information security management system, and is recommended globally. Supported by the Assentian State-of-the Art Compliance Toolkit.

Cyber Technology Watch

An assessment of the most current protection, monitoring and detection software technologies available in-line with our partners and clients strategic requirements leaving them with a comprehensive review allowing them to make an informed judgement.

Cyber Health Check

Audit with remote vulnerability assessments to assess cyber risk exposure. identify actual cyber risks, audit the effectiveness of responses, analyse real risk exposure, create a prioritised action plan for managing risks

Governance - Quality Management

Based on ISO 9001 with seven quality management principles, we will help you to continually monitor and manage quality across all of your operations, as well as benchmarking your organisation’s performance and service.


The EU General Data Protection Regulation (GDPR) will come into effect on May 25, 2018. The legislation is of global interest as it impacts any company doing business with European citizens – regardless of where the company is based. For the many companies that must comply with the new legislation, the best way to prepare is to implement a solid data protection strategy and process — that includes encryption — in order to be most efficient.

How to Comply with the New EU Data Protection Regulation - Bespoke DP Audit This check covers the key areas of personal data security in the proposed EU Data Protection Regulation. It is provided to help companies identify anticipated areas of non-compliance in advance of the Regulation coming into force.

Identify and Authenticate Systems

  • Enforce authentication services like one-time passwords (OTPs) to web admin, User Portal, and more.
  • Enforce specific end user policies, such as for DLP, device control, and more.
  • Enforce encryption and password policy

Restrict Access to Personal Data

  • Granular, policy-based control over users, apps, web, and content to limit access to personal data based on business need-to-know.
  • Role-based management separates authorization levels and detailed logging of all access attempts

Track, Monitor Data Access

  • Access user-activity snapshot and real-time alerting
  • Exercise control over remote access authentication and user monitoring, with logging of all access attempts.
  • Manage all authentication and access monitoring from clients for access to the payment card environment, with logging of all access attempts.
  • Detailed log events of all malicious activities on mobile devices for help identifying suspicious activity trying to access personal data.
  • Alert users to apps that try to access the internet and various data sources.
  • Provides detailed logging of all access attempts.


On-site OR Remote Information Security, Data Protection, Quality Management and Innovation Management Training


Remote on-line support for our clients compliance and/or innovation projects. Forums through Linkedin and Twitter


With the latest innovative technology and our partners support for system design and architect meeting security and compliance requirements


Organising Events on Cyber Security, Privacy and Trust, Data Protection and Blockchain giving exposure to new regulations and innovation