Managed Security Essentials

Your business has unique needs that can’t be met with off-the-shelf security solutions. We build our Managed Security Essentials package around your specific requirements, and draw up a suite of security services to ensure your defences stay robust and agile.

Control Server

You have full access to your control server: a secure bastion where you can access your private network and control your infrastructure. We set up and manage your control server, ready for you to test your application in private, monitor events, and control who accesses your data.

  • Private Network Setup

    You don’t need to worry about setting up your private network — we’ll take care of that for you. Configure it how you want it, or leave it to us.

  • Identity Management

    Restrict who accesses your data. Keep all the keys to your servers, and your user permissions in one place for you to control.

  • Event Visualisation

    See what’s going on at all times by checking your log information in a visual dashboard. We’ll install, configure and fine tune the dashboard for you.

Need Some Help?

We're here to make your life easier, so if you need help choosing the right package or require something bespoke, get in touch and we can take the pressure off and help you decide.

Get Advice

Web Application Firewall (WAF)

Identify the attackers and stop them before they get in with a state-of-the-art web application firewall. Traditional firewalls only act as a barrier to accessing your network. Web application firewalls monitor, control and block malicious attacks to the core of your application.

  • Application Layer Protection

    Protect the foundations of your site with a web application firewall. The WAF identifies and blocks attacks to the core of your application, and helps you meet PCI DSS compliance.

  • Complete Setup and Management

    Hand over the complex setup and maintenance of your web application firewall to us. We will set it up and configure it for you, and manage it once it’s running.

  • Managed Customisation

    It doesn’t matter which content management system you use — we will customise firewall rules to protect your CMS from specific attacks, whether it’s WordPress, Magento, Drupal or something else.

  • Optimizing Performance

    In order to make sure your firewall is always performing at its best, we continually monitor and analyse your log files and make tweaks if performance needs optimising.

Intrusion Detection System (IDS)

You need to be able to differentiate between legitimate visitors and malicious ones — that’s where the intrusion detection system comes in. We monitor your entire system and log any suspicious behaviour, alerting you as soon as anything suspicious gets flagged.

  • Email Alerts

    Never get caught by surprise. Get email alerts when important configuration files are changed within your system.

  • Compliance Support

    Meet your compliance requirements, such as PCI DSS and ISO 27001, with the support of our certified intrusion detection system.

  • Log Manager

    Use log data to perform forensic analysis and reporting. See who has accessed your system and check if incidents have occurred.

Need More Security?

Managed Security Premium

You’ll get all the reinforcement of the Managed Security Essentials package, plus an extra layer of security and consultancy designed specifically for businesses who deal with sensitive data.

Choose Your Package

We’ll work with you to build a security package that’ll keep your site secure and will scale as your business needs evolve.

  Essentials Premium Enterprise
Control Server
A secure bastion where you can access your private network and control your infrastructure.
Web Application Firewall (WAF) Monitor, control and block malicious attacks to the core of your application.
Intrusion Detection System (IDS) We monitor your entire system and log and alert you of any suspicious behaviour.
DDOS Mitigation Always On DDoS mitigation that spots and blocks illicit traffic instantly.
Intrusion Detection System (PRO) Advanced monitoring and detection, plus big data analytics to analyse and detect unusual behaviour.
Security Operations Center (SOC) A team of dedicated engineers continuously monitoring your infrastructure.
  Choose Choose Choose
  Learn more Learn more Learn more