7th November 2024
Hilton London Canary Wharf
24th June 2025
Hilton London Canary Wharf
Search
Close this search box.

INDUSTRY SPOTLIGHT: Protect your top attack vectors, across all channels by Perception Point

Perception Point is a Prevention-as-a-Service company for the fastest and most accurate next-generation detection, investigation, and remediation of all threats across an organization’s main attack vectors – email, web browsers, and cloud collaboration apps. Perception Point streamlines the security environment for unmatched protection against spam, phishing, BEC, ATO, ransomware, malware, Zero-days, and N-days well before […]

INDUSTRY SPOTLIGHT: iSTORM – Your trusted advisory service

iSTORM believe that strong privacy and information security practices are beneficial to every organisation. Their team has more than 2 decades experience covering information security, cyber security, ISO 27001, information governance, data protection and penetration testing. iSTORM understand the issues that 21st century businesses face and our hand-picked team of experts are here to provide […]

INDUSTRY SPOTLIGHT: HANDD Business Solutions

HANDD Business Solutions (HANDD) are a data centric cyber security service partner. We work within the IT security channel marketplace to provide software and the services required to address your business security needs. As a result, we do not author our own product sets and instead offer consultancy, sales and aftersales support for the product […]

Industry Spotlight: tenfold Software

tenfold is an Identity and Access Management solution designed to meet the needs of mid-market organizations. Thanks to a data importing tool and a large set of out-of-the-box plugins, tenfold can be set up quickly and easily, providing businesses with a central platform for managing users and permissions across all their systems. The ability to […]

INDUSTRY SPOTLIGHT: The UK Cyber Security Association (UKCSA)

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals, small businesses, SME’s and corporate companies who are involved in the cyber security industry or who want to gain access to information to help them be more cyber aware. Members receive a wide range of benefits including access to the latest cyber security […]

INDUSTRY SPOTLIGHT: Falanx penetration testing

To minimise risks from hackers you need to think and act like a hacker. Penetration testing does just that, pseudo hackers attack your systems to help expose and fix vulnerabilities. Whether it’s web applications, internal networks, mobile devices or wireless networks, penetration testing is critical to ensure high levels of cyber security. But why, when […]

INDUSTRY SPOTLIGHT: EveryCloud – Email Security

EveryCloud partners with Gartner and Forrester cloud security leaders to access, compare and improve your cloud security capabilities. We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our […]

INDUSTRY SPOTLIGHT: EveryCloud – Identity Access & Management

EveryCloud partners with Gartner and Forrester cloud security leaders to access, compare and improve your cloud security capabilities. We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, our […]

INDUSTRY SPOTLIGHT: EveryCloud Cloud Access Security

EveryCloud partner with Gartner and Forrester, cloud security leaders to access, to compare and improve your cloud security capabilities. We assist you to build combined solutions from products that suit your needs and goals and assist with GDPR data protection compliancy. From Cloud Access Security (CASB), Identity Access Management (IAM) and Email & Web Security, […]

INDUSTRY SPOTLIGHT: Gallagher access control systems

Does your access control system allow you to implement, enforce and report on business policies and processes at every point using physical security infrastructure and command centre? If not, it should. Access management can be based on individual competencies allowing your business to effectively manage compliance with business policy and government regulations. Features and benefits […]