Table of Contents
Technology is at the forefront of business innovation these days with a lot of interconnectivity across devices and cloud services. Cyber security used to be as simple as ensuring your IT network had up-to-date virus protection, but it’s far more complicated in the current climate.
With so many cyber security companies to choose from, every business is now able to proactively take the necessary steps to ensure their businesses are protected from malicious threats and bad actors. The question is, which cyber security companies and platforms are at the top of their game?
In this article, we’ve put together a list of the top cyber security companies who are worth a closer look, and a few additional pointers along the way.
Who are we to judge?
Firstly, it’s worth pointing out our credentials seeing as you’re looking for trustworthy advice on one of the most critical subjects within the business community. Network London are an accredited cyber security company who applies advanced security practices as standard for every long-term IT support client we work with.
We also provide specialised IT security consulting for organisations who may not require additional support, but need the additional confirmation that their existing security solutions are, in fact, working as designed.
Whether you’re looking for a long term partner, a cyber security overhaul or a comprehensive audit, we’d be delighted to tell you more about our experience in this field and how we’re able to help. Feel free to get in touch if you have any questions.
What's the difference between passive and active cyber security?
Passive security is what most businesses have in place already i.e. all the critical applications like antivirus protection, network and endpoint security and all other defensive equipment and software which aims to continually protect an environment from outside threats.
These components are essential, but how do you know if they are working?
This is where Active cyber security comes in. It’s the offensive approach, purposefully identifying exploitable weaknesses.
For example, penetration testing is designed to simulate a hacker who is attempting to bypass your defences and phishing simulations are designed to test and harden your weakest defences (human beings) by sending very convincing emails which appear real but include malicious links.
Both pen testing and phishing simulations are highly effective, and don’t impact business operations during tests i.e. no damage is done. These are just two basic examples of active engagement, there are many more security services like this which aim to thoroughly test your defences.
The goal is to identify every possible weak point; the longer term the campaign, the more effective it is. By applying both passive and active measures, a business can improve the reliability of both passive security solutions and the vigilance of team members all in one go.
Our List of top cybersecurity companies
In the next section, we’ve put together a selection of cyber security companies who are focused in different specialist areas, and of different sizes.
While these may not be suitable for every application or budget, it’s worth investigating and reviewing these services to see what is on offer.
Well known for their dominance in the telecommunications sector, BT also provide a diligent cyber security service for large corporations, especially when it comes to managed security services for networks.
Their features include asset oversight, threat identification, penetration testing, fraud defence, authentication based identity theft and preventative solutions for network attacks i.e. DDOS.
Another example of a large cyber security company at the top of their game who have an impressive 25,000 employees across various locations. There is no doubt PWC are capable in delivering a diligent range of enterprise security for networks.
Their features include advanced threat detection and response, DevSecOps for securing software applications, crisis management, ethical hacking (also known as pen testing) and much more.
Data Loss Prevention
Data breaches are the biggest concern when it comes to an unexpected intrusion, especially with a high focus on GDPR rules which every UK business must comply with.
Clearswift are focused on several areas including email security, endpoint protection, information governance and compliance, as well as adaptive data loss prevention. Most of their services are fulfilled as part of their product set, rather than providing active security testing.
The ecosystem which underpins applications is designed to be secure, however Sentrybay goes further by creating a secure container (armoured client) where applications can be run and data is fully protected.
This is especially useful when you rely on enterprise and SaaS applications which require a firm lock down on security, making it nearly impossible for hackers to infiltrate. Their portfolio of products also includes an armoured web browser, identity theft prevention and monitoring of the dark web.
Antivirus, Malware Protection and Hacking
One of the more recognisable brands in the security sector is Sophos who are well known for delivering both home and enterprise versions of their cloud security products.
Their portfolio of products has grown in recent years to include endpoint protection which utilises the latest in artificial intelligence, cloud security firewalls, managed threat intelligence and encryption solutions. Their web and email gateways are also exceptionally good.
One of the more innovative cloud security platforms which has recently become part of the OpenText group also has a long history in the cyber security industry.
Similarly to Sophos, Webroot have a number of security products on offer, including cloud based endpoint protection with contextual threat intelligence, DNS protection which retrofits on top of all hardware to protect users even when they’re working from WiFi hotspots and third party data protection for services like Office 365.
When it comes to security products which focus on laptop, desktop and thin client eco systems, Becrypt’s Paradox endpoint management product is worth considering. Paradox guarantees security through secure boot and cryptographic checks of both system and authorised applications.
There isn’t much maintenance required as Paradox automatically detects breach attempts and and updates the latest patches in the background.
One of the fundamental techniques used by cybersecurity companies to identify hackers is by setting up a honeypot. Essentially, a honeypot is an easy to access target within a network, as soon as a hacker scans or accesses the honeypot, an alert is generated.
Most of the time, setting these sorts of security measures requires an in-depth knowledge of server and data security, whereas Canary offer a ready-to-deploy solution which takes 3 minutes to configure and comes with a cloud dashboard that lets you know as soon as anyone has attempted to access the platform. One of the best products out there, albeit quite expensive.
Another method for detecting attacks is a forensic SIEM (log management system). Assuria provides a number of tools which focus on monitoring system activity across networks, including forensic logging, vulnerability and configuration assurance.
They also include a platform for setting up your own internal security operations centre (SOC). If threat monitoring is one of your highest priorities, Assuria is worth a closer look.
Cyber-Analytics and Proactive Risk Intelligence
It can take a lot of time and resources to investigate potential zero-day threats which may affect your business. Silobreaker is an all-in-one solution which scans the internet for threats which are particular to the services you depend on, alerting to the latest malware and attack types as soon as they come out.
If your organisation is constantly challenged by security exploits, utilising an analytical risk intelligence tool like Silobreaker will help to take preventative measures before they ever become an actionable threat.
One of the largest and oldest security and risk intelligence companies in the world, BAE systems help large organisations, governments and law enforcement agencies to overcome the challenge of managing potential security threats before they take place.
BAE often consult with global organisations to help secure their networks against sophisticated attacks.
Acuity Risk Management
Similarly to Silobreaker, Acuity provides a risk intelligence platform called STREAM which provides analytics and reporting.
They’re able to help create processes and frameworks which capture correlating data across the internet, allowing IT departments to prepare for exploits as they develop. Acuity has recently been awarded the ‘Cyber Security Product of the year’ in 2018.
Cloud Directory and Multi-Factor Authentication
One of the challenges today with so many interconnected cloud systems is having too many logins which users have to try remember. Jumpcloud solves this problem by providing a centralised directory which unifies user management and authentication for workstations, servers, networks, apps and files.
Jumpcloud’s multi-factor authentication (also known as two-factor authentication) also ensures all services and devices are secure, adding an additional layer of protection even if a users password has been compromised.
Simarlarly to Jumpcloud, Okta is another recognised cloud directory platform with a lot of useful features available. Their products on offer include single sign-on and adaptive multi-factor authentication, as well as advanced configuration for server access through RDP and SSH.
Both Jumpcloud and Okta provide a series of actionable products which would go a long way to protecting a business technology environment long term.
Mobile Security (MDM)
Meraki is most known for producing cloud based networking equipment, however, their cloud dashboards are exceptionally secure and well designed. One benefit to deploying a complete Cisco Meraki environment is the ability to fully utilise their mobile device management (MDM) platform.
MDM is able to fully control every setting on mobile devices giving network administrators the freedom to deploy the toughest restrictions where needed. No Meraki equipment is needed, just a set of their MDM licences which are surprisingly great value for money.
As you may imagine, there are probably 100 more cyber security companies and platforms which could be included in this list. While a lot of the biggest players in the market may be out of reach for a lot of small to medium sized businesses, there are companies like ours who focus on cyber security with just as much expertise and experience, and we’re far more budget friendly too.
The most important take-away should be that IT security is a big subject, and it does require a lot of thought to ensure you’re fully protected. A lot of the tools available are incredibly good, but proactively investigating weak points, including how users interact with different threats is really important too.
I hope this article is helpful to you, and I’d love to hear your thoughts. Feel free to leave your comments below!