Skip to main content
Services Catalogue

Precision defence for the modern enterprise.

Our four practice areas cover information-security work end to end. Engagements are scoped to your organisation and delivered by experienced consultants.

Cascading code on a dark monitor
Practice 01

Governance & Compliance

policy

Security Audit & Review

Independent assessment of your information security controls against recognised standards.

LEARN MORE arrow_forward
analytics

Risk Management

Identification, analysis, and treatment planning for the risks that matter to your business.

LEARN MORE arrow_forward
verified_user

ISO 27001

Gap analysis, ISMS design, internal audit support, and certification readiness.

LEARN MORE arrow_forward
credit_card

PCI DSS

Scoping, gap analysis, and remediation guidance for payment-card environments.

LEARN MORE arrow_forward
school

Security Awareness

Training programmes that turn staff from your largest risk into your first line of defence.

LEARN MORE arrow_forward
Practice 02

Insider Threat

visibility

Counter Surveillance

Detection and response to surveillance against your organisation, executives, or sites.

LEARN MORE arrow_forward
badge

Personnel Vetting

Background screening and ongoing assurance for staff in trusted positions.

LEARN MORE arrow_forward
groups

Social Engineering

Authorised phishing, vishing, and physical pretext testing to expose human weak points.

LEARN MORE arrow_forward
lock

Data Loss Prevention

Programmes and controls to keep sensitive information inside your perimeter.

LEARN MORE arrow_forward
school

Security Training

Role-based training for technical, operational, and executive audiences.

LEARN MORE arrow_forward
Practice 03

Vulnerability Assessment

bug_report

Penetration Testing

Manual, scoped testing of applications, networks, and infrastructure by experienced operators.

LEARN MORE arrow_forward
emergency

Emergency Response

Incident triage, containment, and forensics support when things have gone wrong.

LEARN MORE arrow_forward
shield

Physical Security

Site assessments and red-team engagements covering doors, locks, badges, and people.

LEARN MORE arrow_forward
Practice 04

Technical Consultancy

code

Application Security

Secure design reviews, code review, and SDLC integration.

LEARN MORE arrow_forward
language

Website Security

Hardening, configuration review, and remediation of web-facing assets.

LEARN MORE arrow_forward
dns

Network / System Hardening

Configuration baselines for firewalls, servers, and endpoints aligned to best practice.

LEARN MORE arrow_forward
wifi

Wireless Security Audit

Assessment of corporate and guest wireless against current attack techniques.

LEARN MORE arrow_forward
find_in_page

Forensics & Recovery

Digital forensics and data recovery support for investigations and incidents.

LEARN MORE arrow_forward
history

Business Continuity & DR

Continuity planning, disaster-recovery design, and tabletop exercise facilitation.

LEARN MORE arrow_forward
Practice 05

AI Security

model_training

Model & Prompt Security

Adversarial testing of LLM-backed features: prompt injection, jailbreaking, and tool-use abuse.

LEARN MORE arrow_forward
policy

AI Governance & Policy

Acceptable-use policies and approval workflows aligned to the EU AI Act and ISO/IEC 42001.

LEARN MORE arrow_forward
shield_lock

Data Protection for AI

Classification, retention, and DLP controls for prompts, embeddings, and training corpora.

LEARN MORE arrow_forward
psychology_alt

Insider Misuse of AI

Detection and mitigation of staff exfiltrating sensitive data through public AI assistants.

LEARN MORE arrow_forward

Ready to harden your enterprise architecture?

Talk to us about an information security review, ISO 27001 readiness, or a targeted engagement.