7-9 SEPTEMBER 2021

Exhibitor Products


Exhibitor Products

  • certOS™ by CyberSmart. It is designed and built for Certification Bodies issuing Cyber Essentials, Cyber Essentials Plus and IASME Governance. Our technology can also be adapted to other cybersecurity ...
  • At TecSec, we pride ourselves on using the most recent & advanced technologies to help prevent and protect our clients from harm.  We offer a wide range of Cyber Services, which include: Vulnerability ...
  • Cyber Essentials Plus is the older, slightly more involved sibling of the standard certification. It has the same requirements as Cyber Essentials (you must have all five security controls in place) b ...
  • Cyber Essentials is a government-backed certification scheme that covers the essential actions every business should take to ensure its digital security and protection from cyberattacks. Think of it a ...
  • CyberSmart safeguards all your business’s devices 24/7. It checks for the most up-to-date applications, operating systems, firewalls, security measures and compliance with Cyber Essentials – protectin ...
  • Active Protect scans your devices every 15 mins, checking all installed software against the National Vulnerability Database. If a device fails a security check, you’ll be notified via the CyberSmart ...
  • TecSec offer tailored IT support packages to meet your businesses requirements and budget. These packages include: Remote Only IT support Fully Managed IT support AdHoc IT Support Assisted IT Support
  • At e2e, we believe that passionate and diverse people are key to creating and evolving a world-class security operation.

    That is why our Managed Security Services are centred around great people and processes, supported by technology.

  • At e2e, we believe that passionate and diverse people are key to creating and evolving a world-class security operation.

    That is why our External Vulnerability Scanning services are delivered by great people, using tried and tested processes and supported by technology.

  • SOC-as-a-Service

    Dan Young

    At e2e, we believe that passionate and diverse people are key to creating and evolving a world-class security operation.

    That is why our Security Operations Centre (SOC)-as-a-Service is centred on great people and processes, supported by our own technology.  We don't believe in silver bullets and work with customers to improve their cyber maturity to get the best ROI and to reduce TCO throughout the contract.

  • Gemserv can provide full outsourced data protection officer services (oDPO) or support in-house management through the virtual data protection service offering (vDPO). 

  • Every business faces IT security challenges. The biggest of these for startup and scaleup companies is often putting information security leadership and oversight into place cost-effectively. 

  • Having the right controls in place to comply with PCI DSS can help organisations save significant time and resources in complying with other requirements. 

  • ISO 27001, 27701, 9001, 22301

    26 Jul 2021 Gemserv

    The ISO standards provides a framework for organisations to better protect information and take clear, informed and cost-effective decisions on security controls and risk mitigation.

  • Our premier level cyber security service

    Operating from CyberGuard’s Security Operations Centre, our highly skilled team of security experts will monitor your IT footprint, detecting and investigating threats. Our Managed SIEM service is our premier level cyber security package!.

  • Companies in the 21st century now have to be proactive in their approach to cyber security and businesses are no longer comfortable with being ‘sitting ducks’ when it comes to cyber-crime. With organisations keen to adhere to cyber security regulations there is no place better to start your cyber security journey than by getting your Cyber Essentials accreditation or upgrade to Cyber Essentials Plus.

  • It may be uncomfortable to read, but your staff really are the biggest threat to your business’ information systems and cyber security. A recent cyber risk survey produced by the London Financial Times, found that 58% of cyber-attacks are attributed to employee behaviour. 

  • Outsourcing your security to our team of cyber security experts, who will proactively monitor your infrastructure, will free up your valuable time allowing you to concentrate on your business, safe in the knowledge you are being protected. 

  • Using the industry’s most-widely deployed vulnerability-scanning technology and the same process a hacker would use to compromise your IT systems, our highly accredited cyber team can offer two types of ethical assessments to pinpoint security weaknesses within your IT infrastructure: vulnerability testing and penetration testing. 

  • Securing your systems, workforce and operations Cyber attacks cost many thousands of pounds in lost revenues, disruption, repairs and recovery – not to mention that a breach could also lead to hefty f ...
  • Unifying the NOC and the SOC Whereas a Security Operations Centre (SOC) focuses on threat detection, security and the integrity of data, the key objective of a Network Operations Centre (NOC) is to en ...
  • Managed SOC (Security Operations Centre)

    26 Jul 2021 George Eastman

    Our Managed SOC service combines our most popular managed services into a single package to provide comprehensive cyber security coverage at a very attractive price.

  • Managed CaaS (Compliance as a Service)

    26 Jul 2021 George Eastman
    Our CaaS team will help you meet compliance for a wide range of regulatory and security standards. We can provide the roles of Data Protection Officer, virtual CISO, Risk Manager and System Manager an ...
  • Our team of experienced cybersecurity SOC analysts provide a 24x7 service that will monitor and analyse all of your organisation's important IT, OT and IoT log data for malicious activity.
  • Managed Vulnerabilities

    26 Jul 2021 George Eastman
    Using AI-driven PCI/DSS compliant technology, our vulnerability management team regularly scans and monitors your entire environment for potential security weaknesses that could be exploited.  
  • We offer world class 24x7 endpoint protection that proactively adapts and searches for security threats in your organisation.
  • iSTORM® Privacy - Security - Pentesting is an Approved CREST Penetration Testing Provider. Penetration testing is an important part of an organisation's security strategy.

    Our experienced testers can help prevent unauthorised access to your systems and data by exposing the vulnerabilities and weaknesses in your infrastructure and applications before anyone else does.


  • When determining the potential impact that data protection could have on your organisation, it is important to remember that there is more to consider than just GDPR.

    iSTORM® Privacy - Security - Pentesting can help you to navigate and understand the additional regulations and supporting standards which are relevant to your business and can help you map out what your compliance journey looks like.

  • Server Solutions

    Red Circles
    Although a lot of small and medium business are transitioning to cloud servers Red Circles can supply a tradtional server environment. Whether its physical or virtual we have the expertise to deploy, ...
  • Hardware & Software

    Red Circles
    Hardware and software solutions need reviewing regularly. Technology changes quickly. Keep ahead of the competition with the latest products and services. Speak to us about your workstations, servers, ...
  • FREE Vulnerability Assessment

    15 Jul 2021 Beth Haskell

    Our Industry-leading (Internet facing) vulnerability scan finds any weaknesses in your security perimeter before attackers do. You will receive a report and advice on next steps quickly and at no cost. There is nothing to download, install or configure – simply fill out this form and we will be in touch

  • Bespoke Solutions

    15 Jul 2021 Beth Haskell

    Cyberfit works as an extension of your team for year-round peace of mind. 

    If you have tools in place

    our experts can advise on how to make your existing cybersecurity more effective.

    If you need to put cybersecurity in place

    we can help you to invest in digital security that’s the right fit for your business needs and budget.

    Virtual CISO

    Virtual DPO

    Security Architecture


  • Be Ahead

    15 Jul 2021 Beth Haskell

    Suitable for businesses with an expanding workforce, multiple sites, legacy systems or more complex needs. The package monitors the three most common entry points for attackers Email, Website and Endpoint (device).

  • Be Assured

    15 Jul 2021 Beth Haskell

    Perfect for growing businesses that are becoming more complex and are looking for assurance that their systems are secure and protected. These companies are handling increasing amounts of customer data and their workforce is accessing that data from multiple locations and devices.

  • Be Safe

    15 Jul 2021 Beth Haskell

    Ideal for companies who are just getting serious about security and need a simple affordable service that identifies where attackers can get into your systems, protect your website and get advice, guidance and support from our team of experts.

  • Be Aware+

    15 Jul 2021 Beth Haskell

    Stay alert all year round with Be Aware+ and we will do vulnerability scanning and dark web monitoring every month for you helping you stay ahead of attackers. You will also get 30 mins a month of phone support from a member of our technical team. 

  • Be Aware

    15 Jul 2021 Beth Haskell

    There is no better place to start your journey to becoming digitally secure than with our ‘Be Aware’ package designed specifically for smaller businesses, start-ups and those taking their first steps into understanding cybersecurity and what it means for their company.

  • Consulting

    Red Circles
    If you don't know, why don't you ask the team that do. We have the qualified expertise to audit, recommend and implement technology solutions. Whether its cyber security, managed services, network inf ...
  • Is your company’s IT system vulnerable to attacks? Proactively identify vulnerable systems and devices that may be exploitable by cybercriminals. Evaluate your defensive security posture using industr ...
  • Secure your networks by segmenting your networks and functions using VLAN’s and routing. The greatest threat of network infrastructure security is from hackers and malicious applications that attack a ...
  • Business Continuity

    Red Circles
    When your data goes missing, the clock starts ticking and every second counts. Avoid downtime and recover lost data in minutes, not days. Red Circles offers a fully managed business continuity solutio ...
  • Protect your business infrastructure with managed security solutions. Information security services span your endpoints, business continuity, SaaS, network monitoring and analysis. With the ever-evolv ...
  • No organisation, big or small, is immune from a devastating cyber-attack. Cyber Exploits are more sophisticated, elusive, and targeted than ever before. It is vital for organisations to understand what controls are required to protect the business and its information assets. Here at iSTORM® Privacy - Security - Pentesting our specialist information security team works with you to support your organisation's current and
    future security needs.

  • Cyber Essentials

    05 Jul 2021 Sam Bramfitt

    Protect your organisation from 80% of cyber attacks – get certified now with the Cyber Essentials scheme

  • Cloud Security

    05 Jul 2021 Sam Bramfitt

    The cloud is a dynamic convenience in a global, portable society where remote access is in demand. Whilst the cloud infrastructure and security perimeter differs from a traditional static and private network, the variables in accessing data and applications are far greater thus posing new threat vectors.

  • Secure DevOps

    05 Jul 2021 Sam Bramfitt

    Efficient DevSecOps embeds automated security methodologies at the inception of an application to make it more robust and reliable. This built-in security function ensures that the best practice of discovery, remedy and prevention is an ongoing circular process for security posture.

  • Infrastructure Security

    05 Jul 2021 Sam Bramfitt

    Threat actors are becoming increasingly sophisticated and the consequences of unauthorised access or malicious attack more disruptive. If a crucial part of an organisation’s infrastructure is compromised it could halt operations, freeze assets and exploit customer and company data.

  • Application Security

    05 Jul 2021 Sam Bramfitt

    Application security is a set of skills and tools to make your application more secure by finding, fixing and preventing security vulnerabilities – before the attackers can exploit them.

  • Companies of all sizes are increasingly moving away from on-premise solutions to take advantage of cloud services supplied by Microsoft, Google and Amazon to rapidly scale infrastructure and make savi ...
  • Redflags

    23 Jun 2021 Tim Ward

    Redflags real-time security awareness


  • Cyber Essentials is a simple but effective, Government backed scheme that will help you to protect your organisation, whatever its size, against a whole range of the most common cyber-attacks. Cyber-a ...
  • R-Secure is our range of cyber security tools which are available from Red Circles. Protect your business infrastructure with managed security solutions. Security services span your endpoints, busines ...
Register for a FREE pass!

Register for a FREE pass!

What's included in your FREE pass?

  • Network face-to face with the leading UK cyber security brands.
  • Source the latest products vital to protecting your business.
  • Engage with accredited content addressing key cyber security issues.
  • Free access to 5 other leading industry events including The Security Event, The Fire Safety Event, The Health & Safety Event, The Facilities Event and The Emergency Services Show.
  • Free parking for all visitors!