Skip to main content
NCSS 2023

30 APRIL - 2 MAY 2024
NEC BIRMINGHAM

Exhibitor Products

National Cyber Security Show

Exhibitor Products

Loading
  • Email Guard

    08 Apr 2024 Joanne Nelson

    Protect your company and brand against email fraud with Email Guard.

    Ensure your organisation is compliant with the latest standards in email encryption and authentication.

  • File Guard

    08 Apr 2024 Joanne Nelson

    ACDS' File Guard was developed from open-source code used by the UK government and the National Cyber Security Centre (NCSC). Further development has ensured that the product is enterprise-grade, for a seamless and intuitive customer experience. The product has the capability to scale and can be easily deployed by IT/security teams, with a clear and concise view and accessible interface.

  • Attack Surface Management

    08 Apr 2024 Joanne Nelson

    Proven to flag the most critical vulnerabilities that other enterprise solutions can not, with better data coverage and fewer false positives.

  • The Nanitor Continuous Threat Exposure Management (CTEM) platform represents a cutting-edge approach in cybersecurity, aiming to fortify organizations against the evolving landscape of cyber threats. By leveraging continuous monitoring and comprehensive integration capabilities, the platform offers an adaptive, real-time solution to identify, assess, and mitigate vulnerabilities and threats across an organization's digital footprint.

  • AT-RACK Mobile Data Shredder (MDS)

    04 Mar 2024 AT-RACK PRODUCTS

    The Mobile Data Shredder (MDS) from AT-RACK is a precision-engineered Shredder that safely eliminates a variety of media with the push of a button, including SSDs, Flash Drives, Cell Phones, CDs/DVDs/Blue-Ray, Credit Cards, Hard Drive - platter only.

    The Mobile Data Shredder (MDS), which shreds materials to less than 4mm in width, guarantees complete media destruction for users across a variety of industries.

  • Zerto overview

    01 Mar 2024 Zerto HPE

    True Continuous Data Protection

    Manage, protect, recover, and move data and applications across on-premises or any cloud.

    24-7 access to your data and applications with near-zero data loss or downtime.

    Take the complexity out of data protection with our software-only solution and its always-on replication: no performance-sapping snapshots, no messing with agents, and no micromanaging backup windows. Simply Zerto, simply protected.

  • As cyber-attacks continue to increase in frequency and sophistication, underwriters are being much more cautious when it comes to cyber insurance. Fuelled by data which suggests certain risk controls ...
  • The Cyber Assessment Framework (CAF) was developed by the National Cyber Security Centre (NCSC) to ensure the reliability and security of network and information systems for essential functions. This ...
  • Networking and cybersecurity leaders are challenged by their organizations to enable fast, secure ability for employees to work from anywhere, securely leverage the cloud to enable business, all while reducing organizational cost and risk.

  • Networking and cybersecurity leaders are challenged to enable fast, secure access to resources for employees working from anywhere, to securely leverage the cloud to enable business, and to reduce cost and risk.

    Secure access service edge (SASE) solves these problems by consolidating networking and security into a single cloud-delivered fabric.

    Open Systems Managed SASE is a comprehensive, unified and easy-to-use single vendor SASE solution.

  • Open Systems Managed SASE Reduces Complexity and Costs

    Open Systems Managed SASE eliminates appliance purchase, installation, and maintenance, and eliminates the need for costly MPLS and VPN solutions. SASE replaces legacy security with always-on secure network access. As a managed service, it maximizes cybersecurity staff productivity.

  • Open Systems as your SASE Transformation Partner

    Open Systems has been supporting companies for more than 20 years as a true SASE transformation partner. Not only with a comprehensive breadth of supported transformations – ranging from network to security – but also with a unique depth to their provision. We leverage our own infrastructure and SASE technology to craft our end‑to‑end managed services for an outstanding customer experience – the Open Systems SASE Experience.

  • Secure Access Today and Tomorrow
    Open Systems SASE Experience eliminates complexity of secure global access and network management, while providing easy and comprehensive global support. Simply put, Open Systems provides a better user experience while enabling secure global access to anyone, anywhere so customers can focus on other business priorities.

  • 365 Permission Manager

    Elevate your compliance for Microsoft 365

    • GET A USER-FRIENDLY PERMISSION OVERVIEW
    • DEFINE SHARING POLICIES
    • IDENTIFY & AUDIT VIOLATIONS

    File permission management in Microsoft 365 made easy

  • Security Awareness Service

    Automated. Continuous. Effortless.

     

    Establish your sustainable security culture with a Service that is fully automated and continuously customized to your employees’ awareness level

  • It doesn’t get more comprehensive than this. 365 Total Protection Compliance & Awareness is the biggest cloud solution in one license for Microsoft 365 that keeps all your flanks covered: email security, backup and recovery, compliance, and security awareness.

  • Vicarius

    07 Mar 2024 Al

    Vicarius, headquartered in New York and supported by top Silicon Valley investors, offers vRx, an end-to-end vulnerability remediation platform designed by security experts to safeguard critical applications and assets against software exploitation. By proactively reducing risk and efficiently addressing threats, Vicarius enables security and IT teams to allocate resources effectively while maintaining robust security measures.

  • Lupovis Prowl

    06 Mar 2024 Xavier Bellekens

    Uncovering signals in internet’s noise and obtain global intelligence.

  • Lupovis Snare

    06 Mar 2024 Xavier Bellekens

    Lupovis defends your infrastructure from rogue employees, attackers or malware by deploying high-fidelity decoy within your infrastructure for high-alert fidelity and outside your infrastructure for 24/7 actionable threat intelligence.

  • Many businesses are worried about their website’s vulnerabilities. But how many are actually aware of what their cyber weaknesses are? If you’re unsure about how protected your website is, then you’ve come to the right place.

     

  • How comprehensive is your cyber security policy review? Now, we want you to think about how detailed the cyber security section of it is?

    Whether you have the most detailed policy or not, we will have a look over it and assess where your weaknesses may lie. This assessment will show you where you do (or don’t!) need to improve. It will also help you protect yourself from cyber crime and the unfortunate backlash for victims of it.

  • Your employees are one of your first lines of defence against a cyberattack.

    Do you and the people around you know how to spot a phishing email? Do you understand what malware is?

    Whether the answer to these questions is yes or no, surely a little extra training could be beneficial ? Especially if it helps protect your business from a potentially devastating cyberattack.Our cyber security  training is personally delivered and tailored to you. 

  • Do you have plans in place if a fire broke out in your home? Have you ever thought about what you’d do in the event of a break in? Maybe you’ve got a plan of action prepared for these kinds of scenarios. 

    The important question is – have you prepared for a hypothetical cyberattack just as thoroughly?

  • How often have you gotten a new techy toy (new laptop anybody?) & immediately reached for the set up?

    Now think about doing that with a burglar alarm, or new security system. Scary right? So why is your new tech any different?

    ​Our ethical hackers can test the systems you’ve set up to see whether your company has been left wide open to a cyber-attack.

    ​Isn’t it better for this to be tested by someone you trust, rather than a criminal?

    ​Please contact us for more information.

  • How often have you gotten a new techy toy (new laptop anybody?) & immediately reached for the set up?

    Now think about doing that with a burglar alarm, or new security system. Scary right? So why is your new tech any different?

    ​Our ethical hackers can test the systems you’ve set up to see whether your company has been left wide open to a cyber-attack.

    ​Isn’t it better for this to be tested by someone you trust, rather than a criminal?

    ​Please contact us for more information.

  • Have you ever considered the safety of your online activity and searches? Whether you are searching for ‘cute pet names’ or online banking, everything you do online leaves a digital footprint. At the NEBRC, we think it is important that you know the impact of your online presence and recognise the risk of the information you expose online.

  • Have you ever considered the safety of your online activity and searches? Whether you are searching for ‘cute pet names’ or online banking, everything you do online leaves a digital footprint. At the NEBRC, we think it is important that you know the impact of your online presence and recognise the risk of the information you expose online.

  • Kivu’s Managed Security Services protect your company in real-time, providing agile protection, detection, and blocking of modern cyberattacks.

  • Cybersecurity threats continue to rise and your business can’t afford to be exposed. Kivu’s Advisory Services take you beyond reactive security measures with a proactive approach to cybersecurity.

  • If you’re impacted by a cyberattack, you need speed and expertise on your side. With Kivu’s 24/7 Response Services, you get immediate support from world-class experts backed by digital forensics.

  • Redkey USB Ultimate Edition: Certified Comprehensive Data Wipe, Portable USB Software, Unlimited, Lifetime Updates, No Fees, Extends to PCs, Laptops, Apple & Android Devices.

     

  • Redkey USB Professional Edition: Certified Data Erasure with Reporting, Portable USB Software, Unlimited, Lifetime Updates, No Fees, for PCs & Laptops, Includes PDF Reports.

  • Redkey USB Home Edition: Certified & Easy Data Wipe, Portable Software on USB, Unlimited, Lifetime Updates, No Fees, for PCs & Laptops.

  • Our free Core Membership includes a range of benefits to help protect businesses of any size and sector against online crime and fraud.
  • We work with you to make sure our training and corporate campaigns fit with your company's culture, tone, branding and ways of working.

  • 40 short, interactive, impactful courses covering HR, Cyber Security, Compliance and Data Protection.

  • Our range of short, bright comics deliver what you and your colleagues need to know using colourful images and simple language.

  • Who hacked Melissa McCarthy? Use your detection skills to solve the mystery from home!

  • Our range of sci-fi games explain key cyber threats, including Revenge of the Phish, Attack of the Phones, The Phantom Hacker 
    and many more!

  • Can you solve the missing data crisis before your order is shipped?

  • You're in even bigger trouble. Do have what it takes to stop the Hack Widow's web of threats?

  • Immerse yourself in an adreneline rush of team playing action against the clock where you'll learn to be cyber safe along the way.

  • Degaussing - wipe and erase

    Physical Destruction

    Certificate of Destruction - internal audit and regulatory compliance documentation

  • The Maritime Cyber Baseline scheme is designed to certify the cyber security of all commercial vessels and is accessible to operators and vessels of all sizes from across the world. The scheme will al ...
  • Our Managed SASE service protects your workforce with true Zero Trust Network Access (ZTNA) and, by using the same platform for your security and branch networking, we can help you to scale as quickly as your organisation needs to, all whilst ensuring exceptional user experience.

  • Our team work with yours to make sure threats are quickly contained and eradicated, allowing you to recover and learn from the incident, getting back to work fast, with minimal disruption to your organisation.

  • The Socura Managed Vulnerability Scanning (MVS) service complements our MDR service by helping to identify, prioritise and remediate vulnerabilities in your business-critical assets, whether on-premises or in the cloud.

  • Our MDR service offers a 24/7 proactive threat detection, hunting and response capability that identifies and contains cyber threats in near real-time. 

  • Legacy intrusion detection systems (IDS) can be effective at making signature-based detections and spotting explicit attack signals, but what happens when the attack signal is weak, low-amplitude, or subtle? These indicators can easily be missed by the IDS, because the IDS lacks the fundamental mechanisms needed to analyze the activities that generate these signals.

  • Suricata is a high-performance network threat detection, IDS, IPS and network security monitoring (NSM) engine. It is open source and owned by a community-run nonprofit foundation, the Open Information Security Foundation (OISF). Suricata is developed by OISF, its supporting vendors and a passionate community of volunteers.

  • The nature of large central banks, managing the currency and monetary policies for a country or group of countries, makes them especially attractive targets for criminal gangs and state-sponsored attacks. As cyberattacks on financial institutions continue, the need to rapidly respond to serious threats is of vital importance. 

  • To effectively detect and quickly respond to threats that can lead to a major incident, organizations need an innovative solution that goes beyond the capabilities of legacy network security tools. Network detection and response (NDR) is that solution.

  • The requirement for network security controls has most commonly been addressed by intrusion detection and prevention systems IDS/IPS which have been widely deployed - and widely disliked. And widely ignored. These legacy IDS/IPS are disliked for a number of very legitimate reasons. 

  • The network does not lie. In fact, the network holds the ground truth for an enterprise’s security posture. Even as more organizations shift to cloud-based resources, encrypted transmission, and remote workforces, nearly all cyber threats generate communications that can be observed on the network.

  • Stamus Security Platform is a broad-spectrum, open network-based threat detection and response (NDR) system that delivers actionable network visibility and threat detection.

  • Our Philosophy - Solving the cyber security effectiveness problem As cyber threats continue to evolve, investing in generic services and off-the-shelf products leaves organisations exposed by failing ...
  • Enabling Effective Cyber Security

    15 Mar 2023 Donna Stobart-Hook
    Solving the Cyber Security Effectiveness problem. As cyber threats continue to evolve, investing in generic services and off-the-shelf products leaves organisations exposed by failing to deliver the s ...
  • Special courses in secure coding

    13 Mar 2023 SCADEMY Ltd.

    Our unique courses focus on specific topics considering industry-specific needs, whether it is connected to the Banking or Automotive industry. These courses can also be later combined for pathways programs to build a road to a secure organization. 

  • Standard courses in secure coding

    13 Mar 2023 SCADEMY Ltd.

    SCADEMY's standard courses cover the common vulnerabilities in major coding languages, such as Java, C#, and C and C++.

  • Fundamental courses in secure coding

    01 Aug 2021 SCADEMY Ltd.

    Our secure coding fundamentals courses are available for companies wishing to give their developers a basic security mindset.

  • The course teaches leveraging AI technologies to improve software development workflows and processes. Participants will gain practical knowledge of AI tools and techniques to enhance productivity and efficiency. The course covers prompt engineering, market research, design, code generation, testing, and debugging.

  • New Course: Quantum Communication

    01 Mar 2023 SCADEMY Ltd.

    As the field of quantum communication continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunities it presents.

  • As the field of quantum computing continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunities it presents.

  • Managed SOC

    09 Mar 2023 Mark Rennie

    Our SOC is a flexible security service that is a managed extension of your organisation’s internal team, acting as a security partner that is dedicated to keeping your organisation and assets safe.

  • Managed Risk

    03 Mar 2023 Arctic Wolf

    Arctic Wolf® Managed Risk enables you to define and contextualize your attack surface coverage across your networks, endpoints, and cloud environments; provides you with the risk priorities in your environment; and advises you on your remediation actions to ensure that you benchmark against configuration best practices and continually harden your security posture.

  • Managed Security Awareness

    03 Mar 2023 Arctic Wolf

    Arctic Wolf Managed Security Awareness is more than training. We don’t rely only on training tools to change employee behavior. To be effective, security awareness training requires a holistic approach that includes teaching, testing, and tracking progress toward defined goals. The outcome of an effective awareness program results in fewer incidents related to phishing and human error, and builds stronger cyber resilience across your organization.

  • Managed Detection and Response

    03 Mar 2023 Arctic Wolf

    The Arctic Wolf Managed Detection and Response solution eliminates alert fatigue and false positives to promote a faster response with detection and response capabilities tailored to the specific needs of your organization. Your Arctic Wolf Concierge Security Team works directly with you to perform threat hunting, incident response, and guided remediation, while also providing strategic recommendations uniquely customized for your environment.

  • Reduce the Threat of a Phishing Attack by up to 80%.

  • Prioritise your cyber security roadmap and related investments according to your greatest areas of risk and the potential impact. 

  • Get Visibility of Your Cyber Security.

  • Get accredited. Be compliant. Achieve the highest standard of information security.

  • Stop Breaches Before They Happen.

  • Complete 24/7/365 Protection for Your Business.

  • Compliance Services

    21 Feb 2023 Mark Rennie

    We are experts in assisting organisations in achieving compliance through numerous legislative, regulatory and industry body compliance frameworks.

  • Incident Response

    21 Feb 2023 Mark Rennie

    Our experienced Cyber Incident Response Team is committed to helping you at every stage of the incident response lifecycle. From preparationthrough to eradication, remediation, and lessons learnt.

  • Managed Vulnerability Scanning

    21 Feb 2023 Mark Rennie

    Our Managed Vulnerability Service is proactive, threat-led, and uses the market leading Tenable One solution.

  • Threat Intelligence

    21 Feb 2023 Mark Rennie

    Our Cyber Threat Intelligence (CTI) Service, ThreatWatcher, scours millions of digital data points, alerting you to risks in the wild so you can take action before they have the chance to impact your business.

  • Penetration Testing

    21 Feb 2023 Mark Rennie

    Stay one step ahead of attackers with our penetration testing services. Get a real-world view of your vulnerabilities, and develop strategies designed to strengthen your security posture.

  • Brand Monitoring & Protection

    16 Feb 2023 Amelia Frizzell

    An effective brand monitoring strategy will help you regain control of your brand assets online. By adding brand protection into your risk management strategy, you can keep your critical assets and customers protected, and have confidence in the safety of your online identity.

  • Understand the status of your security culture from a single human risk and cyber security dashboard. Identify and address potential threats before they take hold in your organization.

  • Phishing simulations that help your workforce understand, detect and neutralize threats. Lower threat response time by transforming employees into active defenders with safer behaviors.

  • Behavioral science-based training delivering personalized learning experiences through cyber security e-learning content that’s engaging and interactive. Each learning moment builds stronger security habits.

  • KMSAT

    17 Jan 2023 KnowBe4

    Security Awareness Training and Simulated Phishing Platform.
    Helps you manage the ongoing problem of social engineering!

  • Compliance Plus

    17 Jan 2023 KnowBe4

    Finally, you can deliver employee compliance training that is engaging, relevant and makes learning fun!
    Compliance Plus is new-school compliance training at a no-brainer price.

  • PhishER

    17 Jan 2023 KnowBe4

    Identify and respond to email threats faster with PhishER.

  • Security Coach

    17 Jan 2023 KnowBe4

    Deliver Real-Time Coaching in Response to Risky User Behaviour.
    Improve the overall security culture and reduce risk!

     

  • Partner Resource Support

    09 Aug 2021 The Cyber Resilience Centre for the West Midlands
    This service provides student expertise in support of our partners with whom we are engaged under the terms of an MoU. Student’s will be provided to our Partners based on the technical skills requirem ...
  • Cyber Business Continuity Review

    09 Aug 2021 The Cyber Resilience Centre for the West Midlands
    This service offers a review of your business continuity planning and the resilience of your organisation to cyber-attacks such as ransomware or when attackers take control of your core systems. We us ...
  • Security Policy Review

    09 Aug 2021 The Cyber Resilience Centre for the West Midlands
    This service offers a review of your current security policy, how it is written and how it is implemented. We use key elements of the international information security management systems standard, ‘I ...
  • Web Application Vulnerability Assessment

    09 Aug 2021 The Cyber Resilience Centre for the West Midlands
    This service assesses your website and web services for weaknesses. Based on best practice industry standards we will assess the top 10 security risks to websites and attempt to identity vulnerabiliti ...
  • Internal Vulnerability Assessment

    09 Aug 2021 The Cyber Resilience Centre for the West Midlands
    This service requires access to your internal network and systems in order to simulate someone who has gained access from the internet or an insider threat from an employee.  The service will scan and ...
  • Remote Vulnerability Assessment

    09 Aug 2021 The Cyber Resilience Centre for the West Midlands
    If your organisation is connected to the internet, this service will remotely review that connection in the same way as an attacker would perform reconnaissance, looking for potential weaknesses. The ...
  • Individual Internet Discovery

    09 Aug 2021 The Cyber Resilience Centre for the West Midlands
    This service provides a comprehensive review of an individual's on-line presence, associations and what personal or private information is available publicly. Social media, news posts, on-line forums ...
  • Corporate Internet Discovery

    09 Aug 2021 The Cyber Resilience Centre for the West Midlands
    This service is focussed on providing a comprehensive review of publicly available information about an organisation. This service may be used to learn what is being said on the internet about an orga ...
  • Security Awareness Training

    09 Aug 2021 The Cyber Resilience Centre for the West Midlands
    Your people can be your biggest asset and with security awareness training they can become highly effective barriers to cyber-crime. Security awareness training provides simple and effective knowledge ...
  • A Build Configuration Security Review provides system administrators with a comprehensive overview of the security of their assets, whereby the local policies and settings of a device are examined to ...
  • Firewalls are designed to be the first line of defence against cyber attacks, making them a fundamental security system that all organisations should be reviewing on a regular basis. Upon initial inst ...
  • Secarma’s Cloud Configuration Security Review tests the configuration of the chosen cloud providers management interfaces for security misconfigurations. This should be considered a critical requireme ...
  • Modern organisations face a range of cybersecurity risks and whilst every effort may be made to prevent a breach, if one does occur an organisation must be prepared to respond to that breach quickly a ...
  • We teach your staff why and how cyber-criminals may target your organisation, and arm them with the skills to protect your business. You may have invested in the latest technology to keep your systems ...
  • We believe that all businesses, regardless of size should be given the opportunity to develop a thorough understanding of the risks they face. Our Cyber Security Maturity Assessment is an evaluation y ...
  • Developing and maintaining a robust cybersecurity posture can be challenging for organisations who don't have a full time Security Manager in-house. That's why we've developed our Virtual Information ...
  • Our Hacking & Defending Networks training course is designed to upskill your systems administrators by teaching them the tools and techniques we use when targeting network infrastructure; from zero ac ...
  • Our Hacking & Defending Web Apps training course is designed to upskill your web developers by taking them step by step through a web application pentest. This provides them with the hacker's point-of ...
  • Our core services are focused around in-depth manual penetration testing, but robust security also requires 24/7 Vulnerability Scanning. We partner with environment vulnerability scanning experts AppC ...
  • Wireless networks are a potential weak point in the corporate perimeter, and an enticing entry point for cybercriminals. If an attacker can gain access to one of your wireless networks (which may incl ...
  • The IASME IoT Cyber scheme certifies internet connected devices against the most important security controls and is available in two levels which can be assessed to different degrees of assurance.  Ce ...
  • IASME Cyber Assurance (previously known as IASME Governance) is our own comprehensive, flexible and affordable cyber security standard. Developed over several years during a government funded project, ...
  • Cyber Essentials is a simple but effective, government approved scheme. Businesses implement just five technical controls which have been proven to help defend them against most common cyber attacks / ...
  • Just as bespoke web apps can create paths in for threat actors, so can mobile applications. Our Mobile App Security Testing service finds vulnerabilities, exploits them, and is followed up with recomm ...
  • Need to know the security weaknesses in your Internet-facing IT systems? If your networks and servers (email servers, routers, or web servers that host e-commerce websites) need testing, book an Infra ...
  • Looking to test the security of your organisation's web apps? We offer a wide range of Web Application Penetration Tests; from simple security reviews of your CMS, to deep-dive assessments of bespoke ...
  • Cyber Awareness Programme

    16 Feb 2023 Amelia Frizzell

    Our Cyber-Awareness Programme is here to help gain control of human-risk, improve your cyber-maturity, and build a security culture which is ingrained into the ethos of your company.

  • Equilibrium are a Certification Body for The IASME Consortium, the Cyber Essentials Partner to the National Cyber Security Centre (NCSC). As one of the few assessors in the Birmingham area, we can offer Cyber Essentials, Cyber Essentials Plus, IASME Cyber Assurance and GDPR Readiness Assessments as a Certification Body

  • Ethical Hacking & Penetration Testing

    16 Feb 2023 Amelia Frizzell

    Here at Equilibrium, we are CREST accredited and OSCP certified penetration testing experts. The OSCP and CREST certifications are proven Cyber Security frameworks, which demonstrate that we have up to date knowledge of the latest penetration testing methodology, and the vulnerabilities and techniques used by real attackers.

  • Every business faces IT security challenges. The biggest of these for startup and scaleup companies is often putting information security leadership and oversight into place cost-effectively. 

  • Having the right controls in place to comply with PCI DSS can help organisations save significant time and resources in complying with other requirements. 

  • ISO 27001, 27701, 9001, 22301

    26 Jul 2021 Gemserv

    The ISO standards provides a framework for organisations to better protect information and take clear, informed and cost-effective decisions on security controls and risk mitigation.

The Safety & Security Event Series

FSEHSENational Cyber Security ShowPSO LiveTSEThe Workplace Event