What We Do
We partner with some of the leading cyber security vendors in the world, to offer a range of best-in-class complementary security solutions for your Microsoft environment.
Carbonite – Backup for Office 365
Carbonite Backup for Office 365 picks up where native tools leave off. Carbonite Backup for Office 365 captures changes in Office 365 applications and replicates them to a secondary instance in Microsoft Azure. The solution runs automatically up to four times per day, or every six hours.
When it’s time to recover, you can perform granular and full fidelity restore of Office 365 content. Use simple search to recover content from Teams (channels, conversations and content), SharePoint, Email, Calendar and OneDrive. Restore based on owner, subject line, content type and more.
Databarracks – Business Continuity
There are lots of independent companies in the UK that offer a Data Backup and Restoration Service. There are only a very small handful, that have built their entire businesses around data integrity, recovery and continuity.
Since 2003 Databarracks have offered a comprehensive 24/7/365 data backup, restoration and continuity service, utilising enterprise-grade Software and a military-grade underground data centre. Softwerx has been working with Databarracks for ten years.
Duo – Multi-Factor Authentication
For organisations of all sizes that need to protect sensitive data at scale, Duo’s trusted access solution is a user-centric zero-trust security platform for all users, all devices and all applications.
There’s no easier way to use multi-factor authentication. Designed for the modern workforce and backed by a zero-trust philosophy, Duo is the user-friendly, scalable way to keep your business ahead of ever-changing security threats.
Exonar – Data Discovery
Exonar’s world-leading data discovery software Reveal builds a powerful index of information of all types that is instantly accessible in a single pane of glass. This extends the data ‘scanning’ capabilities that Microsoft solutions offer.
The additional capacity and scope of visible data in Exonar Reveal provides an opportunity to harness and protect data like never before.
Fortinet – Next Generation Firewalls
FortiGate next-generation firewalls (NGFWs) utilise purpose-built security processors and threat intelligence security services from AI-powered FortiGuard labs to deliver top-rated protection, high performance inspection of clear-texted and encrypted traffic.
Next-generation firewalls reduce cost and complexity with full visibility into applications, users and networks and provides best of breed security.
F-Secure – Vulnerability Scanning
F-Secure Radar is a turnkey vulnerability scanning and management platform. It allows you to identify and manage both internal and external threats, report risks, and be compliant with current and future regulations (such as PCI and GDPR compliance).
It gives you visibility into shadow IT – to map your full attack surface and respond to critical vulnerabilities associated with cyber threats.
Mimecast – Email Security for Office 365
Mimecast’s Advanced Email Security with Targeted Threat Protection uses multiple, sophisticated, detection engines and a diverse set of threat intelligence sources to protect email from spam, malware, phishing, and targeted attacks delivered as a 100% cloud-based service.
The Mimecast services defend against email-borne impersonation attempts, malicious URLs and attachments, threats that are internal to the organisation, as well as attacks from the inside destined for external recipients.
Knowbe4 – Security Awareness Training
Most cyber-attacks still (successfully) rely on your employees, inadvertently opening or downloading malware to your network. A formal approach to security awareness training (SAT) should be an integral part of your Cyber Security posture.
Classroom based security training is largely expensive and ineffective. In the Gartner Magic Quadrant for Security Awareness CBT, Knowbe4 is recognised and positioned as highest for ability to execute and furthest for completeness vision (access the full report here).
SecureEnvoy – Data Loss Prevention for Office 365
SecureIdentity DLP provides the identity of the user, the device and the data they are working on so you can prove exactly who is doing what at any time. The intelligence will provide detailed context and behavioural analysis of the user, the device and the data they interact with.
This ensures compliance within the corporate policy, reduction of risk of fines and protection of your vital intellectual property and business assets.
Thycotic – Privileged Access Management
Thycotic offers the only enterprise-grade PAM solution available both in the cloud and on-premise. Cloud-based, enterprise-grade PAM-as-a-Service option allows larger organisations to scale efficiently at speed.
Privileged Access Management from Thycotic allows organisations to discover, manage, provision, and delegate access to all privileged accounts from a central dashboard.
A Secret Server option also allows an organisation to establish a secure, encrypted and centralised vault where privileged credentials can be stored.
Webroot – Endpoint Protection
Webroot business endpoint protection was the first next-generation, fully cloud-based endpoint security solution to harness the power of machine learning to continuously monitor and adapt endpoint threat detection, protection, and prevention.
It defends many different types of physical and virtual systems and their users against modern, multi-vector threats. By taking a predictive, adaptive, multi-layered approach to stopping attacks in real time, Webroot business endpoint protection offers a faster and significantly more effective alternative to traditional business antivirus solutions.
Zscaler – Internet Access for Office 365
Zscaler Internet Access is a Secure internet and Web Gateway delivered from the cloud. Offered as a service from the world’s largest security cloud, Zscaler Internet Access provides a full security stack with all the in-depth protection you’ll ever need.
Zscaler enables direct-to-cloud access for Microsoft Office 365. This is achieved by enabling organizations to send traffic directly to application servers over the internet, instead of backhauling traffic over costly MPLS circuits.