Skip to main content
NCSS 2023

8 -10 APRIL 2025

NEC BIRMINGHAM

Exhibitor Products

xxx

Exhibitor Products

Loading
  • Email Guard

    08 Apr 2024 Joanne Nelson

    Protect your company and brand against email fraud with Email Guard.

    Ensure your organisation is compliant with the latest standards in email encryption and authentication.

  • File Guard

    08 Apr 2024 Joanne Nelson

    ACDS' File Guard was developed from open-source code used by the UK government and the National Cyber Security Centre (NCSC). Further development has ensured that the product is enterprise-grade, for a seamless and intuitive customer experience. The product has the capability to scale and can be easily deployed by IT/security teams, with a clear and concise view and accessible interface.

  • Attack Surface Management

    08 Apr 2024 Joanne Nelson

    Proven to flag the most critical vulnerabilities that other enterprise solutions can not, with better data coverage and fewer false positives.

  • As cyber-attacks continue to increase in frequency and sophistication, underwriters are being much more cautious when it comes to cyber insurance. Fuelled by data which suggests certain risk controls ...
  • The Cyber Assessment Framework (CAF) was developed by the National Cyber Security Centre (NCSC) to ensure the reliability and security of network and information systems for essential functions. This ...
  • Many businesses are worried about their website’s vulnerabilities. But how many are actually aware of what their cyber weaknesses are? If you’re unsure about how protected your website is, then you’ve come to the right place.

     

  • How comprehensive is your cyber security policy review? Now, we want you to think about how detailed the cyber security section of it is?

    Whether you have the most detailed policy or not, we will have a look over it and assess where your weaknesses may lie. This assessment will show you where you do (or don’t!) need to improve. It will also help you protect yourself from cyber crime and the unfortunate backlash for victims of it.

  • Your employees are one of your first lines of defence against a cyberattack.

    Do you and the people around you know how to spot a phishing email? Do you understand what malware is?

    Whether the answer to these questions is yes or no, surely a little extra training could be beneficial ? Especially if it helps protect your business from a potentially devastating cyberattack.Our cyber security  training is personally delivered and tailored to you. 

  • Do you have plans in place if a fire broke out in your home? Have you ever thought about what you’d do in the event of a break in? Maybe you’ve got a plan of action prepared for these kinds of scenarios. 

    The important question is – have you prepared for a hypothetical cyberattack just as thoroughly?

  • How often have you gotten a new techy toy (new laptop anybody?) & immediately reached for the set up?

    Now think about doing that with a burglar alarm, or new security system. Scary right? So why is your new tech any different?

    ​Our ethical hackers can test the systems you’ve set up to see whether your company has been left wide open to a cyber-attack.

    ​Isn’t it better for this to be tested by someone you trust, rather than a criminal?

    ​Please contact us for more information.

  • How often have you gotten a new techy toy (new laptop anybody?) & immediately reached for the set up?

    Now think about doing that with a burglar alarm, or new security system. Scary right? So why is your new tech any different?

    ​Our ethical hackers can test the systems you’ve set up to see whether your company has been left wide open to a cyber-attack.

    ​Isn’t it better for this to be tested by someone you trust, rather than a criminal?

    ​Please contact us for more information.

  • Have you ever considered the safety of your online activity and searches? Whether you are searching for ‘cute pet names’ or online banking, everything you do online leaves a digital footprint. At the NEBRC, we think it is important that you know the impact of your online presence and recognise the risk of the information you expose online.

  • Have you ever considered the safety of your online activity and searches? Whether you are searching for ‘cute pet names’ or online banking, everything you do online leaves a digital footprint. At the NEBRC, we think it is important that you know the impact of your online presence and recognise the risk of the information you expose online.

  • Redkey USB Ultimate Edition: Certified Comprehensive Data Wipe, Portable USB Software, Unlimited, Lifetime Updates, No Fees, Extends to PCs, Laptops, Apple & Android Devices.

     

  • Redkey USB Professional Edition: Certified Data Erasure with Reporting, Portable USB Software, Unlimited, Lifetime Updates, No Fees, for PCs & Laptops, Includes PDF Reports.

  • Redkey USB Home Edition: Certified & Easy Data Wipe, Portable Software on USB, Unlimited, Lifetime Updates, No Fees, for PCs & Laptops.

  • Our free Core Membership includes a range of benefits to help protect businesses of any size and sector against online crime and fraud.
  • We work with you to make sure our training and corporate campaigns fit with your company's culture, tone, branding and ways of working.

  • 40 short, interactive, impactful courses covering HR, Cyber Security, Compliance and Data Protection.

  • Our range of short, bright comics deliver what you and your colleagues need to know using colourful images and simple language.

  • Who hacked Melissa McCarthy? Use your detection skills to solve the mystery from home!

  • Our range of sci-fi games explain key cyber threats, including Revenge of the Phish, Attack of the Phones, The Phantom Hacker 
    and many more!

  • Can you solve the missing data crisis before your order is shipped?

  • You're in even bigger trouble. Do have what it takes to stop the Hack Widow's web of threats?

  • Immerse yourself in an adreneline rush of team playing action against the clock where you'll learn to be cyber safe along the way.

  • Our MDR service offers a 24/7 proactive threat detection, hunting and response capability that identifies and contains cyber threats in near real-time. 

  • Legacy intrusion detection systems (IDS) can be effective at making signature-based detections and spotting explicit attack signals, but what happens when the attack signal is weak, low-amplitude, or subtle? These indicators can easily be missed by the IDS, because the IDS lacks the fundamental mechanisms needed to analyze the activities that generate these signals.

  • Suricata is a high-performance network threat detection, IDS, IPS and network security monitoring (NSM) engine. It is open source and owned by a community-run nonprofit foundation, the Open Information Security Foundation (OISF). Suricata is developed by OISF, its supporting vendors and a passionate community of volunteers.

  • The nature of large central banks, managing the currency and monetary policies for a country or group of countries, makes them especially attractive targets for criminal gangs and state-sponsored attacks. As cyberattacks on financial institutions continue, the need to rapidly respond to serious threats is of vital importance. 

  • To effectively detect and quickly respond to threats that can lead to a major incident, organizations need an innovative solution that goes beyond the capabilities of legacy network security tools. Network detection and response (NDR) is that solution.

  • The requirement for network security controls has most commonly been addressed by intrusion detection and prevention systems IDS/IPS which have been widely deployed - and widely disliked. And widely ignored. These legacy IDS/IPS are disliked for a number of very legitimate reasons. 

  • The network does not lie. In fact, the network holds the ground truth for an enterprise’s security posture. Even as more organizations shift to cloud-based resources, encrypted transmission, and remote workforces, nearly all cyber threats generate communications that can be observed on the network.

  • Stamus Security Platform is a broad-spectrum, open network-based threat detection and response (NDR) system that delivers actionable network visibility and threat detection.

  • Managed SOC

    09 Mar 2023 Mark Rennie

    Our SOC is a flexible security service that is a managed extension of your organisation’s internal team, acting as a security partner that is dedicated to keeping your organisation and assets safe.

  • Managed Risk

    03 Mar 2023 Arctic Wolf

    Arctic Wolf® Managed Risk enables you to define and contextualize your attack surface coverage across your networks, endpoints, and cloud environments; provides you with the risk priorities in your environment; and advises you on your remediation actions to ensure that you benchmark against configuration best practices and continually harden your security posture.

  • Managed Security Awareness

    03 Mar 2023 Arctic Wolf

    Arctic Wolf Managed Security Awareness is more than training. We don’t rely only on training tools to change employee behavior. To be effective, security awareness training requires a holistic approach that includes teaching, testing, and tracking progress toward defined goals. The outcome of an effective awareness program results in fewer incidents related to phishing and human error, and builds stronger cyber resilience across your organization.

  • Managed Detection and Response

    03 Mar 2023 Arctic Wolf

    The Arctic Wolf Managed Detection and Response solution eliminates alert fatigue and false positives to promote a faster response with detection and response capabilities tailored to the specific needs of your organization. Your Arctic Wolf Concierge Security Team works directly with you to perform threat hunting, incident response, and guided remediation, while also providing strategic recommendations uniquely customized for your environment.

  • Reduce the Threat of a Phishing Attack by up to 80%.

  • Prioritise your cyber security roadmap and related investments according to your greatest areas of risk and the potential impact. 

  • Get Visibility of Your Cyber Security.

  • Get accredited. Be compliant. Achieve the highest standard of information security.

  • Stop Breaches Before They Happen.

  • Complete 24/7/365 Protection for Your Business.

  • Compliance Services

    21 Feb 2023 Mark Rennie

    We are experts in assisting organisations in achieving compliance through numerous legislative, regulatory and industry body compliance frameworks.

  • Incident Response

    21 Feb 2023 Mark Rennie

    Our experienced Cyber Incident Response Team is committed to helping you at every stage of the incident response lifecycle. From preparationthrough to eradication, remediation, and lessons learnt.

  • Managed Vulnerability Scanning

    21 Feb 2023 Mark Rennie

    Our Managed Vulnerability Service is proactive, threat-led, and uses the market leading Tenable One solution.

  • Threat Intelligence

    21 Feb 2023 Mark Rennie

    Our Cyber Threat Intelligence (CTI) Service, ThreatWatcher, scours millions of digital data points, alerting you to risks in the wild so you can take action before they have the chance to impact your business.

  • Penetration Testing

    21 Feb 2023 Mark Rennie

    Stay one step ahead of attackers with our penetration testing services. Get a real-world view of your vulnerabilities, and develop strategies designed to strengthen your security posture.

  • Understand the status of your security culture from a single human risk and cyber security dashboard. Identify and address potential threats before they take hold in your organization.

  • Phishing simulations that help your workforce understand, detect and neutralize threats. Lower threat response time by transforming employees into active defenders with safer behaviors.

  • Behavioral science-based training delivering personalized learning experiences through cyber security e-learning content that’s engaging and interactive. Each learning moment builds stronger security habits.

  • KMSAT

    17 Jan 2023 KnowBe4

    Security Awareness Training and Simulated Phishing Platform.
    Helps you manage the ongoing problem of social engineering!

  • Compliance Plus

    17 Jan 2023 KnowBe4

    Finally, you can deliver employee compliance training that is engaging, relevant and makes learning fun!
    Compliance Plus is new-school compliance training at a no-brainer price.

  • PhishER

    17 Jan 2023 KnowBe4

    Identify and respond to email threats faster with PhishER.

  • Security Coach

    17 Jan 2023 KnowBe4

    Deliver Real-Time Coaching in Response to Risky User Behaviour.
    Improve the overall security culture and reduce risk!

     

The Safety & Security Event Series

FSEHSENational Cyber Security ShowPSO LiveTSEThe Workplace Event