cyber security

Cyber Security

Our advanced cyber security applications bring together select partner technologies and expert advice, support and training. 

Key areas we cover:
  • Breach & Attack Simulation
  • SIEM & User Behaviour Analysis
  • Penetration Testing
  • Zero Trust Security / Privileged Access Management
  • Cyber Security Awareness Education
  • Cyber Essentials Accreditation

Tell Me More

Access the matraXis download vault for our Discover. Analyse. Educate eBook and Partner Whitepapers 

Cyber Security home

SIEM & UEBA

To ensure that malicious or fraudulent activity is discovered and handled immediately LogPoint platform generates and delivers detailed statistics and alerts through clear and precise reports, and dashboards that are easily configured to fit your needs.

Bridge the gap between business applications and IT infrastructure and detect the most complex threats;
 Cyber Espionage - Track unauthorised network or system access linked to e.g. state-affiliated actors and/or exhibiting the motive of espionage.

 Denial of Service - Track attacks intended to compromise the availability of networks and systems or occurrences in which systems fail due to extremely high levels of activity.

 Insider Threats - Detect actions by malicious employees or others with corporate network access before confidential data and business assets are misused or damaged.

 Advanced Persistent Threats (APT) - Identify APTs which are notoriously difficult to trace and avoid the increasing cost of compromise by inspecting deviations from the norm.
Find out more . . . . .

Security Awareness User Training

Cyber criminals target your staff so it is important to assess how susceptible your staff are to phishing emails and SMS messages using highly sophisticated simulated engines that scale to the very largest enterprises.


Active monitoring increases the effectiveness of your training, as priority subjects are identified and in tun target training to the right users and measure and demonstrate the effectiveness of your programme over time.


Find out more . . . . .
Share by: