Our business began in 2014, building on over 30 years of hands on cyber security experience.
Frustrated with fundamental flaws they were encountering within the security reseller channel; our leadership team felt a ‘Technology First’ approach to reselling would resonate with customers.
This approach saw Pentesec become the fastest growing reseller worldwide with Check Point Technologies, achieving back to back promotions within their partner program and attracting partnerships from a much broader pool of tier one security vendors.
Our customers span all sectors including Global Financial Institutes, Major Retail, Legal, Central UK Government, NHS, County and Local Councils, Manufacturing and Utilities.
We work with vendors spanning the entire threat landscape, dedicating our security consultants time to mastering the products we sell so we can ensure they integrate into your business smoothly and you see the full benefits of using them.
We also have a dedicated vendor team who seek out emerging technologies to help us meet the evolving needs of our most security conscious customers.
To find out more, please explore our website and get in touch with any questions. One of our experts will be delighted to help.
Application Security
F5’s solutions can be leveraged individually, or as a unified infrastructure. For software environments, the NGINX Platform is a suite of products that enable simplified application delivery and create reliable, high performance apps that scale. NGINX delivers software load balancing, application security and monitoring. Giving critical insight into your application performance and securing them against Layer 7 attacks.
Cloud Security
Check Point CloudGuard extends traditional Threat Prevention in to Cloud Environments, protecting them against all variants of attacks including viruses, bots, application attacks and zero-day threats. With rapid deployment and autoscaling capabilities, CloudGuard protects the cloud against sophisticated attacks.
Cyber Security Training
Content quality is assured through GCHQ and IISP accreditation. Each user receives a CybSafe Certificate in Cyber Awareness (CCSA) on training completion and CybSafe attracts CPD credits. In 2017, CybSafe research found that 44% of SMEs were required as part of contracts with enterprise customers to enlist cyber security precautions of a recognised standard such as ISO 27001.
DDoS attack protection
F5’s DDoS Hybrid Defender provides a greater depth of defence. It is the only multi-layered DDOS Prevention Solution that protects against blended network attacks and sophisticated application attacks, while enabling full SSL decryption, anti-bot capabilities and advanced detection methods—all in one appliance.
Email Security
Proofpoint’s Email Protection solution stops malware and non-malware threats such as impostor email or email fraud. Deployed as a cloud service or on-premises, their secure email service provides granular email filtering to control unwanted emails.
Endpoint Security
CrowdStrike are the leaders in cloud-delivered next-generation endpoint protection and have revolutionised endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR) and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon platform is flexible and extensible. Each module below is available on the Falcon platform and is implemented with a single endpoint agent and cloud-based management console.
Firewall Security
F5’s Advanced WAF can identify and block attacks that other WAF solutions miss. Protect your apps with behavioural analytics, proactive bot defence, and application-layer encryption of sensitive data.
Infrastructure Security
Proactive and knowledge driven, with the power to help keep your security infrastructure working as intended, Indeni provides a unique platform that optimises and accelerates your security operations and, ultimately, your mission critical initiatives, with confidence. Delivering production-ready knowledge, continuously curated from vetted, community sourced experience, Indeni generates predictive, prioritised and actionable insights that help to prevent costly disruptions. Indeni analyses over 2 billion data points daily, contains over 500 automation modules to integrate into your security infrastructure and has been implemented in over 120 Global Enterprise Businesses. Indeni delivers unprecedented visibility and gives you confidence in your infrastructure’s health like you have never
Mobile Security
Check Point SandBlast Mobile is an innovative approach to mobile security for iOS and Android devices which detects and stops mobile threats before they start. Whether your data’s at rest on a device or in flight through the cloud, Sandblast Mobile helps protect you from vulnerabilities and attacks that put data at risk.
Penetration Testing
Cymulate’s platform comprehensively exercises your defences with the industry’s widest range of attack vectors, providing an Advanced Persistent Threat (APT) simulation of your security posture at all times. Test your network’s ability to cope with pre-exploitation-stage threats in Email, Browsing, and WAF. You can analyse your ability to respond to real incidents with our post-exploitation modules like Hopper, Endpoint and Data Exfiltration. Assess and improve awareness among employees against phishing, ransomware and other attacks. Gain a clear picture of your vulnerabilities from every point of exposure and learn what will really happen when you are attacked.
Value-added reseller
A specialist Check Point technical partner for Firewall (including VSX and Maestro/Scalable Platform), Endpoint, Sandblast Mobile, CloudGuard and Multi-Domain Management (MDM) solutions on R80. Certified in-house Technical Support Services for all Check Point products. Authorised Training Centre for all accredited training courses.
Vulnerability Management
Starting with Nessus, Tenable created the world’s most widely deployed vulnerability assessment solution. Nessus helps security professionals quickly and easily identify and fix vulnerabilities across a variety of systems, devices and applications. While useful for understanding your cyber exposure gap, Vulnerability Assessment tools are not thorough enough for the modern attack surface. As such, Tenable have developed a platform which focuses on cyber exposure across the modern attack surface. Tenable Cyber Exposure Platform provides dynamic and holistic visibility across the modern attack surface; translates raw vulnerability data into business insights to help security teams prioritise and focus remediation based on business risk; and provides a high-level way to objectively measure c
Web Security
Forcepoint Web Security offers advanced, real-time threat defence that is content aware and focuses on people’s behaviour. Forcepoint’s behaviour-based solutions adapt to risk in real time and are delivered via a converged security platform to protect network users and cloud access, prevent confidential data from leaving the corporate network, and eliminate breaches caused by insiders. Based in Austin, Texas, Forcepoint protect thousands of enterprise and government customers in more than 150 countries.