Advanced Security Analytics and Response Orchestration

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services, empowering organizations with early warning and adaptive response capabilities against advanced cyber threats.


Learn More

Products

Built by experts in data analytics, cyber offensive techniques and cyber security operations, Enorasys platform effectively automates and streamlines the proactive threat hunting and incident handling processes


Learn More

Solutions

The ever changing cyber threat landscape is driving organisations to consider cybersecurity at a strategic level now. Board Directors are ethically, if not always legally accountable for data breaches, as well as often being personally the target of cyber attacks.


Learn More

Services

Harnessing cutting edge and proprietary technology with best of breed Cyber Security Operations and Services to augment your security capabilities for addressing advanced cyber threats


Learn More

Latest News

ENCODE awarded by IBM during its annual event dedicated to its Business Partners

ENCODE awarded by IBM for the successful promotion of advanced security solutions and more specifically for Advanced Fraud Protection (IBM Trusteer) which is provided as a SaaS.


Learn More

After the WannaCry ransomware campaign, why aren't people patching?

“Microsoft released a patch some time ago for the EternalBlue vulnerability but many of the organisations will not have deployed it yet for various reasons: they may be still testing the patch, they may be using ‘antiquated' versions of Microsoft operating system or simply have a policy of not applying patches to certain systems to avoid destabilisation.” by Graham Mann, Managing Director Encode UK


Learn More

The

A worm, known as "Petya" is ransomware, infecting machines around the world on an industrial scale. It's a massive attack, which affects a number of sectors, including; governments, shipping firms, petroleum manufacturers, hospitals, in numerous countries like; Ukraine, Spain, Denmark, Germany, Israel, UK, Netherlands etc. Specifically, in the Ukraine, where bus stations, banks, airport, and critical infrastructure has been affected.   


Learn More

Vault 7: WikiLeaks dumps reveal CIA's use of home router exploits

“Whilst one could argue that WikiLeaks provides a public duty in uncovering issues that would otherwise be kept secret, in regard to Vault 7 the disclosure is reckless,” Graham Mann, Managing Director ENCODE UK


Learn More

Arms race

“Using a single supplier for security is no longer the answer. The cyber security tendering system is broken and needs to be replaced urgently.” Graham Mann, MD, Encode UK


Learn More

Case Studies

Security Analytics

The client is a government department within an EU country that handles some of the most sensitive data for defining and enacting national policy. The department is situated within two sites; both highly secure from physical attacks and regularly welcome some of the most senior national and international governmental figures for meetings and presentations. The department has a small IT team that are all security cleared to deal with routine systems and application management but are not considered a dedicated InfoSec team. Following a change of senior leadership within the department, it was decided that information security processes needed to be strengthened and the department contacted Encode to instigate a review and then strengthen both technological controls and processes.


Learn More

Extrusion Test

To test its security posture against targeted cyber-attacks, a retail Bank contracted Encode to attempt to breach its network and gain control over their critical IT systems, through an Extrusion Testing™ engagement. The project resulted in the Encode Red Team establishing multiple entry points into the Bank’s network and gaining domain administrator access privileges through a combination of social engineering, vulnerability exploitation and enterprise account takeover techniques, commonly used in Advanced Persistent Threat type of attacks. The subsequent detailed report of the active attack simulation has allowed the Bank to mitigate critical vulnerabilities, improve security process and helped raise situational awareness among C-level executives on the Bank’s exposure against such threats.


Learn More

SIEM

Ranked consistently among the top 1% of the world's universities, Aberdeen is also one of Scotland’s largest with 16,500 students from a community of 120 nationalities. Teaching and research is primarily based at its Old Aberdeen and Foresterhill campuses which include the majority of Life Sciences and Medicine, Arts, Social Sciences, Physical Sciences. Aberdeen is also named as Scotland's safest University City according to the influential ‘Complete University Guide’ and that record also extends to secure IT Services that supports tens of thousands of users as well as spinout companies that have commercialising research of which it is the 6th most successful university in the UK. IT services also delivers and protects one of the largest wireless campuses in Europe as part of a strategy to continually improve student accommodation and facilities.


Learn More