Accordant Security Solutions

Cyber Security Assessment

With the ever increasing sophistication of cyber security threats and the steep financial and reputational consequences of data breaches an overarching Cyber Assessment from Accordant can help you determine which threat vectors primarily apply to you allowing you to prioritise your defence spending.

Maximise the value from current deployments, reduce ongoing risk, target cyber defence spending and deliver measurable results.

Don’t guess, Assess.

Find Out More

Data Loss Prevention Remediation Service

Too often Data Loss Prevention (DLP) is just viewed through the prism of technology. Whilst the design and implementation of technology is critical to supporting any successful DLP programme, risk mitigation and risk reduction can only be truly realised through the design and implementation of a Data Loss Prevention Strategy, where people and processes are viewed as key parts equally with the technology, and together they collectively deliver a successful DLP implementation.

Ask us about our case studies and ROI driven DLP deployments.

Find Out More

CASB – Cloud Access Security Broker

As People and Organisations adopt Cloud services, Cloud Access Security Broker (CASB) software has become a must-have for companies who value security their data, and that of their customers. As the traditional ICT infrastructure is extended into the cloud via applications such as Office 365, GSuite, Dropbox and the like so the security interventions and management capabilities need to be similarly extended. The Accordant CASB service assess and define how exactly to do this.

Find Out More

Cisco Stealthwatch® Enterprise Remediation Services

Cisco Stealthwatch®  uses data from existing network infrastructure for advanced threat detection, deeper forensics and simplified network segmentation. With industry-leading machine-learning and behavioural modelling, you can outsmart emerging threats in your digital business.

These capabilities and features take network threat and rogue object detection beyond the perimeter deep inside the network.

Visibility: Identify attacks that get past your perimeter defences

Traffic Baselining: Watching traffic for a period of time to create a standard baseline which it can alert when traffic behaviour deviates.

Rogue Device Detection: Looking for device activity which does not conform

Response & Forensics: Quickly detect zero-day malware, insider threats and data exfiltration, advanced persistent threats, and sophisticated attacks.

Simplify: Effective segmentation of the network. Use the Stealthwatch integration with Cisco Identity Services Engine (ISE) to create and enforce policies.

Secure Datacentre: Extend visibility and control to your data centre, monitoring both north-south and east-west traffic.

Public Cloud: Utilising the capabilities of Stealthwatch Cloud you can now you can achieve visibility and threat detection in the public cloud. Cisco Stealthwatch capabilities allow for securing workloads in Amazon Web Services, Google Cloud Platform and Microsoft Azure

External Threat Detection: Looking for network activity involving external IP/Websites which are on known blacklists.

Find Out More

Cisco Firepower® Remediation Services

The threat landscape is changing and firewalls need to evolve to protect your business – can your firewalls perform deep network inspection where threats now tend to hide? Make sure your networks are supported with the best and most up to date firewalls. Ensure they are best placed to protect you and that you can assess and measure that protection. Demonstrate real value, realtime protection ROI.

The Accordant Firepower services can not only ensure all these elements are correctly implemented but also your teams are fully trained and skilled at maintaining and leveraging this investments to meet the evolving threats of today and tomorrow.

Find Out More

Cisco Firepower® Training Services

Critical to any organisation achieving expected levels of return on investment and risk reduction is ensuring your technical resources are trained correctly, thus ensuring full advantage of all the features and capabilities of Cisco Firepower® Threat Defense are achieved.

Our Training is provided by a mix of classroom style delivery and practical hands on experience using our own dedicated labs.

We offer a comprehensive training pathway which can be taken as individual modules, or combined in a compete programme:

  • Firepower Overview
  • Firepower Security Analysis
  • Firepower Advanced

Our flexible courses can be tailored to your individual needs:

  • Course duration from 1-5 days
  • On-Premise or Off-Site

Contact us to see how our FTD Training can help you realise increased levels of security, reduce risk and maximise the return on your investment.

*Cisco Firepower® is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

Find Out More