Advanced Security Analytics and Response Orchestration

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services, empowering organizations with early warning and adaptive response capabilities against advanced cyber threats.


Learn More

Products

Built by experts in data analytics, cyber offensive techniques and cyber security operations, Enorasys platform effectively automates and streamlines the proactive threat hunting and incident handling processes


Learn More

Solutions

The ever changing cyber threat landscape is driving organisations to consider cybersecurity at a strategic level now. Board Directors are ethically, if not always legally accountable for data breaches, as well as often being personally the target of cyber attacks.


Learn More

Services

Harnessing cutting edge and proprietary technology with best of breed Cyber Security Operations and Services to augment your security capabilities for addressing advanced cyber threats


Learn More

Latest News

Vault 7: WikiLeaks dumps reveal CIA's use of home router exploits

“Whilst one could argue that WikiLeaks provides a public duty in uncovering issues that would otherwise be kept secret, in regard to Vault 7 the disclosure is reckless,” Graham Mann, Managing Director ENCODE UK


Learn More

Arms race

“Using a single supplier for security is no longer the answer. The cyber security tendering system is broken and needs to be replaced urgently.” Graham Mann, MD, Encode UK


Learn More

Network lockdown

“Organisations can’t simply continue to harvest data without understanding what’s really needed, how long they need to keep it, how secure should it be, who should have access. Data has to be treated like any other physical asset and boards need to recognise this and take the lead. You wouldn’t leave your office, plant or factory open to intruders so why leave your data exposed?” by Graham Mann, Managing Director ENCODE UK


Learn More

The clock is ticking…

RISK APPETITE Once the regulations are in force, it will take a few cases to build up case law and assess how various aspects are interpreted before there is a full understanding of the implications, suggests Graham Mann, managing director, Encode Group UK. "Depending on the severity of the fines, organisations will be better positioned to assess their 'risk appetite'; but, given the potential fines, it could be a risky strategy. Punitive fines are only one of the powers wielded by the supervis


Learn More

A new variation of a ransomware attack

A new variation of a ransomware attack has affected many organizations during the past few days. The malware responsible for this attack is a ransomware variant known as ‘WannaCry’ (or ‘WannaCrypt’).


Learn More

Case Studies

Security Analytics

The client is a government department within an EU country that handles some of the most sensitive data for defining and enacting national policy. The department is situated within two sites; both highly secure from physical attacks and regularly welcome some of the most senior national and international governmental figures for meetings and presentations. The department has a small IT team that are all security cleared to deal with routine systems and application management but are not considered a dedicated InfoSec team. Following a change of senior leadership within the department, it was decided that information security processes needed to be strengthened and the department contacted Encode to instigate a review and then strengthen both technological controls and processes.


Learn More

Extrusion Test

To test its security posture against targeted cyber-attacks, a retail Bank contracted Encode to attempt to breach its network and gain control over their critical IT systems, through an Extrusion Testing™ engagement. The project resulted in the Encode Red Team establishing multiple entry points into the Bank’s network and gaining domain administrator access privileges through a combination of social engineering, vulnerability exploitation and enterprise account takeover techniques, commonly used in Advanced Persistent Threat type of attacks. The subsequent detailed report of the active attack simulation has allowed the Bank to mitigate critical vulnerabilities, improve security process and helped raise situational awareness among C-level executives on the Bank’s exposure against such threats.


Learn More

SIEM

Ranked consistently among the top 1% of the world's universities, Aberdeen is also one of Scotland’s largest with 16,500 students from a community of 120 nationalities. Teaching and research is primarily based at its Old Aberdeen and Foresterhill campuses which include the majority of Life Sciences and Medicine, Arts, Social Sciences, Physical Sciences. Aberdeen is also named as Scotland's safest University City according to the influential ‘Complete University Guide’ and that record also extends to secure IT Services that supports tens of thousands of users as well as spinout companies that have commercialising research of which it is the 6th most successful university in the UK. IT services also delivers and protects one of the largest wireless campuses in Europe as part of a strategy to continually improve student accommodation and facilities.


Learn More