Anti-DDoS

How It Works

Cloud-based, intelligence driven, rapidly scalable defence

Scalable to 2048 GB/s

WDS makes use of Zepko's Global Threat Intelligence Network to automatically combat known Threat Actors and compromised infrastructure.

This service is designed to elastically scaled to deal with large volumes of traffic, identifying both malicious and legitimate traffic to ensure uptime.

Monitored 24/7/365 and backed by Zepko's skilled SOC to provide human countermeasures and incident response to compliment and oversee WDS's automatic response.

More info

  • Automated threat response backed by security analyst oversight
  • Tailored protection rules
  • Instant scalability based on attack volume
  • Fully integrated into GTIN and SOC services
  • Scalable to 2048 GB/s

WAF

How It Works

Cloud-based, intelligence driven, rapidly scalable defence

Whitelist-driven security tuned to your web platforms

WDS makes use of Zepko's Global Threat Intelligence Network to automatically combat known Threat Actors and compromised infrastructure.

This service is designed to elastically scale to deal with large volumes of traffic, identifying both malicious and legitimate traffic to ensure uptime.

Monitored 24/7/365 and backed by Zepko's skilled SOC to provide human countermeasures and incident response to compliment and oversee WDS's automatic response.

More info

  • Monitoring of atomic and sophisticated attacks
  • Fully integrated into GTIN and SOC services
  • Tailored application protection rules
  • Monitoring of DNS poisoning
  • Whitelist-driven security tuned to your web platforms

IDS/IPS

How It Works

Using machine learning and risk-based protection to combat threats against your network

Over 15,000 custom rules in operation

Using statistical profiling ThreatProtect will learn a baseline for the way your network operates and detect anomalous behaviour.

ThreatProtect makes use of integrated feeds from the existing security estate as well as Zepko's Global Threat Intelligence Network.

ThreatProtect is capable of automated network defence taking trusted actions automatically while deferring to a human if there is a low level of assurance on a decision.

More info

  • Detect and prevent commonly known attacks in progress
  • Fully managed and assessed actions
  • Security analyst oversight
  • Over 15,000 custom rules in operation

ATP

How It Works

Using machine learning and risk-based protection to combat threats against your network

Sub-second threat response

Using statistical profiling ThreatProtect will learn a baseline for the way your network operates and detect anomalous behaviour.

ThreatProtect makes use of integrated feeds from the existing security estate as well as Zepko's Global Threat Intelligence Network.

ThreatProtect is capable of automated network defence taking trusted actions automatically while deferring to a human if there is a low level of assurance on a decision.

More info

  • Identify and automatically prevent unknown attacks through machine learning
  • Fully managed and assessed actions with analyst oversight
  • Sub-second threat response

Vulnerability Scanning

How It Works

Using machine learning and risk-based protection to combat threats against your network

154 new vulnerabilities discovered every week

Using statistical profiling ThreatProtect will learn a baseline for the way your network operates and detect anomalous behaviour.

ThreatProtect makes use of integrated feeds from the existing security estate as well as Zepko's Global Threat Intelligence Network.

ThreatProtect is capable of automated network defence taking trusted actions automatically while deferring to a human if there is a low level of assurance on a decision.

More info

  • Scans your systems for risks and vulnerabilities
  • Fully-managed testing, assessment and remediation
  • 154 new vulnerabilities discovered every week

LogSecure

How It Works

24/7/365 managed SIEM solution tailored to your needs

Scales to 140,000 EPS

LogSecure is a 100% managed SIEM system with a dedicated threat analysis, incident response and engineering team.

LogSecure can be highly tuned and customised to your needs from real-time health monitoring and management to incident triage, resolution and forensics.

Integrated with Zepko's Global Threat Intelligence Network to assist in qualification and assessment of security threats.

More info

  • 100% managed SIEM service
  • Dedicated capture, threat analysis and incident response
  • Adapts to your IT environment-custom integrations included
  • Scales to 140,000 EPS

SOC

How It Works

End to end incident management and response

12x5 and 24x7 vigilance

From our ten years of working closely with global businesses, we have honed and developed our ability to effectively control and monitor access to sensitive information. Our security experts deploy and manage a wide range of technology to effectively protect our network and systems from a multitude of threats.

We run a comprehensive development and testing environment to allow our team to review, learn and test next generation technologies in realistic simulated environments. This also allows our development team to build cutting edge next generation security software by running workloads for a wide range of networks.

More info

  • Real-time incident management - collection, correlation, triage, investigation, remediation and reporting
  • Delivered by trained, accredited (ISO27001) and vetted staff
  • End to end platform and services management
  • Integrated workflow with your organisation
  • 12x5 and 24x7 vigilance

GTIN

How It Works

Actionable, accountable and reliable cyber threat intelligence

Over 100,000 indicators of compromise

Intelligence is sourced from hacker forum infiltrations, deep web/dark web/tor mining, malware analysis and more.

Every piece of intelligence is reviewed by a Zepko analyst before being deployed. Each piece of intelligence is given a "risk" and "reliability" rating to match intelligence to a client's appetite for risk.

Each piece of intelligence has a "time-to-live" value to remain relevant and prevent false positives.

More info

  • Honeypots deployed across 7 continents
  • Malware analysis, quarantine and removal
  • Cyber threat research facility - high quality, relevant, reliable data
  • Constant visibility - faster response times keep you safe
  • Over 100,000 indicators of compromise

SecureStart

How It Works

Fixed price security review and gap analysis

Action-based report to improve your security maturity

SecureStart is a concise, consultancy package which offers pragmatic recommendations by understanding an organisation’s security posture, where it needs to get to, where its real starting point is and providing a phased plan to get there safely, on-time and within budget.

This is achieved by using a risk-based approach to effectively address relevant gaps.

Dependent upon your maturity, goals and drivers, we can focus in on a particular area of focus.

More info

  • A gap analysis and assessment of skills, operating models, costs, vendors, products, resources against required state
  • Outcomes agreed against audit, regulatory, internal risk, overall appetite and policy
  • Delivers phased plan to transition from current to future operating models
  • Fixed price
  • Get in touch to receive a free example report

Penetration Testing

How It Works

Targeted testing of your critical IT systems

Targeted testing of your IT systems

Penetration testing can form an invaluable part of your ongoing security evaluation and protection, and is often a de-facto activity required by clients. Simply complete a straightforward scoping exercise with us to receive pragmatic guidance, advice and remediation services to assist frequently over-stretched IT teams.

More info

  • Targeted testing of your IT systems
  • Internal and external options
  • Application and network level
  • Valuable input to SecureStart process

Passive Analysis

How It Works

Discover what the hackers already know about you

Typical reconnaissance activity by hackers ahead of an attack

Passive Analysis delivers a bespoke report that discovers and distils the available information regarding your organisation sourced from within the public domain and dark web. This is akin to a typical activity conducted by the hacking community as a reconnaissance exercise to find any exposed or soft targets that can be easily attacked.

While no two reports are the same, typically the table of contents would include:

  • Executive Summary
  • Risk Scenarios
  • Identified and exposed systems, staff and employees
  • Online presence, technologies and front-end systems
  • Potential cost of breach
  • Historical attacks on your company

More info

  • Reveals exposed systems and users using information sourced from within the public domain and dark web
  • Typical reconnaissance activity by hackers ahead of an attack
  • Report contains
  • Risk Scenarios
  • Identified and exposed systems, staff and employees
  • Potential cost of breach
  • Historical attacks on your company

Indicator of Compromise

How It Works

Discover if you are currently in a state of breach

Compiled analysis report of our findings

Innovative system that can help end users to understand if in fact they've already suffered a IT breach that unfortunately has gone undetected by their existing security technologies.

We will ship you a small discovery device that can be attached to the network for 2 weeks in a secure capture and listening mode. Once returned to Zepko's Security Operating Centre (SOC), analysts will process the data within its Threat Intelligence Network platform which will highlight existing malware infections and connections to compromised systems on the Internet and Dark Web.

We will then compile and deliver a report of our findings alongside a series of recommendations for remediation - especially if critical issues have been uncovered.

More info

  • Discovery device indicating if you are currently in a state of IT breach, undetected by existing security technologies
  • Attaches to network for 2-4 weeks in a secure capture and listening mode
  • SOC analysts process the data using Threat Intelligence Network platform highlighting existing malware infections and connections to compromised systems on the Internet and Dark Web
  • Compiled analysis report of our findings

DomainDetect

How It Works

Subscribe. Add your search terms. Receive alerts. Simple.

140,000 domains scanned daily

DomainDetect.io allows business to be alerted when a similar domain to their own is registered by a competitor or adversary. These domains could be used to launch Phishing attacks against your customers, or damage your brand.

DomainDetect.io functions by scanning newly registered domains daily, then alerting you via email if any of your search terms match any newly registered domains.

We function as a simple, subscription based service to help you keep on top of domain based attacks to your business, usually before an attacker has had chance to launch their campaign.

More info

  • Alerts businesses when a similar domain to their own is registered by a competitor or adversary
  • Discovered domains used to launch Phishing attacks against your customers, or damage your brand
  • Functions by scanning newly registered domains daily, then alerting you via email if any of your search terms match any newly registered domains
  • Simple, subscription-based service
  • 140,000 domains scanned daily

Explore the types of services we can offer, then contact us today!

Please fill out your details to get started. We'll endeavour to answer every question you may have within the working day (UK time).

We guarantee 100% privacy. Your information will not be shared.