Coffee break

Do you police your social media policy? We think you should.

Posted on

Many organisations have had a social media policy in place for some time.  Yet we have found that policing the social media footprint of employees and contractors is another matter.  We have developed an AI based open source intelligence platform.  Managed by our team of ex Police, Military and Government staff, we produce fantastic insightful reports highlighting any issues.

This does not have to be a negative thing either, because issues like own goals (something that can influence the reputation of an employer and employee) can be deleted, restoring the right image instantly.  If you use your own staff to do screening it can create unconscious bias towards individuals which can be a legal nightmare.  Giving us your screening means we stay focussed on just the issues that impact business reputation with protected characteristics.

To make the policing job affordable, we produce these reports for £50 per person and always ask the person being screened for their permission.  Contact us to find out more at enquiries@audent.co.uk

Screening

Are your people your biggest asset, or biggest threat?

Posted on

We think the majority are definitely assets. However, a large number of threats to businesses come from within the organisation from data leakage to reputational damage.

At Audent we have extensive security infrastructure and governance expertise.  We believe strongly that alongside a robust security infrastructure allied to good governance should be thorough screening of staff.  After all most security breaches are the result of human intervention. The Audent consortium now has a screening division.

Our screening is unique and complimentary to traditional services like Experian, where we go beyond the boundaries of a CV.  Our services start at £50 for a detailed social media sweep.  (This could help with any own-goal postings that could be removed to firm up reputations of the individual and the employer).

At Audent we believe that managing people risk is a critical part of any successful organisation.  As the sheer volume of data on each of us continues to grow, the traditional due diligence process has fallen behind the pace.  The biggest challenge to looking deeper and further across all of the internet (i.e. below the surface of Google etc) is one of scale, time and expertise.  This is where we can help you to better identify risk.

Our platform, driven by Natural language processing (NLP) and machine learning makes this approach comprehensive and cost effective.  We uncover and investigate data from unlimited open sources including social media, the deep and dark web so that we can provide our clients with actionable insights via clear, easy to understand reports and risk dashboards.  Our expertise mixes a unique blend of cyber security, military and intelligence, with business and financial services backgrounds.

Contact us is you would like to know more enquiries@audent.co.uk

Cyber Essentials

ACE Cyber Essentials Plus services make a difference working with the Audent Consortium. A bit of history.

Posted on

The original CESG 10 steps to cyber security in 2012 led to an evolution in security positioning.  Cyber Essentials was born on the back of custodians of IT security wanting more guidance and detail than the 10 steps programme.  Developed by government and industry the NCSC (was CESG) now has 5 certification bodies and have successfully helped to train many consultants to become accredited Cyber Essentials Practitioners or ACE practitioners.

Being an ACE practitioner is not the end of the story at Audent.  Our ACE practitioners, (often experienced in other areas of security governance such as 27001 and PCI) bring real world security experience to the table.  Our experiences at the Ministry of Justice, YJB, The Supreme Court, Energy Systems Catapult Warwick Manufacturing Group and Warwick University have been based on practical gap analysis and an eye on ensuring they are as secure as possible, within budget.  We are not an organisation that is prescriptive, each customer has their own challenges and particular areas that need more attention.  Our Cyber Essentials remediation advice is in plain English and we will debate the best route to get Cyber Essentials without cutting corners.

Cyber Essentials is based heavily on preventing attacks from the internet, yet we have detailed knowledge about all attack vectors assisted with a separate team of advanced penetration testers.  Complimented with our consortium of 10 separate, specialist companies.  We have in depth knowledge of infrastructure from servers to firewalls and security software enabling us to fully guide each client with a practical remediation.  In many cases we are asked to architect a remediated environment for the client and assist with implementation using our pool of 600 experts.  Check Point, Palo Alto, Cato, Forcepoint, Cisco, Symantec, Veeam, Fortinet, IBM, Dell and HP are just a few of our vendors where we have accredited consultants.

Don’t hesitate to contact us if you would like to talk real world Cyber Essentials and everything that surrounds successful IT security!  Contact us.

Consultative selling

Audent. Here for the long haul, unlike some others.

Posted on

Audent grows from strength to strength based on long term, strategic partnerships with clients since 2010.

We are a consortium of 10 separate, specialist companies spanning the most important areas of IT.  600 resources and over 250 vendors gives us so many opportunities to add real value.  Here is one journey we have had with a client spanning 8 years:

1.   In 2010 we were asked to provide a WiFi router to this strategic client, we were price competitive and delivered quickly.

2.  We were invited to help with the provision of the security estate and implemented, Check Point, Clearswift and Cisco ASA.

3.  We also provide 24/7 help desk support for the security estate.

4.  Won a bid to implement online backup.

5.  Delivered a market analysis of anti-virus products to replace Sophos, the client chose Symantec for 350 users.

6.  Won the bid for a new storage environment with EMC for the NAS, coupled with Cisco and Dell to complete the   implementation.

7.  Introduced Vodafone to replace EE on 350 handsets.  Won the contract with £30,000 extra hardware fund together with completely funded Microsoft 365 environment for 350 users.

8.  Delivered the latest Windows phones to complete the mobile working enablement capability.
We were invited to write a five year IT strategy with our interim CIO over a 6 month period, working closely with key stakeholders to really understand what the business needed. Delivered the strategy.

9.  Also invited to bring on board our interim IT Manager to deliver the strategy over 4 years as part of the customer team.
Implemented Microsoft 365 with our Microsoft cloud team on time.

10.  A stronger reliance on cloud drove the requirement to replace aging internet connectivity and Audent won the public bid with delivery of dual 200 Mbps circuits.

11.  Won a bid to implement WiFi on seven floors working with Cisco and Cisco Meraki.

12.  Converted all hardware warranties across the estate to reduce warranty costs by over 30%. SLAs range from 4 hours to next business day.

13.  Our resourcing division was successful in placing two engineers to assist with managing IT and support under the newly appointed IT Manager who was recently promoted.

14.  Successfully completed a pen test and instead of simply handing a remediation report to them, we met and discussed how to remediate using our infrastructure knowledge.  We also offered unlimited remediation advice at no charge.  We are focussed on making our clients more secure rather than simply ticking a pen test tick box.

15.  The partnership continues…

The Result

We have grown with our customer and we are seen as an integral component of the IT capability, remaining preferred supplier based on a proven track record.  The customer benefits from our pool of resources and excellent prices from diverse routes to market.  All of the above projects have been sourced through the Audent consortium, making procurement much easier. References on request.

Coffee break

Great facilities at Arrow ECS in London.

Posted on

Just working out of the Arrow ECS offices in London.  Great facilities which are made available to resellers and virtual systems integrators like the Audent consortium.

Arrow distribute market leading products which are used by many of the Audent client base from Check Point to Veeam.  They have also helped us close Juniper business over the years too.

Thanks to Arrow for your hospitality and a great environment when we are in town to grow our business moving into the final quarter of 2018.

Consultative selling

I am Data

Posted on

Hi, I am Data, I am a salary in a spreadsheet.  This is what I did today.

Initially I was emailed and went through the Exponential-e data centre to my head office where I was met by Clearswift and a Check Point firewall.  Then I went through a Cisco 2960 switch and flew across an office via Meraki WiFi to a Dell OptiPlex desktop where I shook hands with Symantec AV (how polite) and encrypted using Galaxkey so that no one could read me.  I then found myself stored on an EMC NAS which I noticed was very fast and made me dizzy.  Then I was picked up on a windows mobile using Meraki WiFi again and sent securely to a member of HR via the Vodafone network.

The whole time I knew I was safe because the systems were recently pen tested and the technical team acted on remediation recommendations documented in their Solarwinds Help Desk software.

Thanks to you all at Audent for providing and supporting Cisco, Meraki, Check Point, Clearswift, Dell, Symantec, Galaxkey, EMC, Vodafone, the mobiles, the pen test, Solarwinds Help Desk and recruiting the support team.

What a day, I wander what tomorrow will bring?  I hope I don’t get deleted.

Hope to see you all soon.

Regards

Data.

To find out more about Audent contact us at enquiries@audent.co.uk

Managed Services

Palo Alto advice and guidance from Audent

Posted on
Palo Alto support

The rise of Palo Alto implementations is gaining a strong foot hold in the EMEA markets especially the UK.  With this increase in users we found that support in the form of advice, guidance, help desk and consultancy is not keeping up.  The investment in Palo Alto is significant and there is a strong demand to make sure that a good return is made by making the most of the technology.  Hence Audent now has a comprehensive support service for Palo Alto users in addition to a similar service we have run for many years for Check Point users.  Our service is flexible to meet each customer’s requirement and comprises of the following areas:

  • Advice and guidance on sizing devices prior to implementation
  • Best practice set up and maintenance
  • Bespoke support services mirroring client process and SLAs
  • Second line help desk services
  • Consultancy services for bespoke projects