Cyber Security Services

We provide the best Cyber Security Services solutions
Home / Services

Audit and Review

Security Architecture & Operations

Network Security

Risk Assessment & Management


Read More

Work process

Our focus is to secure our clients’ information, technology, and networks from the many threats that they face.

Eighteen Thirtysix provide leadership, technical understanding, intelligence and solutions to allow our clients to benefit from the huge opportunities that the digital economy brings.

We understand cloud technologies, cloud security, and how to design, implement and review their deployment for a business.

1. Cyber Challenge

If businesses are to grow they need to embrace new information technologies. Technologies that have been designed to facilitate an interconnected world have largely prioritised cost and user convenience over security considerations. Malicious and criminal users target this gap to exploit, identify vulnerability and attack organisations and individuals.

Cyber attacks are growing more frequent, sophisticated and damaging when they succeed hitting both the public and private sectors. It is imperative that businesses and Governments around the world understand the threats they face. The business requires a strong digital foundation to maximise opportunity and manage risk. They have a responsibility to safeguard the assets which they hold, maintain the services they provide, and incorporate the appropriate level of security into the products they sell.

Cyber is not solely concerned with faceless criminal groups, ‘script kiddies’, or hostile nation states. The UK National Cyber Security Strategy highlights that insider threat remains a cyber risk to organisations, web presence and their IT infrastructure. Malicious employees who have access to critical systems and data pose the greatest threat. They can and do cause significant financial, reputational, and destructive cyber damage to an organisation.

Businesses and organisations must understand that, if they are the victim of a cyber attack, they are liable for the consequences. Those who fail to act effectively against cyber threats will be outpaced in their ability to protect against it.

2. Cyber Strategy

Eighteen Thirtysix believe that companies should look to develop a security aware culture where organisational needs are balanced against a clear understanding and appreciation of the cyber threats.

We have developed a comprehensive set of services designed to meet the requirements of large multi-nationals, small businesses, and everything in-between.

Our service offers organisations the chance to engage professionals who understand the importance of balancing the requirements of the business with the need to manage risk to the organisation. This will ultimately deliver an architecture that will be of long term benefit to the organisation.

We work with you to understand and capture appropriate responses, from either small isolated incidents to a full scale cyber breach. We test scenarios that incorporate penetration testing with our clients to ensure that the documented procedures operate as expected and are being maintained in response to changing threats and technology platforms.

3. Cyber Focus

Eighteen Thirtysix understand that cyber threats can be daunting to a small business, and understandably not necessarily a priority given all the other pressures you face. However, cyber opportunities mean that a small business can establish a cyber presence and compete effectively with much larger organisations in providing services. Taking these opportunities requires that we understand any threats, and the risks they introduce.

We provide a a tiered service offering designed to help you establish and improve your cyber status in line with the growth and nature of your business.

4. Identity Access Management

These are Gartners industry best recognized top applications in these domains

  1. Privilege Access Management
    • CyberArk
  2. Identity Management and Governance
    • Sailpoint
  3. Access Management - Single Sign On -
    • Oracle Suite
    • ForgeRock
    • Ping
  4. Certificate life cycle Management
    • Venafi
Within Identity and access management we can provide following roles , this can be formed onshore and offshore (Part time/Full time)
  • IAM Strategist
  • IAM Architect
  • IAM Consultancy
  • IAM Program, Business analysis
  • IAM Engineers
integrity="sha256-ZosEbRLbNQzLpnKIkEdrPv7lOy9C27hHQ+Xp8a4MxAQ=" crossorigin="anonymous">