Asia Law Firm Security Monitoring Case Study

Customer The customer is a law firm in Asia providing legal services to multinational clients and employs approximately 1,500 staff members in various locations throughout Asia. The Challenge The firm operates in a hybrid environment (on-premises and cloud) that spans multiple jurisdictions in Asia, with about 1,500 users accessing and storing sensitive client data daily. […]

Jersey Fiduciary Company Security Monitoring Case Study

Customer The customer is a company that provides financial services to customers across various sectors. The Challenge They have an Azure environment with about 100 users who access and store sensitive data daily. To ensure the security and compliance of their data, they required a monitoring, cloud-based solution that integrates with Azure and provides real-time […]

Business Process Outsourcing Firm Case Study

Introduction In an era where digital security is paramount, discover how a leading Business Process Outsourcing firm spanning three continents elevated its security and compliance game. Dive into this transformative journey powered by Defence Logic’s unmatched monitoring solutions. The Client A globally renowned Business Process Outsourcing enterprise, serving top-tier clients across North America, Europe, and […]

Getting ISO27001 Certified – What’s Involved?

ISO27001

As the pre-eminent global information security management system standard, ISO27001 offers countless business benefits to businesses willing to engage with the standard, and even more to those willing to undertake accreditation.  So what does that involve? To help you understand what’s involved, this article aims to give a concise overview of the process and outlines […]

ISO27001 – What Is It, and How Could It Benefit Your Business?

ISO27001

Jointly published in 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC),  ISO27001 is an internationally recognised standard for establishing and maintaining a robust information security management system.  Having undergone several revisions since its inception, ISO27001 is the leading global information security management standard, with certification to the standard considered […]

What are the Top 7 Benefits of Penetration Testing?

In business, risk-benefit analyses act as the basis for many decisions. Whether it’s adopting a new way of working, bringing a new product to market or investing in a new piece of machinery, any major decision carries a degree of risk, and it’s important to be able to quantify and manage these risks. Penetration testing […]

What is Penetration Testing?

Penetration Testing

The simplest definition of a penetration test is: an exercise that aims to determine the efficacy of an IT system’s security measures by simulating a breach by an adversary. Penetration tests come in various forms, each designed to replicate an attack technique employed by cybercriminals. Tests can be used to stress-test individual systems or combined […]

What is Penetration Testing and Why do I need it?

Hacking through a company’s security protections used to require a lot of time and skill. However, today’s technological advances make it easier than ever for bad actors to find an organisation’s most vulnerable points…

Vulnerability Scanning vs Penetration Tests

We always hear in the news about organisation’s around the globe are vulnerable to cyber-attacks. So, there is no better time to get yourself clued up about vulnerability scanning and penetration testing than now

Meet Log Analyser

Have you seen the online SIEM calculators used by some vendors? These calculators appear to give a view of log collection that indicates great visibility utilising little storage, however did you read the terms and conditions…