What Does Click 26 Do?

We help Measure & Manage corporate cyber Risk through Automation. You have got the latest Security Tech, there will still be holes, we can show you where they are. 

How Do We Do This?

Our Cobra box fully automates the Risk Assessment process. Critical cyber security risks that would take analysts weeks to find, we discover in hours!  Learn More

 

Why Do We Do This?

Your environment changes daily creating new Cyber Security Risks for hackers to exploit.

Automating Security provides IT teams with higher levels of assurance & framework compliance. 

24x7 Firewall & SIEM As-A-Service

  • Device provisioning and deployment
  • Device upgrades and configuration management
  • Monitoring the environmental of the firewalls
  • Change management (monitor & manage rule changes)
  • Firewall patch notifications and installs
  • Security log management
  • Proactive threat management
  • Configuration backup of device
  • 24x7x365 management & monitoring

App Pen Testing As-A-Service

  • Automated Pen Testing for Cloud Applications
  • Scans In Seconds, Results In Hours – No False Positives. Hire By The Day

SOC As-A-Service

  • Log collection, retention, archival
  • Log analysis
  • Event correlation
  • Incident management
  • Threat identification and notification
  • Recommendation of remedial actions
  • 24x7x365 management & monitoring

For More Information On Our Managed Services Just Call 03300 417126 or Email team@click26.co.uk

Working With CREST International On New Frameworks For Automation

Watch Video To Learn More About CREST

CybSafe - Measure The Human Cyber Risk Inside Your Company

Contact Us Today To Find Out More

Telephone: 03300 417126 or Email team@click26.co.uk

ARE YOU NEXT?

We Really Like This Insightful Video From Research Company Ideas 42

In The Time It Takes You To Watch This Video There Will Have Been 12 Cyber Attacks

What The Experts Are Saying To Click 26

MOST POPULAR INTERVIEWS

Philip Ingram MBE: 24 Years Military Surveillance

Now CEO of Grey Hare Media, Philip shares his story “From The Click Of A Gun To The Click Of A Keyboard”.

 

Automated Penetration Testing

The Automated penetration-testing platform is mimicking the hacker’s mindset and automated discovery of vulnerabilities and ethical exploits while ensuring a smooth network operation. Detailed reports are produced together with proposed remediation’s, one step ahead of tomorrow’s malicious hacker. 

Geraint Price of Royal Holloway University

Geraint Price of Royal Holloway University discusses his view on AI and how it will help SOC and IT teams. 

The view from the Data Protection Officer (DPO)

Richard Merrygold, the DPO of HomeServe, discusses the threats that you cannot see and also the role of the ICO.

The view from the Data Protection Officer (DPO)

GDPR is tasking organisations to put their house in order like never before. The Click team were delighted to spend some time with Jason Albuery, the DPO for Wiggle, who share his thoughts here.

HyTrust - Discover, Classify & Protect Mission Critical Data In Cloud & VM Environments

Office 365, Salesforce & AWS containers may have taken us into the cloud, but now you are there it’s time to beef up your cloud security and take back control, and that process starts with HyTrust.

Vectra: Why is my coffee machine talking to Russia?

Can I Be Compromised? Today’s smart malware bypass the most advanced perimeter, hidden tunnels, backdoors, recon tools, credential abuse, and exfiltration is common. See how Vectra tackles this problem using AI threat hunting.

Vectra: Helping your SOC team become 168 times more efficient

Using Vectra AI Cognito will allow your SOC team to look at the events that matter. This means they will not need to spend time looking at the hundreds of false positives that are flagged, but can concentrate on those events that can cause your organisation real harm.

SentinelOne: Anti-Virus is no longer effective against sophisticated attacks

SentinelOne is the only platform that defends every endpoint against every type of attack, at every stage in the threat lifecycle.

The Top Endpoint Choice Recommended By Fortinet & Microsoft.

Cyren: Turns 0 day into 0 seconds

Cyren run the world’s largest security cloud. Google, Microsoft & Checkpoint rely on Cyren Threat Intelligence. First to detect means first to prevent, this video shares how.

BREAKING NEWS AS IT IS PUBLISHED ON OUR TWITTER FEED

#Facebook copied email contacts of 1.5 million users
Facebook "unintentionally" uploaded the email contacts of more than 1.5 million users without asking permission to do so, the social network has admitted.
https://t.co/G0tfsnwmr2

#Epilepsy charity calls for social media #seizure #warnings
The #Epilepsy #Society wants the government's new plans to tackle "#online #harms" to recommend warnings about flashing images on social media.
https://t.co/E7TJFFN9OH

#Hackers Access #Microsoft Email Services Accounts
Hackers #breached #Microsoft email services (#Outlook.com, #Hotmail, #MSN) and accessed user accounts after compromising a support agent’s credentials, Microsoft has confirmed.
https://t.co/qS9cj8qRMM

#Brexit: Home Office sorry for #EU #citizen #data #breach
It blamed an "administrative error" for sending an email that revealed 240 personal email addresses
https://t.co/cCZqn1WMxu

Load More...

Antivirus Is Not Enough!

Malware is stealing your passwords, bank account details & identity even when you have the latest Antivirus Installed.

Protect Your Bank Details, Identity, Credit Card Information & Passwords From Being Stolen.      Buy A 10 Device License Today For Just £26.00.

Can Your Web Security Be Compromised?

CYREN HAVE THE LARGEST SECURITY CLOUD ON THE PLANET

25 Billion

Security transactions daily

1.3 Billion

Users protected

300 Million

Threats blocked daily

Can your web security be compromised? Find out here!

25 Billion

Security transactions daily

1.5 Billion

Users protected

300 Million

Threats blocked daily

Test your web security here

It takes just 30 seconds.

Cyren run the world’s largest security cloud.

RECENT BLOG POSTS

CAN YOU BE COMPROMISED?

We are amazed at just how many companies are. Listed below are 5 of the most recent breaches being reported:

15/04/2019: Hackers Access Microsoft Email Services Accounts

13/04/2019: Ransomware attack hits Garfield County

12/04/2019: Blue Cross of Idaho Hacked, Some Member Information Accessed

09/04/2019: Hacker breached Minnesota state agency e-mail

09/04/2019: 12,000 Patients of Baystate Health Notified of PHI Exposure Due to Phishing Attack

Stay out of the headlines by securing your environment with a Automated Pen Test from PCYSYS. IT security teams have been astonished at the risks that it finds and how quickly it finds them. Hardened security environments have been opened up in minutes, grabbing passwords, taking over hosts, accessing SQL databases, file shares & even grabbing domain admins.

RepKnight Breach Alert - Web Monitoring For Data Breach Detection

Deploying BreachAlert Is A Proactive Mitigating Step Towards GDPR Monitoring And Compliance – Detect A Data Breach For GDPR Compliance, Risk Management, Customer Confidence & Brand Management

Click 26

Registered office:

Wellesley House
204 London Road
Waterlooville
Hampshire
PO7 7AN
Company Registration: 07108413

VAT Number: GB183595274

 

 

© 2018 Click 26 Ltd.

Contact:

team@click26.co.uk

+44 (0)3300 417126

Legals:

Office address:

The Gatehouse
Marsh Farm
Milford
Surrey
GU8 5AE