Protecting clients since 1999.
What we do
Secon Cyber is a leading cyber security company that provides a wide range of cyber security services and technologies to a substantial and diversified client base that includes corporations, financial institutions and governments. Founded in 1999, the firm is headquartered in the UK. We solve cyber security challenges using an array of services and technologies, including:

Advisory
Cyber Resilience Review
This high-level review of your organisation’s resilience to cyber threats and incidents sets out clear recommendations of how to improve your cyber security maturity. This review is designed mainly for senior management and board level executives.
Cyber Risk Assessment
This detailed risk assessment of your IT/digital estate assesses your organisation’s level of maturity in protecting, detecting, and recovering from a cyber attack or incident. Our detailed report is aligned to the UK’s National Cyber Security Centre’s Cyber Assessment Framework 3.0 and provides both recommendations and a high-level roadmap to achieving cyber security maturity. This assessment is aimed at information security/risk officers.
Security Optimisation and Rationalisation
We provide a review of your organisation’s current investments in security solutions/services to determine where you have overlaps or gaps in security and recommend where you can remove, replace or further exploit your existing solutions to reduce cost of ownership and improve security.
Services
Managed Detection and Response
We monitor your deployed security solutions 24×7 for alerts or security incidents. We then quickly respond and remediate as required.
Server Patching as a Service
Our team proactively manages and maintains the security patches on your servers so they are protected from the latest vulnerabilities and are compliant with regulatory requirements.
Product Support
Our team provides technical support for your deployed security solutions, such as remote breakfix services and general ‘how do I’ tickets.
Product Maintenance
We proactively maintain your deployed security solutions by ensuring they’re optimally configured, patched to vendor recommended levels, and continue to operate correctly.
Solutions
Solution Evaluation/PoC
We evaluate or conduct a proof of concept of a vendor’s security solution to provide you with recommendations on whether it is fit for purpose.
Solution Provision
Acting on your behalf, we identify, negotiate and procure vendor security solutions using our partnership agreements with the industry’s leading security vendors. In this case, we act as the reseller.
Solution Delivery
We design, build, test, and deploy security solutions and their upgrades.
20+ Years of Serving Clients
Secon Cyber has been providing best of breed security solutions since 1999. We were founded as an offshoot of a security-focused distributor to help bring emerging security technologies to early adopters and build the cyber security industry. From the beginning, we have worked closely with industry-leading security technologies, such as Trend Micro, Juniper Networks, and Forcepoint.
Since the day we were founded, we have been focused on educating the market about new threats and the evolving threat landscape, especially during times when many companies were oblivious to their vulnerabilities and how they could be attacked.
Today, we have helped over 250 brands and many of these customers have been with us since day one. Our customers are our driving force for innovation, and we are always listening to their needs and concerns to develop new services and bring new solutions on board.
Our Security Philosophy
Our purpose is to help our customers focus on running their business without being worried or distracted by cyber security. We have been helping customers succeed with their cyber security agenda for over 20 years and we are totally vendor independent. Our belief is that addressing the cyber security challenge falls into three core areas: Protect, Detect, and Recover.
Protect
Building a strong and appropriate protection layer is important, however it’s vital to ensure this is continuously maintained and updated such that it can handle the evolving security threats. We work with leading solution providers to build the right protection layer for your business and help maintain it.
Detect
Constantly monitoring events and logs can give early sight of potential threats and vulnerabilities. Detecting issues early and responding to them quickly helps prevent breaches. Our always-on security operations service constantly monitors, analyses and responds to our customers’ security events using an experienced team of security professionals supported by our powerful AI driven platform.
Recover
There is no such thing as 100% protection from cyber attacks. Therefore, it’s essential to prepare for a breach and develop appropriate recovery playbooks to help get back to normal business as soon as possible. We work closely with our customers to understand their organisation and help design and build the right recovery solutions to get them back to business after a security breach.