Case Studies

Search by business topic or industry to find recent examples of how we work with our clients to help them address information security issues and achieve high performance.​
  • PCI Pal logo

    PCI Pal: Security by design

    Our client, PCI Pal, develops solutions designed to help run customer contact operations in adherence ...
  • ship square

    Delivering advanced cyber security capability on a sub-sea control system

    We provided assurance regarding security on a sub-sea control system that will be deployed on ...
  • CaseStudy_eCommerce_SML

    Maintaining our client’s eCommerce capacity with minimum downtime

    A major eCommerce company was made aware that the contents of its customer database had ...
  • CaseStudy_Legal SML

    eDiscovery Services for legal sector

    Processing data and hosting a small document review environment
  • CaseStudy_InternetService_SML

    Putting a major webmail hosting provider back in control following a serious security breach

    7Safe helped put a major webmail hosting provider back in control following a serious security ...
  • casr

    Developing an enduring security framework for a multi-million-pound procurement

    Information security standards can often struggle to keep pace with rapid advances in technology and ...
  • Depositphotos_11631453_s

    Reducing the potential for business disruption with clear incident response procedures

    Security incidents are inevitable in a hyper-connected, technology-dependent world. The extent of their impact on ...
  • shutterstock_264475901

    Conducting a comprehensive security assessment to eliminate the distraction of security concerns

    Data that can be damaging to a company isn’t always hidden behind web applications’ security ...
  • shutterstock_222752662

    Taking cyber security around customers’ confidential data seriously

    Online services represent a huge benefit for users and can be a real differentiator for ...
  • mobile application security

    Preventing unauthenticated users from gaining access to information assets

    When a mobile application offers users access to highly valuable information, ensuring this information cannot ...