Case Studies

Search by business topic or industry to find recent examples of how we work with our clients to help them address information security issues and achieve high performance.​
  • shutterstock_225807817

    Establishing a clear picture of security loopholes in our client’s IT infrastructure

    Our client asked us to perform a time-limited internal and external host discovery exercise on ...
  • shutterstock_136601936

    Bringing security controls up to scratch on a leading document management solution

    For a secure document management solution to be credible, security controls need to be watertight. ...
  • shutterstock_163229387

    Ensuring best-possible security for business-critical applications

    A cyber attack on business-critical applications can disable a business and undermine its reputation, so ...
  • shutterstock_166422638

    Uncovering serious security weaknesses and a security breach of our client’s systems

    Poor information security exposes businesses to reputational and commercial risk.
  • shutterstock_184322438

    Bringing security controls for online dating services up to standard

    The information that users share on online dating sites is unusually personal, so businesses running ...
  • 1895

    Defending design IP and physical assets in the pharmaceutical sector

    Our client, a global pharmaceutical organisation, was migrating to an outsourced infrastructure and asked us ...
  • CaseStudy_Telecomunications_SML

    Meeting customers’ expectations of the highest levels of cyber security from a market leader

    Security breaches in the telecoms sector have made headline news in recent years so our ...
  • shutterstock_208077409

    Identifying and recommending measures to address a wide range of cyber security weaknesses

    It’s not unusual for businesses to have generally good security around their IT systems, with ...
  • CaseStudy_FinancialServices_SML

    Safeguarding an insurer’s reputation for efficiency and service

    Being able to submit claims online can be a big plus for insurance policyholders – ...
  • shutterstock_100931329

    Fixing vulnerabilities before making a security monitoring application live

    Our client, an IT services provider, was preparing to use a security monitoring application to ...