NMN chess 9 nov_2016_3421.jpg
CyberSecurity

Cloud Security Products

Migrating to the cloud is front of mind for IT departments across the UK. Chess can help plan out and implement the right cloud security strategy for your organisation. 

NMN chess 29 sept 2016_6815.jpg
2FA

Overview

What is 2FA?
Enhance the security of your applications, devices and systems with Two-Factor authentication. 2FA enables users to confirm their identity by presenting evidence to an authentication mechanism.
Technology
Mobile phone based tokenless Two-Factor Authentication for VPN, SSL, Remote Desktop, WiFi, web portals, laptop encryption and other solutions. The modern alternative to physical tokens.
Our Suppliers
SecurEnvoy, Sophos
_MG_3276.jpg
Cloud Apps

Overview

Why Protect Your Cloud Apps?
Most of your employees have adopted the cloud. Cloud-based apps like Office 365, Dropbox and Salesforce need protection to prevent account-centric threats, meet compliance requirements and protect critical data.
Technology
Chess can provide visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use.
Our Suppliers
Forcepoint, Sophos
nmn_chess_dec17_00003.jpg
Cloud Infrastructure

Overview

100% Uptime
Deliver enterprise-level hosting services with a 100% uptime guaranteed SLA to businesses of all sizes including public sector — our data centre is located in the UK.
Mapping Your Cloud Journey
Our experts can help you map out how your business can leverage cloud services to drive growth and improve customer experience.
Suppliers
Access Alto
CyberWorkingComputer.jpg
Data Sharing

Overview

Government Backed
CESG certified on-demand security for organisations wishing to share confidential information electronically.
Technology
Flexible deployment options support hybrid and fully-hosted implementations. Encrypting both data at rest and in transit allows a fully mobile workforce to use secure mobile apps.
Suppliers
Egress
NMN chess 19 sep 2016_43.jpg
DDoS Protection

Overview

Essential Defence in Today's World
Denial-of-service attacks are on the rise since they've become a commodity on the Darknet and IoT allowing for easier botnet creation. DDoS mitigation solutions and attack prevention has never been more important.
Technology
Automated protection from fast moving, high volume, encrypted or very short duration threats, including IoT-based attacks like Mirai, Pulse, Burst, DNS, TLS/SSL attacks and those attacks associated with Permanent Denial of Service (PDoS) and Ransom Denial-of-Service (RDoS) techniques.
Suppliers
Radware
nmn_chess_dec17_00007.jpg
VPN

Overview

Keeping the private, private.
Virtual Private Networks are now a necessity in today's modern workplace. Chess can help you find the right VPN technology to help your business grow and yet remain as secure as ever.
Technology
Select from a full range of VPN technologies for secure site-to-site and remote access.
Suppliers
Sophos, Forcepoint

Talk to a Specialist

Request a Callback

Success! Your form has been sent. We will be in touch soon.

Close

Resources

Cloud Knowledge

Additional Information

Learn More