Customers that have Voice and Connect services including: Internet Access (Broadband, ADLS, Fiber, Ethernet, and Leased Lines), Networks (MPLS, VPLS, P2P, SD WAN), Mobile devices and Data, Voice (Calls, Lines, and SIP) and PBX products. Use the Customer Portal to log a fault or query, check your bill, set a direct debit and much, much more.
Customers that have ICT services including: Infrastructure, Cloud Services, Network and Software. Cloud PBX customer can also use My Portal to log any issues they might have (to access your Cloud PBX bill you will need to use the Customer Portal). Use My Portal to check on any orders, log a fault or query, check your bill and much, much more.
Success! Your form has been sent. We will be in touch soon.
User Training & Policy Manage
Help avoid data breaches by discovering and protecting sensitive data in the cloud or on-premise. Use out-of-the-box policies or customise your own to secure your intellectual property and customers’ personal data — and meet compliance requirements quickly.
Track down vulnerable software across Windows, Mac OSx and Linux systems. Prioritising the most critical security patches. Fully integrated with WSUS and SCCM to patch Non-Microsoft applications.
Accelerate detection and response to any IT infrastructure of any size with SIEM (security information and event management). EAL 3+ certified and tailored to solve specific security management challenges of your business be it compliance, forensics or operational insight.
User Behavioural Analytics
Get the insight and context you need to detect intruder compromise, insider threats, and risky behavior.
Visibility / Access
By 2020, there will be 29 billion connected devices. Device visibility is the foundation to any security operation. Achieve 100% device visibility through our agentless technology solution.
With a number of different vulnerability assessment solutions you can be sure to have an in-depth cybersecurity assessments to help you reduce risk, minimize breach impact, and protect against future attacks.
Easily deploy and manage your wireless networks, with full visibility into threats on and to your Wi-Fi networks such as rogue APs and unknown devices safe in the knowledge are up and running in no time.