Who, what, how, why, when?

Many decades of experience exists within the team and we would hope to have answers to most situations or have the capability to architect solutions.

We have the answers

  • Who makes the fastest SIEM?
  • What is the best way to test malware defences?
  • How do we build a policy around zero trust?
  • Why do I not know when a user logs on to the system in two geographies, minutes apart?
  • When should I replace my firewalls?


“Secrutiny’s Cyber Risk Analyser (CRA) has provided comprehension of risks that we were not aware of. The results will be used to make informed decisions that embed security by design according to IT operations.”

Investment Management
Information Security Manager

“Traditional cyber audits are based on paper exercises; giving a generic view of risk based on policy, process and controls in place. Over nearly 30 years in information security, Secrutiny’s CRA has given the most meaningful results by far.”

Cyber and Information Security Manager

“Secrutiny provide a service that is more cost-effective than me building out my team to manage security. They also have the market knowledge to keep my security toolkit ahead of the curve, ensuring the firm is secure.”

Head of IT

“We use Secrutiny because they are always keeping us up to date with emerging technologies that challenge the norm, to make us better or save us money. They will have completed the due diligence to reduce our risk and will always deliver on their commitment”

Real Estate
IT Infrastructure Specialist