Cyber Essentials Certification
We will get you certified.
Getting Cyber Essentials Certified comes with many business advantages. Not only will it help ensure that you don't fall victim to cyber crime, it shows your clients and prospects that you are serious about security. Indeed, for many tenders, it is a mandatory prerequisite.
​
​

Some key reasons to get certified are:​
​
-
Meeting the requirements for Cyber Essentials will protect you from 80% of cyber attacks
-
You will automatically get £25,000 indemnity cover if your business has a turnover of less than £20M
-
Gain access to the UK Government and most large Enterprise tender process
-
Addresses key GDPR requirements - still needed after Brexit!
​
We will work with you to truly understand your business and what is required to achieve certification.
For the avoidance of doubt, we are not a low value, cosmetic, box ticking service (as can be found elsewhere). This type of service is a false economy, will certainly not give any of the securities of certification, and ultimately you will pay the price at a later date.
Every engagement to achieve certification will have an initial scoping session, with no commitment or obligation, so everyone knows what needs to happen to achive accreditation.
​
Remediation Services
Whatever your journey, when securing your security posture there is inevitably work to be done. Sometimes, you just don't have the skills in-house or you are already at capacity and just need some short term help in protecting yourselves in the quickest amount of time.
This is where our Remediation Services come in. We have a team of world class experts that cover almost every technology you can think of. They have designed, built and maintained some of the UK's most Critical National Infrastructure.
​
An example of what we can offer is:

​
-
Support for most major network vendors, including but not limited to:
-
Cisco
-
Juniper
-
Check Point
-
Fortinet
-
Palo Alto
-
-
Load Balancer support, including Citrix Netscaler, F5 Big-IP, Cisco ACE
-
WAN technologies support including MPLS, VPLS, OSPF, BGP etc..
-
Consumer-grade Cryptography support, i.e. IPSec, OPENVPN, WireGuard etc..
-
High Grade Cryptography support, i.e. Ectocryp, Catapan etc..
-
​All major Linux distributions
-
SIEM, IDS, IPS and other security solutions
-
Windows and Wintel technologies
-
Storage and SAN technologies
-
Virtualisation technologies including VMWare, Hyper-V, XenServer etc.
-
Containerisation technologies including Docker, Kubernetes, Docker Swarm etc.
-
Datacentre and physical management
​
CISO as a Service
.png)
​
-
Provide Technical Leadership
-
Enterprise Architecture
-
Innovative and creative design thinking
-
Exploit technology to maximise business benefit
-
Define technical strategies
-
Network design Security architecture
-
Business capability modelling
-
Complex programme delivery
-
Lead digital transformation
-
Requirements engineering
-
Project portfolio management
​
Whether you are a small business or a global organisation, FoxTech have the expertise to guide and advise you through whatever challenges you face.
​
Our experts have:
-
Delivered multi-million pound systems integration and infrastructure programmes
-
Designed, developed and supported some of the UK's largest Critical National Infrastructure
-
Designed the security architecture for multiple Government PSN network connected systems
-
Designed and implemented systems up to Top Secret
-
Advised Government CIO's on future strategies
​
We can apply this experience and our broad, yet in-depth, industry knowledge to exploit changes in technology to avoid the ever prominent threat of cyber attack and the associated security risks.
FoxTech can then design and deliver these solutions creating real value for your organisation.