Octiga

Octiga

Octiga has the vision and belief that it is possible through innovation to bring simple, affordable and automated cyber security (without the consultants) to SMEs.

Why Octiga Microsoft365 Security Suite? 

The product addresses Microsoft 365 (Office 365), which is at the heart of the business, yet where most of the risks reside.  The product is automated, integrates directly online with a customer’s Microsoft 365 and requires no technical expertise.  It consists of 3 features, which combined, complete a holistic approach to cyber security in Microsoft 365:

- Prevention of breaches and enhanced compliance through guided configuration.
- Monitoring, Detection, Alerting and Remediation of risks and incidents.
- Recovery and Remediation from breached accounts.

Our product is fully cloud-based.  Just sign in online in a browser using your Microsoft 365 account.  From there, you can use the following features to complete your security journey. 

Contact Information

Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Allot

Allot

Allot are a global provider of innovative network intelligence and security solutions for Service Providers and Enterprises worldwide.

Ping Identity

Ping Identity

Ping Identity is The identity Security Company, our identity and access management platform gives enterprise customers and employees one-click access

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Detack

Detack

Detack is an independent supplier of IT security auditing and consulting services.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services business offering legal services in specialist areas including cyber security.

Quantum Security Solutions (QSec)

Quantum Security Solutions (QSec)

QSec is an innovative information security consultancy based in Ghana. We can provide your organisation with information security products and services that assure against information risk.