Humanising Cyber Security

Gamma Secure: Cyber security services, processes and investments that protect, react and secure customer communications

Gamma Secure Logo

Cyber security from Gamma

Cyber security at the heart of everything we do

Gamma believes in doing the right thing, that’s why we put our customers cyber security at the heart of everything we do. Our products and solutions have security, data protection and regulatory requirements built in.

Gamma Secure is Gamma’s entire security strategy and solutions.

From managed firewall, protected numbers ISO/GDPR regulatory compliance, we also offer a suite of cyber security services to enterprise and public sector customers.

Having Gamma Secure at the heart of our product and portfolio roadmaps, ensure that this becomes part of the way we plan, build and deliver our solutions.

Accredited, compliant, certified, trusted.

Gamma delivers a dependable Cyber Security offering

Managed Cyber Security

Are you awake to cyber security threats?

Cyber threats are increasingly common, and ever evolving in their nature. Cyber security, therefore can be a complicated and expensive thing to get right. Many organisations lack the internal knowledge and expertise and capacity to deal effectively with the threat of cyber-crime and disruption.

Managed Cyber Security

How are you guarding your organisation?

Cyber Security is increasingly becoming a boardroom topic – however it can be seen as something that eats budget with very little value added. Keeping up with the latest threats and tactics is usually impossible and renders many organisations security postures ‘obsolete’ and non-compliant almost constantly.

Partnerships built on trust

We provide the critical infrastructure to some of the UK's most recognisable brands and institutions

Gamma secure

Gamma places the NIST Cyber Security Framework at the heart of what we do.

The NIST cyber security framework is a set of guidelines for mitigating organisational cyber security risks, published by the US National Institute of Standards and Technology (NIST). Their frameworks are globally recognised as best practice.

We have mapped our cyber security services across the NIST framework to provide a structured and systematic approach to ensure the delivery of a well-rounded security posture for our customers. Our services are aligned to the NIST framework as below:

Identify

  • Cyber GAP Analysis
  • Continual Security Investment Validation
  • Penetration Testing

Protect

  • Managed Next Generation Firewalls
  • Turnkey SASE
  • Access to purchase the leading protection suites

Detect & Respond

  • 24×7 Managed SOC
  • Contextual Managed Vulnerability Management

Recover

  • Incident Response
Gamma secure adopts the NIST framework

Gamma Secure: Managed Cyber Security

As part of Gamma Secure, we offer three cyber security services powered by Satisnet

Gamma secure

Learn more about our managed cyber security services

Vulnerability Management

Vulnerability management is the ongoing, regular process of identifying, assessing, reporting on, managing, and remediating cyber vulnerabilities across the business. It is critical that the correct process is put in place to prioritise vulnerabilities within the organisation.

Gamma’s Vulnerability Managed Service can be provided on an ad hoc, 8×5, or 24x7x365 basis. The Service is a fully UK-based offering, with tooling which is hosted globally. However, the customer can specify where the tools’ data centre is located, if required.

The Vulnerability Managed Service is not only to help with running vulnerability scans but is also an extension of the customer’s team to assist with the overall vulnerability process. The Vulnerability Managed Service uses industry-leading technology tools to help and support customers, which are best suited to the customer’s specific use cases.

 

The Vulnerability Managed Service meets ISO 27001 requirements and can help support both Cyber Essentials and PCI requirements. The Vulnerability Managed Service includes proactive configuration, monitoring, performance and capacity management, as well as access to support capability, technical skills, and vendor relationships.

Gamma’s Vulnerability Managed Service is available in three tiers: Basic On-Demand Service, Intermediate 8×5 Service, and Premium 24x7x365 Service.

Managed Security Operations Centre

Gamma SOC’s MDR [Managed Detection and Response] service has been built around utilising the power of Microsoft, specifically MS Sentinel and the Defender suite. Our service enables business to leverage our expertise within cyber security as well as the solutions that we propose.

Our MDR service has been designed and structured based on a partnership driven approach, ensuring that we understand from the ground up organisations pain points and issues to ensure we are providing the best service available.

The managed service includes implementation, configuration, baselining & monitoring and delivers:

  • 24x7x365 incident monitoring and triage based out of the UK.
  • Templated On-boarding to ensure quick ROI
  • Partnership driven approach to security operations.
  • Nurturing of SIEM deployment
    • Use Case Development
    • Tuning
  • Quarterly Service Reviews
  • ISO27001 certified Operation
  • Experienced and vendor certified analysts

Security Gap Analysis

The Security Gap Analysis Service allows you to identify gaps in your security posture, and prioritise tooling, processes, controls, and people to optimise your cyber security operations.

The Service gives Security Leaders the visibility to answer five critical questions and provides a cyber security roadmap for the organisation:

What security tooling do we own? What should it do, and is it working as it should be? Where is it deployed, and is our whole estate covered?

What are the risks to our organisation, and are we protected? Are there any overlaps or gaps that need to be considered?

This service delivers a range of benefits, giving customers a baseline understanding of the state of their security, delivering:

  • Validate existing security controls, and align to frameworks such as ISO27001, MITRE ATT&CK, NIST and CIS
  • Aligned to the Cyber Defense Matrix – identity, protect, detect, respond, and recover
  • Benchmark security scoring and prioritise improvements and expenditure
  • Gain a detailed security posture report, with recommended remediation steps, a tailored cyber security roadmap, and associated cyber security posture improvement costs

Why choose Gamma?

Gamma's cyber security expertise

We have a team of 40+ cyber security professionals, with 19 years’ experience in the industry, inclusive of 11 years operating as a leading MSSP across the UK and EMEA.

Our Bedfordshire-based SOC is the heartbeat of our operations, combined with our team of dedicated technical experts and consultants delivers industry leading security services.

Our approach to cyber security is based on the NIST framework – catch up on our #GXFrontiers Keynote as we discuss how our security offering works

Security pedigree

Access to market leading cyber security suites

Security at the heart of what we do

Our cyber security expertise extends across our portfolio and business processes

Managed NGFW

Gamma’s highly available, managed Next Generation Firewall for intelligent threat protection across all sites and access points.

  • Dedicated VSYS
  • High Availability (HA) design
  • Intrusion Prevention System (IPS) functionality
  • Application Visibility and Control
  • Threat Prevention against both known and unknown threats
  • Anti-virus, anti-spyware and anti-malware
  • File and Data blocking
  • Application Aware Web URL filtering (whitelist & blacklist)
  • SSL VPN / IPSec Remote Access (for remote workers)
  • Support of Security Zone (DMZ)

Number Protection

Secure your business telephony from the growing threat of hacking and abuse by deploying our CallGuard solution that protects existing numbers.

Hacking and abuse of business telephony is becoming as big as credit card fraud. With this type of abuse, the cost of the calls falls to your business. But with our CallGuard service your business is protected from such activity.

  • Your calls protected from unusual usage
  • Low cost for peace of mind knowing your calls are protected
  • Avoid any unwanted expensive bills
  • Can be applied to all of your existing numbers
  • Tailor your protection – opt numbers in and out as required

APN Available

Protect company data on mobile phones by using our private APN services that securely delivers mobile-sent data directly to your servers.

The benefits of a Gamma’s Private APN service include:

Security: provide a secure and encrypted connection for data transmission, ensuring that sensitive information remains protected from unauthorized access.

Quality of Service: prioritisation of network traffic and allocate sufficient bandwidth to meet your specific requirements. This enables reliable and consistent connectivity for critical applications and services.

Customisation: Gamma private APNs allows your organisations to customise its network settings, including IP addressing, firewall rules, and routing configurations, tailored to your specific needs.

Increased Control: By utilizing our Private APN, you have more control over your network infrastructure, allowing you to manage and monitor your network performance and security more effectively.

Scalability: Gamma private APN services can accommodate the growth and expansion of your organisation, providing the flexibility to add or remove devices, users, and locations as needed, supporting your organisation’s evolving connectivity needs.

GDPR Reporting

Remain fully GDPR compliant with Gamma’s services that feature a suite of management tools to aid in reporting, performance monitoring, and more.

Gamma core services adhere to the ISO 27001 Information Security and ISO 22301 Business Continuity standards, demonstrating our commitment to maintaining secure and resilient operations.

To ensure the effectiveness of our protective measures and controls in the face of evolving threats, we undergo regular audits conducted by certified third-party auditors.

Compliance with data protection regulations, including GDPR, is a priority for us. We continuously review our systems and processes to ensure the proper management and protection of customer and partner data, guaranteeing its security at all times.

Payment Compliance

Ensure network services are compliant with data transfer regulations including the Payment Card Industry Data Security Standard.

The Payment Card Industry Data Security Standard (PCI DSS) is the proprietary information security standard defined by the major card companies to help combat fraud and protect consumer card data.

Its members include Visa, MasterCard, American Express, Discover and JCB. PCI DSS applies to all organisations that store, process or transmit cardholder information, from any of these members’ cards. The type of annual assessment required varies according to “level”, which is defined according to the volume of payment transactions that are handled.

With 327 controls to consider in total, it is vital to ensure you have them all ticked. The effects of being non-compliant can be disastrous for a business due to the very real financial risk of opportunistic agent fraud and the associated reputational risks. Some of these include:

  • Compromising your customers’ payment data
  • Loss of customers, damage to your brand and reputation
  • Expensive lawsuits and insurance claims
  • Substantial payment card user and Government fines

Cyber Security Essentials Certification

Cloud security regulations are constantly changing – we are always keeping abreast of the latest updates and will be ready for the latest change in April 2024.

Cyber Essentials Plus is a cyber security certification program developed by the UK government. It is an extension of the basic Cyber Essentials scheme and provides a higher level of assurance by including an independent verification and testing of an organization’s cyber security measures.

To achieve Cyber Essentials Plus certification, an organization must first meet the requirements of the basic Cyber Essentials scheme. This includes implementing essential cyber security controls such as boundary firewalls, secure configuration, user access control, malware protection, and patch management.

In addition to meeting the basic requirements, Cyber Essentials Plus also involves a more rigorous assessment. Qualified external certifying bodies conduct on-site audits and perform vulnerability scans and penetration testing to verify the effectiveness of an organisation’s security controls.

Cyber Essentials Certified Plus

Resources