
Product

Human Endeavour

Worst-Case Scenario

CloudUtils
Technology Solutions
When you work with NetUtils, you’re combining our skills and experience with those of our extensive specialist partner network including:
Go to Our Solutions & Services




















- Founded: 2004
- Turnover: $88m+ 2019
- HQ: Quebec, Canada
- Coverage: Global
- Specialism: Network and user experience monitoring
- Market: All
- No. of customers: 2 billion users
- Global patents: 150 +
Our Investment:
- Highly skilled, certified and experienced consultants (Skylight PVX “Expert”)
- Internally deployed in both lab and live environments within NetUtils infrastructure
- Managed Service Provider
Our History with Accedian:
NetUtils have a long history in providing network performance solutions culminating in our partnering with Accedian.
We have been in partnership with Accedian for just over a year allowing us to deliver what we believe is the best application and network performance tool on the market today.
Our Opinion:
Accedian delivers high-performance network and user experience monitoring of any application, any cloud or any network. With its 4 clicks to diagnosis, of a potentially complex problem in a complex environment, it shortens the time to resolution beyond all expectations.
Available in:

- Founded: 2015
- Turnover: $8m+
- Funding: $202M
- HQ: Alpharetta, US
- Coverage: Global
- Specialism: Cloud native SASE platform
- Market: Enterprises of all sizes
- No. of employees: 216
Our Investment:
- Early adoption of the solution into the NetUtils portfolio
- Technical expertise in design, deployment and management
- Managed Service Provider
Our History with Cato Networks:
NetUtils were early adopters of the Cato Networks solution into our portfolio when they entered the UK market in 2016. Aligning with this fast growing, emerging organisation has allowed us to be at the forefront of the Cloud revolution, bringing a security focused, SD-WAN solution to our customers.
Our Opinion:
Cato Networks took a revolutionary approach, building a cloud native network from the ground up, as a single, converged cloud service. This has allowed them to consider all aspects of the solution without compromise, adopting a security first approach to the SD-WAN challenge. Cato Networks represent a true alternative to the traditional SD-WAN, MPLS providers.
Available in:




- Founded: 2000
- Parent organisation: Nominet UK
- HQ: Boston, USA
- Specialism: Network-centric, threat detection solutions.
- Market: All
CyGlass’s unique technology had its origins in work funded by the US Department of Defence’s DARPA agency.
Recognised as a Digital Security Provider by the Police Digital Security Centre (PDSC) a not-for-profit organisation, owned by the police that works to protect small and medium organisations across the whole of the UK.
Our Investment:
Despite how much is spent on security, threats to the network keep increasing. To give our customers an additional layer of defence CyGlass was the natural fit for NetUtils, giving network visibility, policy assurance and threat detection without additional hardware, software or people.
Our History with CyGlass:
NetUtils prides itself on having a pedigree in networking so the welcome addition of CyGlass to our portfolio it a testament to their network centric solutions, broadening the vast products and services we have to offer our customers and giving them assurance of a multi-layered defence against network threats.
Our Opinion:
A simple and effective solution that identifies, detects and responds to threats to your network without the hassle. With CyGlass our customers can work securely when working remotely, use their networks in the fight against ransomware and if needed augment or even replace their SIEM.
Available in:



- Founded: 1996
- HQ: San Jose, California
- Coverage: Global (Business in 80+ countries)
- Specialism: Cloud-driven and end-to-end networking solutions
- Market: Global enterprises and service providers (All)
- No. of customers: 50,000
- Global patents: 1,100+
Our Investment:
- Certified to the highest level since 2003 with ENS accredited engineers
- Extensive hardware investment within the NetUtils datacentres
- Preferred support partner status
- Managed Service Provider
- Hardware subscription facilities
Our History with Extreme Networks:
Premier Extreme Networks partner providing the highest levels of technical design and support services within the service provider, media, healthcare and public sector.
Our Opinion:
Extreme Networks combine industry-leading edge to core solutions that streamline and simplify every aspect of network operations.
Available in:

- Founded: 2000
- Turnover: 2.16B (2019)
- HQ: Sunnyvale, California
- Coverage: Global
- Specialism: End to end network & security solutions
- Market: Global enterprises, service providers and SMEs
- No. of customers: 450,000 +
- Global patents: 666 issued, 186 pending (2020)
Our Investment:
- Fortinet Advanced Partner status
- Systems integrator specialist
- Managed Service Provider
- Qualifications: NS7
Our History with Fortinet:
Over 15 years in partnership including customers within charity, media, enterprise and public sector.
Our Opinion:
Great products, great pricing and a great choice if you’re looking for a vendor you can grow with.
Available in:

- Founded: 2011
- Revenue: $42 million
- HQ: Denmark
- Coverage: Global
- Specialism: Threat prevention and remediation, email security and privileged access management
- Market: All
- No. of employees: 200
Endpoints protected: 1.2 million +
Attacks prevented: 90 million + (in the last 12 months) – 2020
Patches applied: 60 million + (in the last 12 months) – 2020
Our Investment:
Our team of security experts are constantly working to bring best of breed products to our customers. This recent investment in Heimdal for inclusion of their products in to the NetUtils portfolio and their incorporation into our managed service offerings is testament to the quality of the Heimdal solution.
Our History with Heimdal:
NetUtils have a long history in protecting the endpoint through partnerships with various vendors. Our latest partnership with Heimdal represents a culmination of this experience and allows us to bring a best of breed solution to our customers.
Our Opinion:
As the threat landscape continues to evolve and network and security vulnerabilities exposed, the need for a layered approach to your security is prevalent. Our partnership with Heimdal supports us in giving our customers those additional layers of security that is needed.
Available in:

- Founded: 2016
- Founder: Kevin Lancaster
- HQ: Washington DC
- Parent Organisation: Kaseya
- Coverage: Global
- Market: Private and public sector
- Specialism: Comprehensive set of cyber security solutions including dark web monitoring, security awareness training and security identity and access management.
Dark Web ID™ continues to win MSP-voted awards from industry leaders such as Datto, CRN, and ChannelPro Network.
Our Investment:
Our team of security experts are constantly working to bring best of breed products to our customers. As the rise of comprised credentials continues to grow the recent investment in ID Agent and their Dark Web monitoring is one of the many services we deliver to help our customers enhance their security posture and mitigate risk.
Our History with ID Agent:
NetUtils’ long-standing history with identity and access management naturally meant providing our customers with intelligent awareness of stolen and compromised credentials within our customers organisation is crucial. The ability to continuously monitor the dark web is key in our effort to support our customers’ staff and their business continuity.
Our Opinion:
Whilst there is always a risk that attackers will compromise a company’s systems through advanced attacks, most data breaches exploit common vectors like known vulnerabilities, unpatched systems and unaware employees. This platform gives us the ability to provide actionable cyber security threat intelligence enabling us to proactively protect our customers from the risk of a costly data breach.
Available in:

- Founded: 2011
- Turnover: : >22 m (2019)
- HQ: El Segundo, CA
- Coverage: Global
- Specialism: Backup and disaster recovery
- Market: SME, Global enterprises
- No. of customers: 60,000+
- Devices covered: 250,000+
Our Investment:
- Deployed extensively across the NetUtils datacentres providing backup and disaster recovery for us and our customers
- Highly trained professionals specialising in back up and disaster recovery
- Managed Service Provider
Our History with Infrascale:
Since 2016 NetUtils have been in partnership with Infrascale to provide best in class back up and disaster recovery services both as on-premise solutions and as a very cost-effective managed service.
Our Opinion:
A solid backup and disaster recovery solution is critical to mitigate ransomware, protect against disasters and to simply keep your data safe.
Available in:

- Founded: 1996
- Turnover: USD $4,445.4 million (2019)
- HQ: Sunnyvale, California
- Coverage: Global
- Specialism: End to end high-performance networking & cybersecurity solutions
- Market: Large enterprise, cloud and service providers
- No. of employees: 9400+
109 Offices, 47 Countries (including 7 Virtual Offices, 48 E-Suites) - Global patents: 2,926 (2015)
Our Investment:
- Juniper Select PSS Partner (Partner Support Specialist) able to provide 1st and 2nd line Juniper support
- JNCIP certified professionals
- All our engineers are trained and certified around the entire Juniper solutions portfolio
- Specialists in Radius AAA, with a history dating back to 1999
Our History with Juniper Networks:
Over 15 years as a premier Juniper PSS partner with customers within the service provider, travel, local government and public sector.
Our Opinion:
For many organisations Juniper is the go-to for firewalls, switches and routers. With Juniper’s cutting-edge developments and end to end connected security solutions using AI and machine learning, they remain a leading force in the ever-evolving networking and cybersecurity space.
Available in:

- Founded: 1994
- HQ: Italy
- Coverage: Global
- Specialism: Email security gateway, email load balancer and email archiver.
- Market: SMB, large enterprise & Education
IT Pro Value Badge awarded to Libraesva for “an impressive arsenal of anti-spam measures in a VMware virtual appliance. It’s surprisingly inexpensive too”.
Red Herring Top 100 Europe awarded to “Libraesva among the most innovative and promising growth companies in the tech field”.
Our Investment:
Your email gateway is a critical element in your network defences protecting you against phishing, 0-day malware, impersonation, spoofing and other types of cyber attacks. NetUtils recognise the criticality of this aspect of defence and have invested in finding a market leading but cost effective solution. In bringing this solution to our customers as a managed service you benefit from the efficiencies of scale while still gaining from a class leading solution.
Our History with Libraesva:
NetUtils have long been protecting our customers from cyber threats. The inclusion of a class leading email security gateway was a natural evolution of our mission to provide a complete end to end security portfolio to our managed service customers.
Our Opinion:
With the majority of malicious activity coming from email compromise our decision to partner with Libraesva gives us the opportunity to provide complete protection against advanced threats and attacks, in order to prevent malware, ransomware, malicious URL’s and attachments, phishing & BEC. A cost effective solution to ensure our customers businesses can run uninterrupted.
Available in:

- Founded: 1994
- HQ: Italy
- Coverage: Global
- Specialism: Email security gateway, email load balancer and email archiver.
- Market: SMB, large enterprise & Education
IT Pro Value Badge awarded to Libraesva for “an impressive arsenal of anti-spam measures in a VMware virtual appliance. It’s surprisingly inexpensive too”.
Red Herring Top 100 Europe awarded to “Libraesva among the most innovative and promising growth companies in the tech field”.
Our Investment:
Your email gateway is a critical element in your network defences protecting you against phishing, 0-day malware, impersonation, spoofing and other types of cyber attacks. NetUtils recognise the criticality of this aspect of defence and have invested in finding a market leading but cost effective solution. In bringing this solution to our customers as a managed service you benefit from the efficiencies of scale while still gaining from a class leading solution.
Our History with Libraesva:
NetUtils have long been protecting our customers from cyber threats. The inclusion of a class leading email security gateway was a natural evolution of our mission to provide a complete end to end security portfolio to our managed service customers.
Our Opinion:
With the majority of malicious activity coming from email compromise our decision to partner with Libraesva gives us the opportunity to provide complete protection against advanced threats and attacks, in order to prevent malware, ransomware, malicious URL’s and attachments, phishing & BEC. A cost effective solution to ensure our customers businesses can run uninterrupted.
Available in:

- Founded: 2010
- Revenue: $120m+ (2018)
- HQ: Tampa Bay, Florida
- Coverage: Global
- Specialism: Simulated Phishing and Training Platform
- Market: All
- No. of customers: 30,000 +
- Global patents: 19
Our Investment:
- Managed Service Provider
- Fully certified engineers
- Used to train NetUtils staff internally
Our History with KnowBe4:
The partnership with KnowBe4 grows from strength to strength with many years of technology investment.
Our Opinion:
The need for continuous staff training around social engineering in any day and age is vital. KnowBe4 is the world’s largest Security Awareness Training and Simulated Phishing Platform and with so many options to choose from makes this a very flexible solution for all organisations.
Available in:

- Founded: 2014
- HQ: Cupertino, California, United States
- Coverage: Global
- Specialism: Next-generation Wireless LAN (WLAN)
- Market: Retail, Education, Healthcare, Digital workspace, Enterprise at home
Gartner Magic Quadrant for Indoor Location Services – Global 2019
Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure – 2018
Our Investment:
- Managed Service Provider
- Staff certified to the highest level required
Our History with Mist:
The newly formed partnership with Mist Systems was a strategic move for NetUtils to bring the latest WLAN emerging technology to benefit our customers and have seen this happen very quickly.
Our Opinion:
As a niche player in the WLAN arena and owned by Juniper Networks with constantly evolving technologies this makes it a tick in the box for us.
Available in:

- Founded: 1865
- Net Sales: €23.3 billion
- HQ: Espoo, Finland
- Coverage: Global
- Specialism: AAA & cyber security
- Market: Telco, Enterprise & Consumers
- Global patents: 3000+ essential 5G patents
- R&D investment: €129 billion (past two decades)
- Nobel prizes: 9
Our Investment:
With a rich legacy around the Radius AAA protocol and a long history in cyber security, NetUtils were perfectly placed to form a close partnership with Nokia, a flagship vendor with a rich legacy of their own. This partnership represents a unique vehicle to share Nokia’s formidable capabilities traditionally housed in the telco arena with NetUtils enterprise customers.
Our History with Nokia:
NetUtils have held a specialism around Radius AAA platforms for many years, deploying large scale carrier grade installations throughout the UK and Europe. Through our continuous search for best of breed solutions we were soon led to Nokia. With the partnership initially focused around the AAA solution it has been a natural evolution to also position Nokia’s exciting cyber security products to our customers and the wider SME market.
Our Opinion:
This newly formed partnership with Nokia brings the breadth of experience and end to end solutions needed to help our customers secure themselves against today’s evolving threats.
Available in:

- Launched: June 2011
- Monthly Active Users: 180M (2019)
- Year on year growth: 27%
1 in 5 office users now use an Office 365 cloud service (2019)
Of all O365 users, 43% are in the US and only 10% in the UK. (2019)
Our Investment:
- Skilled engineers with o365 & azure
- Specialists in licensing, implementation, training and security management
Our History with Office 365
Our decision to skill up on all things Office 365 was largely to ensure our customers were able to maximise its use in the context of their organisations as well as ensure security, network performance, visibility, access and backups were also taken care of. It’s easy to miss those things.
Our Opinion:
Turning a long business-critical set of tools into a SaaS offering affords huge savings and other ROI gains within an organisation. Doing it right and taking the unknown into account is an essential step to keep.
Available in:

- Founded: 2005
- Revenue: $2.9B
- HQ: Santa Clara, California
- Coverage: Global
- Specialism: Enterprise and cloud security, and security operations
- Market: All
- No. of customers: 70,000
- No. of employees: 7,014 (2019)
- Global patents: 169
Our Investment:
- Palo Alto Networks Select Partner able to provide 1st and 2nd line support
- PCNSE certified engineers
- All our engineers are trained and certified around the various solutions that make up the Palo Alto Networks portfolio
Our History with Palo Alto Networks:
In partnership since 2016 and initially specialising in next-gen firewalls. NetUtils engineering led involvement with Palo Alto Networks quickly expanded to incorporate the entire security platform.
Our Opinion:
Palo Alto Networks delivers an end-to-end security platform covering many aspects of cyber defence. It’s proven technology regularly leads in the Gartner quadrant with many other vendors struggling to keep up. Palo Alto Networks continues to innovate allowing NetUtils to provide trusted, best in class security solutions to our customers.
Available in:

- Founded: 2015
- Turnover: $5m+
- HQ: Israel
- Coverage: Global
- Specialism: Automated pen testing
- Market: All
Our Investment:
- Deployed internally as our own primary method of testing our internal systems
- Managed Service Provider
- Technically trained, certified staff
- Marketing and sales effort has helped introduce this cutting edge technology into the UK marketplace
Our History with Pcysys:
NetUtils have partnered with Psycys for a number of years with significant investment made in order to allow us to bring this best in class solution to our customers as a managed service.
Our Opinion:
It is our view that pen testing and the insight it brings is a crucial tool in the arsenal against cyber attacks. But traditional pen testing is no longer fit for purpose in today’s fast changing environments, instead a process of continual assessment and automated testing is now critical in providing the levels of real time visibility required. Psycys provides this level of automation and control without the traditional lag between tests.
Available in:

- Founded: 2014
- Product inception 2001: Neoterris
- HQ: San Jose, US
- Coverage: Global
- Specialism: Secure access
- Market: Enterprise
- No. of customers: 24k + comprising over 21m users
- Global patents: 200 +
Our Investment:
- Elite partner status
- MSSP – full managed Service Capability
- Highly trained engineers across the entire range
Our History with Pulse Secure:
Over 10 years specialising in this product from when it was with Juniper and now Pulse Secure (2014), We’ve been on their journey all the way with Pulse, from VPN, NAC, Cloud, SSO and Load-Balancing all converging into a full Zero Trust Access solution.
Our Opinion:
A truly great solution set, best of breed and worthy of sincere consideration by any organisation.
Available in:

- Founded: 2013
- HQ: New York
- Coverage: US & EMEA
- Specialism: Security monitoring and endpoint point protection
- Market: SME, Global enterprises
- No. of customers: 800
Our Investment:
- Proven technology and method deployed across entire internal infrastructure
- 24/7/365 support desk
- Qualified, experienced cybersecurity professionals responding to security alerts
- Managed Service Provider
Our History with Skout (SOC):
While Skout is a more recent partnership, NetUtils have been providing Security Operations services for over five years, protecting our customer’s critical infrastructure from attack. Skout brings a new level of protection and reporting all based on class-leading technology.
Our Opinion:
Cyber security is a complicated topic that can take attention and investment away from the day-to-day demands of any company. A managed SOC closes the gap between the executive suite and the technical experts, giving you real visibility of your network and any threats found within.
Available in:

- Founded: 1996
- Turnover: $100m+
- HQ: Washington DC, USA
- Coverage: Global
- Specialism: Privileged Access Management
- Market: All
- No. of customers: 10,000+
- Renewal Rate: 97%
Our Investment
- Certified pre and post-implementation engineers
- Widely deployed across the entire NetUtils infrastructure
- Managed Service Provider
Our History with Thycotic
NetUtils have a long history in identity and access management, with Privileged Access Management (PAM) being a natural evolution of this journey. NetUtils have been in partnership with Thycotic for several years providing both on-premise and managed services powered by the Thycotic portfolio of products.
Our Opinion
Thycotic’s enterprise-grade PAM solution is not only best in class but is also easy to deploy, manage and use. It’s availability in both cloud and on-premise makes it a flexible solution suitable for every organisation.
Available in:
Yes, I’d like to find out more.
Human Endeavour
Improving cyber security knowledge, skills and responses in your organisation is the opportunity to build your own defence. We cover every aspect you could need to grow this hidden asset.
Go to Our Solutions & Services
Did you know we offer the entire ‘human endeavour’ as a single fully managed service delivered by NetUtils?
All of this in one cost-effective managed solution.









75% of IT organisations are suffering from degraded business applications.
IDG Research Services
Network Performance Assurance & Visibility
In a world where organisations are always on the cost attributed to even 1 second of application and or network downtime is quantifiably significant. Disruption is not really tolerated by staff and customers and let’s face it, downtime is a no.
How We Can Help
NetUtils can support in quantifying the cost of performance degradation with a few easy steps with meaningful calculations of the impact of performance degradation on the productivity of the overall business, and also of your IT team. Allowing you to evaluate the ROI for a network and application performance monitoring and management tool
Our fully managed service will quickly and efficiently troubleshoot network and application performance so there is no impact to customer experience, your brand or your bottom line.
The Result
Reliable end-to-end quality of service of application and network service delivery.

Globally up to 65% of organisations face a shortage of cyber security staff.
Cybersecurity Workforce Study 2020
NetUtils Fully Managed Services
How We Can Help
NetUtils managed services help you prevent unexpected network service/security issues and downtime within your business. From Gartner leading Disaster Recovery (DRaaS) to fully hosted firewalls and change management services, we’re here to help.
Cost-effective, scalable and stress free

Almost half of UK businesses (46%) report having cyber security breaches or attacks in the last 12 months.
DCMS Cyber Security Breaches Survey 2020
NetUtils Professional Services
Fill the skills gap and sleep easy at night
- We tailor a set of fully managed IT service solutions to meet your business and security requirements.
- Flexible billing options
- Reduce your teams’ responsibility for the health and security of your network
- Robust SLAs ensure we’re held accountable to the services we provide
- Hand off the day to day maintenance, free up your team to focus on core business objectives
- Continual improvement of your network health and security posture against meaningful targets
The Result
Our professional services give you access to a million-pound team for a fraction of the cost. We will take complete ownership of all or parts of your network, alleviating the strain, while providing the peace of mind that you have a team of experts working tirelessly on your behalf.

Amongst the 46% of UK businesses that identified breaches or attacks, more are experiencing these issues at least once a week in 2020.
DCMS Cyber Security Breaches Survey 2020
Penetration Testing
It’s tempting to see penetration testing as simply a means to satisfy an upcoming certification or compliance requirement. However, this risks making it a tick-box exercise, which adds little value to the long-term security of your business.
How We Can Help
Penetration and security testing remains a strong component of the NetUtils Managed Service offering. We can help you determine the aims and objectives of any testing. If you do have a certification or compliance action looming, we can offer practical advice on the scope and the approach of any testing.
This will help you to make a considered investment in the context of your short and longer term business goals.
How It Works?
- Phase 1 Define the scope
- Phase 2 Plan the test
- Phase 3 Execute the test
- Phase 4 Learn from the test

Did you know 74% of data breaches are a result of privileged credential abuse?
Privileged Access Management (PAM)
Even in the most sophisticated IT environments privileged accounts are all too often managed by using a common password across multiple systems, with unauthorised sharing of those credentials and default passwords that are never really changed, making it all too easy for malicious actors to take advantage of the gaps in your security.
How We Can Help
NetUtils takes away the burden of implementing and managing this process with a fully managed PAM solution including support and installation.
- Allowing all of this to be run centrally
- Making it cost-effective
- Skill set of engineers for deployment
- High priority for us so doesn’t have to be for yours
- Systematise the process
- Removing the management burden
- Providing 3rd party secure access
The Result
We’ll remove external and internal organisational risk that comes from unsecured passwords and unmanaged privileged accounts, allowing your IT team to focus on what matters to your business.

Did you know that 77% of successful attacks start with a phishing email?
Security Awareness & Simulated Phishing
Phishing, spear phishing and CEO Fraud are all examples of social engineering.
How We Can Help
The size of the problem security awareness solves vs the money it costs to buy means you should just do this. Everyone knows what it is, everyone knows it’s important, NetUtils just make it easy.
Stop your users from leaving the front door open.
- We do this all for you
- Low cost fully managed
- Planning, reporting, auditing and ongoing training
- Our managed services have proven to reduce an organisations phish prone percentage from 37.9% to 4.7% over 12 months of continued training
- Using the platform shows you how you compare to your peers within the industry
- Engaged and aware user base
The Result
We’ll enable your human firewall; where staff are empowered to report suspicious emails with a single click of a button.

Approximately one in three respondents said time spent on reporting and documentation was their biggest complaint.
Exabeam State of the SOC Report – 2019
SOC Services
How We Can Help
Understanding you have a problem, what the problem is and having enough time to respond meaningfully is key. Let NetUtils be your expert pair of eyes and safe pair of hands.
- Cost-effective
- Teams of experts proactively go looking for problems
- Access to data analysts
- The technical expertise to remove the noise
- Experts pan for problems (gold)
The Result
Identifying threats and vulnerabilities are quick with less expense, improved collaboration and full reporting all aid in less compromise to your network.

75% of large UK businesses report having a cyber security breach or attack in the last 12 months.
* DCMS Cyber Security Breaches Survey 2020
Vulnerability Scanning
It has never been more critical for organisations to easily identify and resolve weakness in vital IT systems which expose their valuable corporate and customer data to exploitation.
How We Can Help
NetUtils can provide full vulnerability scanning, assessment and reporting to proactively identify susceptibilities in your critical IT infrastructure.
After establishing a thorough understanding of your objectives, we propose a structured and staged programme of works that will meet each of your goals.
- Remote automated scanning is fast and easy to set up
- Fully managed by our highly skilled technical engineers
- Compliant report generation
- Multiple scans at no extra cost
How It Works
- Phase 1 Initial setup and training
- Phase 2 Scanning
- Phase 3 Remediation
Yes, I’d like to find out more.
Worst-Case Scenario
Whilst ‘Our Approach’ will likely prevent you from ever being in this situation you should still plan for the worst.
Should you find yourself in the worst-case scenario, we have the solutions and services to ensure a fast RTO (Recovery Time Objective).
Go to Our Solutions & Services





279: the mean number of days it takes to identify and contain a data breach
Ponemon Institute & IBM Cost of a Data Breach Report – 2019
SOC Services
Our software navigates that ocean of data to hunt down threats and anomalies enabling our specialised analysts to provide an effective response, fast.
Should you find yourself in the worst-case scenario this solution will aid you in accurately interpreting data you may find yourself inundated with in order to promote resolution, future proofing and compliance.

7 Million: the number of data records compromised daily
Varonis – Breach Level Index
Disaster Recovery & Cloud Back Up
Rapid Failover from Anywhere
You can failover a single virtual machine (VM), applications, a whole network, or site locally or in the cloud.
Reduce Hardware Costs
When the cloud and intelligent software join forces, good things happen. Erase expensive hardware and complex steps from the disaster recovery equation so you can bring your business back to life in minutes, significantly reducing your RTO.
Build DR Your Way
You decide how you want to deploy failover for your business. Our DRaaS solution is delivered as a physical and virtual appliance and includes DR software and flexible cloud storage targeting.

62% of respondents indicate that their organisation’s cybersecurity team is either somewhat or significantly understaffed
ISACA’s Global State of Cybersecurity – 2020
NetUtils Professional Services
Should you suffer a breach there are typically four steps to be taken
- Find the source of the problem and fix it
- Perform a security audit
- Damage control
- Retrain and refocus
Whether you need us to supplement your IT Team while they focus on the problem or if you need us to take the lead on the resolution, NetUtils have the skills and resource to help.

82% of CISOs report feeling burnout as professionals
Symantec High Alert: Tackling cyber security overload – 2019
Security Information & Event Management
The interactions that take place across your network between users, devices, applications etc. all provide valuable insight and go a long way in identifying threats and causes for concern.
SIEM will provide valuable information and assistance in identifying the source of the breach and potentially what is required to resolve it.
NetUtils SIEM services shine a light on the often dark and difficult task of identifying problems and their root cause.
Yes, I’d like to find out more.
Managed Services
Our range of Managed Services support your business, give you industry leading visibility of your network and most importantly secure your infrastructure. Consider NetUtils as an extension of your IT team; providing levels of expertise only normally seen in large IT departments with equally large budgets.
Go to Our Solutions & Services



















Advanced Endpoint Protection
Our endpoint solution protects your users and your business data against malware and exploit attacks. Application Firewalling ensures that business data only goes where it is supposed to go and prevents the re-distribution of malware throughout your organisation.
Web filtering ensures that your team are protected from unsecure web pages, whilst our Anti-exploit technology prevents malicious software being run on your computes, tablets and smartphones.
Challenges
- Stop malicious activity
- Identifying threats
- Shadow IT
- Data protection and compliance
- Reputational damage
- Being held for ransom
Required Capabilities
- Access to and maintaining all endpoints in one place
- Visibility into endpoint security analytics and metrics
- Continued knowledge of the threat landscape
How We Can Help
- Protect your users & devices
- Centralised management tool
- Protection from unsecured web pages
- Prevent malicious software being run on all devices

Powered by


Cloud Access Security Broker (CASB)
Our SaaS protection is a cloud-based security solution that provides visibility, compliance, security and threat protection for cloud-based applications.
The solution enables you to scan and understand which SaaS applications are running within your organisation.
Compliance tools include proven blueprint security policies for SaaS applications and detailed audit reports.
Challenges
- SaaS protection
- Visibility and control of stored cloud services
- Data protection and compliance
- Shadow IT
- Identifying risks and security threats
Required Capabilities
- Data leakage protection (DLP)
- Activity monitoring and reporting
- Staff
- Skills
How We Can Help
- Visibility and control for data stored in cloud services
- Protection of cloud-based applications
- Enforce IT policies with compliance tools
- Prevent threats that propagate from cloud services
- Cloud hosted and continually updated

Powered by


Dark Web Monitoring
Did you know 81% of hacking related breaches leverage either stolen and or weak passwords?
The Dark Web is made up of digital communities that sit on top of the internet, and while there are legitimate purposes to the Dark Web, it is estimated that over 50% of all sites on the Dark Web are used for criminal activities, including the disclosure and sale of digital credentials. Far too often, companies that have had their credentials compromised and sold on the Dark Web don’t know it until they have been informed by law enforcement — but by then, it’s too late.
Challenges
- Weak passwords
- Third party websites
- Data breaches
- Awareness of stolen or compromised credentials
- Identity theft
- Social media
- Staff awareness and education
- Technical expertise
Required Capabilities
- Dedicated software
- 24/7/365 Dark Web monitoring
- Predicting patterns and trends
- Security awareness training
- Staff and resource
How We Can Help
- Low cost
- Quick to deploy
- Continued monitoring of the Dark Web
- Ability to respond to threats
- Prevent malicious activity

Powered by


Disaster Recovery & Cloud Back Up
Price on application
Imagine if your back up was a true business tool not just a costly compliance box ticked. Our system allows for fast recovery and even full use as a functional production environment hosted in the cloud, effectively reducing your RTO (recovery time objective) to zero.
Challenges
- Reputation
- Business continuity
- Compliance
- Expensive & complex to implement
- If you need your back up, will it actually work
- Recovery time objective – how long it takes to get you back to where you need to be
Required Capabilities
- Business continuity and DR strategy
- Maintenance/management of the solution, incl regular restores and testing
- Time
- Skills
- Money
How We Can Help
Imagine if your back up could also be your production environment. Which means your RTO is ‘zero’. Can your back up become your production environment in times of crisis?
- Additional to your live environment
- Consultative lead process
- Specification and implementation

Powered by


Email Security Gateway
With 94% of malicious activity being delivered via email, an active defence against phishing, malware, impersonation, spoofing and many other types of attack is key to your security approach.
Our simple and easy to deploy email security gateway solution uses sandboxing technology to scan all links and documents for active code and evasive behaviour to prevent users from visiting unsafe links or receiving and opening malicious files.
Challenges
- Business email compromise (BEC)
- Email continuity
- Data leakage and protection
- Human error
- Response time to threats
Required Capabilities
- Protection against one of the most exploited attack methods
- Dedicated software
- Visibility of attacks being executed
How We Can Help
- Cost effective customised protection in minutes
- Manage and filter all email traffic
- Protect from email borne threats
- Threat analysis & remediation

Powered by


Firewalls
From £150 per month per device
Let us shoulder your burden. There’s no mystery here, this is about highly trained staff dedicated to keeping your firewalls maintained and secure.
Challenges
- Regular hardware refresh
- Large CAPEX expenditure
- Expensive to retain staff to operate
- Lack of skills
- Accountable for company’s security
- Continuous upgrades and patching
- Challenges around the Hybrid IT model
- Expanding networks/scalability
Required Capabilities
- Expertise in cloud infrastructure
- Extensive knowledge of vendor solutions
- Ongoing staff training and development
- Budget
- Expensive staff
- Continued knowledge of the threat landscape
How We Can Help
- Cost effective
- Eliminating your skills gap
- Fully managed
- Expertise
- Continued knowledge threat landscape

Powered by


Hosted Applications
Price on application
We have invested heavily in providing our customers with our own on-site Tier 3 data centre, giving you a secure and robust location to host your applications or services, bringing all the benefits of a cloud infrastructure without the worries of deploying in a public cloud environment.
We remove all the overheads of power consumption, rack space, virtual environments, bandwidth etc. along with the manpower required to maintain such an environment. You simply have a single monthly fee and a service that you can rely on.
Challenges
- Expensive
- Time consuming
- Network uptime and security
- Complex to deploy
- Vulnerabilities around public cloud
Required Capabilities
- Internal infrastructure
- Redundant environment
- Disaster recovery and backup plan
- A team to maintain the environment
- Security teams and data protection
How We Can Help
- Tier 3 data centre
- Host applications, servers or physical equipment etc
- Full disaster recovery and backup services available
- Skilled and experienced team
- Guaranteed levels of service
- ISO27001 certified
- Cost effective

Powered by


Managed Change
From £250 per month
Partnering with us means those skills are available to you in bite sized blocks of the relevant expertise as and when you need it.
Challenges
- Time
- Demanding process
- Lack of qualified engineers
- Troubleshooting
- Visibility of IT changes
- Change scheduling and problem resolution
Required Capabilities
- Multiple members staff across a host of technical disciplines and following procedures
How We Can Help
This is an extremely popular service where customers can buy our:
- Technical expertise
- Easily consumable
- Bite sized
- Flexible consultancy
- Essential maintenance BAU

Powered by


Managed Infrastructure
From £150 per month per device
In short, this is about our staff making your life easier by keeping your network healthy and secure.
Challenges
- Lack of skills
- Expensive
- Time consuming
- Network uptime and security
- Unable to leverage new technologies
- Complex IT challenges
- Investment in skills that are not your core business
Required Capabilities
- Maintaining a skilled team
- Up to date with day to day trends in security
- Members of staff to be experts in every product purchased and deployed
How We Can Help
- Expertise and experience
- Depth of knowledge
- Multiple disciplines
- Make our team of experts available to you
- Relieving the responsibility & accountability
- Cost effective

Powered by


Monitoring
From £30 per month per device
Simply choose what’s important to you and let our technology and dedicated team keep watch.
Challenges
- Real time information
- Staff time and resource
- No mystery in monitoring, the challenge is how you respond to that information
- Technical expertise
- Process
- Accountability
- Visibility of alerts, network downtime
- Network visibility & health
- Continued network uptime
Required Capabilities
- Software deployed and configured
- 3 Staff (24-hour shift) working 7 days a week
How We Can Help
- Value is in our engineers behind the solution
- No mystery in monitoring
- Ability to respond; people, systems, 24/7 and product
- Covers any network or application
- Fast instant resolution

Powered by


Network Performance Assurance & Visibility
From £750 per month
Our enhanced network and application performance tool gives you unparalleled visibility and control with an unrivalled four clicks to diagnosis.
If you’re running a serious network where real time information is business critical, this is a must have service.
Challenges
- Unknown network and application performance
- When you have a problem and you don’t know what it is
- Know where to look to find the problem, so the correct team can resolve the issue.
- Troubleshooting
- Business continuity and uptime
- A network performance problem without the ability to diagnose is like a needle in a haystack
- Hybrid IT and cloud increases lack of visibility
- Speed of network traffic
- Cost of network downtime and poor performance
Required Capabilities
- You need the tools
- High upfront costs
- Implementation can be complex
How We Can Help
- POC to demonstrate the value
- Right sizing the licence
- Implementation
- 4 clicks to diagnosis
- Results
- Reporting
- Resolution
- Fully managed service at a low monthly cost

Powered by


Penetration Testing
From only £2 per IP per month
Our automated solution will continually scan your network to highlight risks and vulnerabilities, empowering you to resolve problems in real time, not twice a year.
We turn a compliance-based burden into your trusted advisor.
Challenges
- Expensive
- Obligation / compliance
- Inconvenient / disruptive
- Instantly out of date
Required Capabilities
- Buy external PEN test consultancy once, twice, four times a year
- Hope for the best in between
How We Can Help
- Low cost
- Easy to deploy
- Low risk
- Fast diagnosis
- Continuous PEN testing
- Point of failure identification and remediation impact analysis allows you to address the cause not the symptom
- Must have product that provides reassurance

Powered by


Privileged Access Management (PAM)
From £258.23 per site / network per month
Despite best intentions addressing and even acknowledging the size of the problem is often pushed down the list of priorities. Overlooked, this vulnerability will only increase.
Challenges
- Manual process
- Time consuming
- Performed infrequently or ad hoc
- Common password usage across multiple systems
- Unauthorised sharing of credentials
- Policies culture dedicated staff
- High CAPEX cost to deploy
Required Capabilities
- Staff and time prioritisation
- Systematise
- Policies for enforcement
- Policies culture dedicated staff
- Value the problem
- Automating password rotation
- Dedicated 3rd party remote access solution
How We Can Help
- Allows all of this to be run centrally
- Cost effective
- Skill set of engineers for deployment
- High priority for us so doesn’t have to be for you
- Systematise the process
- Removing your management burden
- Providing 3rd party secure access

Powered by


Remote Access
Pricing from £5.44 per month per VPN user
Discover our always-on, enterprise grade, fully supported consumption-based service from the market leading Pulse Secure.
Challenges
- Flexibility of connectivity requirements
- Expensive siloed solution / platform
- Providing consistent user experience and flexible connectivity
- Third party & contractor access
- Expensive
Required Capabilities
- Dedicated platform
- Staff
- Skills
- Budget
- Capacity for the maximum number of users
- Contingency planning
- Technical consideration of what you’ve got and where you’re going
How We Can Help
- Flexible pay as you use model
- Support
- Technical expertise
- A scalable, on-demand solution as a service
- Rapid deployment
- No start-up costs
- True consumption model (only pay for what you need)
Turn it on, turn it up, turn it off

Powered by


Security Awareness Training & Simulated Phishing
Pricing from only £2 per month per user
The necessity can’t be denied, and we make it cost effective and easy to achieve. Our contextually relevant testing and training materials help you transform your staff into your best line of defence.
Challenges
- Expensive
- Time consuming
- Uneducated users clicking or downloading authentic looking but malicious link / downloads
- Educating users
- Phishing, spear phishing and ransomware
Required Capabilities
- Expensive to deliver the training
- Time off for staff
- Value the problem
- Board level buy in
- Budget approval
- Managing continuous phishing simulated campaigns
- Continued of the threat landscape
- Educating end users continuously trained in the threat landscape
How We Can Help
The size of the problem this solves vs the money it costs to buy means you should just do this. Everyone knows what it is, everyone knows it’s important, we just make it easy.
Stop your users from leaving the front door open
- We do this all for you
- Low cost fully managed
- Planning, reporting, auditing and ongoing training
- Our managed services have proven to reduce an organisations phish prone percentage from 37.9% to 4.7% over 12 months of continued training
- Using the platform shows you how you compare to your peers within the industry
- Engaged and aware user base
The Result
We’ll enable your human firewall: Where staff are empowered to report suspicious emails with a single button.

Powered by


Security Operations Centre
Price on application
Our software navigates that ocean of data to hunt down threats and anomalies enabling our specialised analysts to provide an effective response, fast.
Challenges
- Expensive and specialised
- Detracts both focus and resource from core business responsibilities
- Quickly identify & understand an attack
- Board level buy in
Required Capabilities
- Monitoring without interpretation is pointless
- Team of experts
- Taking this on internally will see you drowning in logs
- Takes the data and makes it consumable for human understanding, to explain the problem and if it can it will advise on remediation
How We Can Help
- Teams of experts proactively go looking for problems
- Access to data analysts
- The tech removes the noise
- Experts pan for problems (gold)

Powered by


User Admin Privilege
Admin rights can be challenging to remove in case of an emergency, at least not until the system administrator can access the device directly or remotely, the harm could already be done, especially if the machine has been taken over by malware.
Our time saving system of managing admin rights gives your sys admins centralised management, granular control and advanced security for your entire IT network, allowing you to manage user rights safely, easily and prevent privilege abuse and data breaches due to human error.
* Ponemon Institute
Challenges
- Insider threats
- Breach detection
- Malware prevention
- Lack of resource
- Compliance and auditing
- Human error
Required Capabilities
- Staff and time to prioritise
- Centralised view of endpoint activity
- Escalation and de-escalation of admin rights
- Control over endpoint admin privileges
- Dedicated platform
How We Can Help
- The gift of time
- Centralised management
- Better protection from insider threats
- Fast track process
- Full audit trail of escalated admin rights and files executed

Powered by


Vulnerability & Patch Management
Imagine automating your patch management helping you save valuable time and resource and alleviating the need for manual input and user interruptions.
Our proactive solution will enhance your cyber resilience providing threat hunting and threat prevention to combat malware, ransomware and other evolving threats.
Customer Challenges:
- Manual process
- Time consuming
- Performed infrequently
- Data exfiltration and exploits
Required Capabilities:
- Dedicated resource and prioritisation
- Policies for enforcement
- Automating the process
How We Can Help:
- Automated vulnerability patching
- 3rd party software installation
- Granular control
- Hunting tools to anticipate attacks
- Policy deployment
- Resilience to threats

Powered by

Yes, I’d like to find out more.
Discover Our Blog
Why Are So Many Organisations Turning to Managed Security Service Providers?
Put simply your business is their primary target.