Cyber crime is big business and you're an easy target

Reduce cyber attacks and gain benefits from Cyber Insurance

76% of all ransomware infections occur outside working hours. The average financial impact, not including ransom payments, are $188,000.

Take a stand, manage your cyber risk and protect your business without breaking the bank. 

Our business cybersecurity service makes you a harder target. A small business cyber security plan makes you a less enticing option in a blue ocean for cyber criminals. 

Not what you where looking for?

For Artificial Intelligence, Machine Learning and Analytics services in the UK. Please go to https://www.amplifyintelligence.co.uk

What our customers and partners say


Helps us meet our compliance requirements

"Amplify Intelligence provides a comprehensive service that helps us to meet the strict contractual requirements of our clients. We are now able to make informed decisions and prioritising actions, to improve our business’s security.”

Andrew

Director, Regional Business (Property Valuer)

Lets us see our risks and simple changes to improve it

“Amplify Intelligence's service lets us see our risks, allows us to set benchmarks and measure them over time. It helps us make practical changes to our IT setup by highlighting the issues and providing practical fixes.”

Michael

CFO, not-for-profit organization

Combine Amplify Intelligence's cyber safety service with cyber insurance and stop hackers in their tracks

How our service works

With a cyber attack taking place once every 39 seconds, standard anti-virus software or a firewall won't keep your business safe. Amplify Intelligence’s Cyber Safety Service is the result of 20 years’ experience building cyber defences for banks and government agencies around the world, and can help you keep tabs on your online security, like the big corporations.

Comprehensive Protection

Manage cyber risk across all your connected mobile devices and laptops, as well as Internet-Of-Things (IoT) hardware devices. Give your business bank-like defences.

Security Expert Advice

Identify and fix security issues within your IT systems using practical steps from security experts that are tailored to your industry, sector, and your business. 


Compliance Assistance

Meet and maintain compliance with international standards such as ISO 27001 & SOC 2 using approved enterprise-grade security policies and controls.


Awareness and Training

Stay up-to-date on the latest scams and attacks with company-specific education and advice to your staff, to help them stay safe at home and work.


Tailored cyber risk management for small businesses


Amplify Intelligence’s all-in-one Cyber Safety Service helps you:

  • Identify and mitigate vulnerabilities
  • Prevent business interruption from cyber attacks
  • Meet compliance requirements
  • Reduce insurance premiums

Four bank-grade capabilities supported by global security experts rolled into one Cyber Safety Service:

  • Enterprise-level vulnerability testing and network monitoring
  • Global cyber threat intelligence
  • Tailored security awareness and training
  • Compliance-ready security policies and procedures 

Get bank-grade cybersecurity

Protect customer and staff Personal Identification Information (PII), commercial Secrets, and intellectual property. Meet your compliance obligations and prevent cyber interruptions to your business.

Our office:

Send us a message:

FAQ: 

Here you can find the most frequent asked questions.

What is the Cyber Safety Service?

The brAIn-box forms one part of a distributed system for high-grade passive security monitoring (Intrusion Detection System), active vulnerability scanning, as well as remote analysis through threat intelligence. It looks at all the vulnerabilities in the computer systems and mobile devices in the business and all the connections they make to the internet.

What is active Vulnerability Scanning?

Vulnerabilities are defects in software that impact the security of the software and or the host system it is running on. Some defects can be determined by interacting with the software --typically by actively sending to it and receiving from its messages (bytes). The brAIn-box contains a large knowledge base of software, vulnerabilities, and the sequence of messages required to determine the existence of the particular vulnerability on the particular host.

There is always a risk that any scanning will cause vulnerable software to fail, potentially hanging up the host so that it needs to be reset. The brAIn-box scans are set to be least aggressive so as to reduce that likelihood. However, this may mean that not every vulnerability will be found. For example, some network printers can hang on being scanned -- when the brAIn-box encounters a printer in a detailed scan (see below), it does the lightest scanning possible for that device.

The brAIn-box has a two-tier scanning system. A light-weight radar-like sweep-scan of all devices it can see on the local network -- to provide a list of target hosts for further investigation. A focused, more thorough, vulnerability scan that provides detailed information about the vulnerabilities discovered, their severity, and potential remediations (if remediation is known).

All scanning activities can be triggered by a remote interface. As well as being remotely triggerable, the sweep-scan is automatically run after a reboot of the brAIn-box. All other scans need to be triggered remotely.

Requested scans are only performed during normal office hours. This is to ensure the maximum number of devices are visible for scanning. Each scan produces a technical report.

How do you manage my data and information security?

  • Data in transit. Data recorded by the brAIn-box (both passively collected, and actively triggered) is transferred periodically to the cloud-based environment. The transfer of each data file is encrypted using SSL. For each SSL connection, the destination SSL certificate is verified before data is transferred.
  • Data at Rest. Data stored in the cloud is encrypted using AES256. Access to data is strictly controlled through strong access controls. The access controls are provided by the AWS hosting environment.
  • Data location. The data stored is stored in one of two physical regions -- Australia or the United Kingdom. If the brAIn-box is located in Australia, then the data it generates will be transmitted and stored in the Australian data centre. If the brAIn-box is located in the United Kingdom, then the data it generates will be transmitted and stored in the United Kingdom data centre.
  • What are the hardware capabilities of the brAIn-box?

    The physical brAIn-box is a network device constructed from solid state components. Network connectivity from any computer or device is provided by connecting the current business network through a performant network switch with port mirroring capabilities. The processing of monitored traffic and vulnerability scanning is performed on a dedicated hardware module. Network availability is paramount -- both the switch and the processing module are designed for high availability. The switch will maintain network traffic in the unlikely event of the processing module failure.

    What Threat Intelligence do you provide?

    We utilise over fifty of the best global threat intelligence capabilities. These consist of the latest information on all the latest 0-day vulnerabilities, ransomware, banking malware, phishing sites, command and control servers. We have can tailor our service based on your business locations and employ relevant intelligence of specific campaigns targeting organisations in those regions. This is checked against every connection that each computer in your network and whether they may already be compromised.

    What is the difference between processing network security monitoring data and processing personal data?

    The Cyber Safety Service is a processor of network security data. It is not a processor of personal data; does not contain reasonably extractable personally identifiable information.


    Data in transit: Data recorded by the brAIn-box (both passively collected, and actively triggered) is transferred periodically to the cloud-based environment. The transfer of each data file is encrypted using SSL. For each SSL connection, the destination SSL certificate is verified before data is transferred.


    Data at Rest: Data stored in the cloud is encrypted using AES256. Access to data is strictly controlled through strong access controls. The access controls are provided by the AWS hosting environment. 


    Data location: The data stored is stored in one of two physical regions -- Australia or the United Kingdom. If the brAIn-box is located in Australia, then the data it generates will be transmitted and stored in the Australian data centre. If the brAIn-box is located in the United Kingdom, then the data it generates will be transmitted and stored in the United Kingdom data centre.


    How do you provide continuous network monitoring & IT Forensics?

    The passive security monitoring provided by the brAIn-box is processing the network traffic from each computer in your business constantly. The brAIn-box data is used to generate a report for each type of network traffic. We also log this securely to provide forensic data for determining your GDPR or Mandatory Breach notification obligations as well as determining impact to assist recovery in either an incident or day to day clean-up of security risks.

    How do you protect my privacy and collection and storage my data?

    Data collected by the brAIn-box is periodically transferred to secure cloud storage. Amplify Intelligence’s cloud provider is Amazon Web Services.


    The brAIn-box does not set out to collect and record personally identifiable or other sensitive data. However, some of the summary data it records could possibly contain such data. For example, if a user is searching the internet for their own name, this name will be recorded in the URL of the web search.

    What if I want my data erased?

    On cessation of using the Service, all recorded data from the respective brAIn-box is deleted from the data store to which it is connected. As we do not install any software on any of your computers it is simple to remove our service.

    Insert Content Template or Symbol