ABOUT CERTUS
Certus has been formed by a team of experienced I.T. professionals who, having held senior technical roles at a range of companies over the years sought to establish their own company. This has enabled the team to fully utilise their broad technical expertise and security skills to provide bespoke and expert services to its customers.
The team bring an impressive array of skills to the table in architecting, deploying and maintaining enterprise level solutions, and have worked with all levels of business ranging from small start-ups to large financial institutions, global cloud service providers, Fortune 50 companies and government departments."At Certus we are incredibly passionate about our work, and take great pride in our services whilst remaining absolutely focused on providing an exceptional quality of service to our clients"
Tim & Karl (Directors)
OUR SERVICES
Secure Infrastructure Design
At Certus we architect all our solutions with a Secure-By-Design methodology. Ensuring security is incorporated into a solution and not an afterthought or “nice-to-have” as is all too common. This methodology coupled with the experience our team brings, means we are able to provide secure, enterprise ready services for any of our customer’s requirements.
If you have a solution deployed that you need to be verified against your delivery scope, or you have a proposal that you need validated to be fit for purpose, we can use our experience to offer you the assurance you need that the proposal will meet your requirements or that it has been delivered as specified.
Are you stuck in design paralysis and not sure what is it you need?
Compliance Standards Implementation
Through the years we have built and delivered solutions big and small; with these experiences comes exposure to a variety of regulatory and compliance headaches and hurdles.
We can help you win at ISO bingo, to survive SOC and achieve PCI by only putting in the controls that you need. If GDPR is still a concern of yours, we have the deployment experience to help you
Infrastructure Analysis
If you have concerns regarding your infrastructure, whether related to a tangible performance issue or a lack of understanding about what your current deployment is, the team at Certus can help.
Certus have extensive experience with developing, implementing and maintaining enterprise infrastructure, we offer a full range of infrastructure analysis for server, storage, network and cloud estates, helping you identify choke-points and money pits, as well as providing system documentation and status reports
Vulnerability Assessments
Feeling vulnerable? The cyber-threatscape is wild and ever changing, with new attack vectors being developed constantly. Understanding if your systems or staff are vulnerable to attack and quantifying the risk of financial and reputational cost it poses to your company is critical, but often overlooked.
Certus can help you understand your risk profile and guide you towards a safer environment
Incident Forensics
When an incident has occurred, it is critical to find out what (or who) is to blame, retrospective analysis helps you understand what happened, and critically, to stop it happening again.
Forensic analysis is not for everyone, but if you are not sure where to start or do not have the resources to perform it yourself then we can help.
Cloud Broker
Today there are many choices on how your company can adopt the cloud, do you go Public, Private, Hybrid or adopt Multi-Public? So, which do you have and why? What’s the best solution for you? Did you pick Azure, GCP or AWS or someone else?
It is hard to make a decision and when you do, did you make the right one? The team at Certus has worked both for and with large public cloud providers so has experience in navigating these choices and the impact they have on your cloud choices.
Certus is not affiliated with any public or private cloud service provider to ensure we can offer you unbiased advice on who’s best for you and your company
Technical Project Management
Modern computer systems are complex. From hyper-converged infrastructure to containerisation, understanding just what your technical team is delivering can be a challenge on its own. Conversely, as a technical resource trying to explain what a “software-defined storage service” is to the company’s in-house Project Manager can be a fruitless task sometimes
We offer to augment your existing project management skills with our technical know-how and many years of experience working within change control processes by acting as a translation service between technical staff and board members, helping to keep everyone in check and progress in the right direction
Penetration Testing
A full vulnerability assessment is important, but sometimes a risk profile statement is not enough. We offer a range of penetration testing services to provide proof that your layers of defence are delivering on what they have promised.
From Web Application to Website, wired and wireless networks, building access control systems and remote support services, we have the tools and experience to be able to test them.
All services are private and confidential
Security Awareness Training
Security goes beyond Firewalls and Anti-Virus, it starts with people. It does not matter if you have the best lock in the world on your front door if someone leaves it open. Security Awareness Training is about ongoing education for you and your staff on how to understand and identify threats and how to react when you see one.
If you’d like us to perform simulated phishing attacks, social engineering exercises or you are interested in hearing about our catalogue of staff training material please get in touch. We will help you understand how we can tailor a training suite suitable for you and your companyVIRTUAL BOARD ROLES
As well as our other services we also offer virtual roles to help augment the competencies of your senior team
Virtual Chief
Security Officer
(vCSO)
Virtual Chief Information Officer
(vCIO)
Virtual Chief
Technology Officer
(vCTO)
OUR PRODUCTS
As well as consultancy services Certus offers a range of managed services that can be subscribed to on a P-A-Y-G model, for full details of these services get in touch and we can find a model that works for you
Anti-Virus and Anti-Malware
Heuristics and hashing based protection services from an industry leading vendor, bill by device/month
Endpoint Control
Workstation, Mobile, and Server policy enforcement and control services
Secure Web Access
Managed secure web proxies for content filtering and controlled Internet exit points. Hosted globally, including on the islands
Enterprise Logging
As data gets ‘big’, logging gets even bigger. Enterprise logging solutions are so much more than just seeing who logged on when. Get in touch to find out more about our logging architecture for SIEMs and BI analysis
Managed Hosted Services
We offer a hassle-free management of your cloud services. Get in touch to let us know what services you’ve taken, and we’ll let you know how we can help lighten the load
- Contact Us
Please get in touch if you'd like to learn more
Les Champs Vert
La Rue D'Empierre
Trinity
Jersey
JE3 5FQ