talion.net
Open in
urlscan Pro
109.228.52.122
Public Scan
Submitted URL: http://www.talion.net/
Effective URL: https://talion.net/
Submission: On March 01 via api from US — Scanned from GB
Effective URL: https://talion.net/
Submission: On March 01 via api from US — Scanned from GB
Form analysis
2 forms found in the DOMGET https://talion.net
<form role="search" method="get" id="searchform" class="searchform" action="https://talion.net">
<div class="header-search-input-holder">
<input type="text" name="s" id="s" placeholder="Search">
<input class="header-submit" type="submit">
<input type="hidden" value="site-search" name="post_type">
</div> <!-- header-search-input-holder Ends -->
</form>
GET https://talion.net/
<form action="https://talion.net/" method="get">
<div class="header-search-input-holder">
<input type="text" name="s" id="s" placeholder="Search">
<input class="header-submit" type="submit">
<input type="hidden" name="post_type" value="site-search">
</div> <!-- header-search-input-holder Ends -->
</form>
Text Content
Powered by Cookiebot * Consent * Details * [#IABV2SETTINGS#] * About THIS WEBSITE USES COOKIES We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. Consent Selection Necessary Preferences Statistics Marketing Show details Necessary 7 Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies. Calendly 1 Learn more about this provider OptanonConsentDetermines whether the visitor has accepted the cookie consent box. This ensures that the cookie consent box will not be presented again upon re-entry. Expiry: 1 yearType: HTTP Cookiebot 1 Learn more about this provider CookieConsentStores the user's cookie consent state for the current domain Expiry: 1 yearType: HTTP Hubspot 2 Learn more about this provider embed/v3/counters.gifUsed to implement forms on the website. Expiry: SessionType: Pixel __cf_bmThis cookie is used to distinguish between humans and bots. This is beneficial for the website, in order to make valid reports on the use of their website. Expiry: 1 dayType: HTTP LinkedIn 1 Learn more about this provider li_gcStores the user's cookie consent state for the current domain Expiry: 2 yearsType: HTTP Stripe 1 Learn more about this provider mDetermines the device used to access the website. This allows the website to be formatted accordingly. Expiry: 2 yearsType: HTTP YouTube 1 Learn more about this provider CONSENTUsed to detect if the visitor has accepted the marketing category in the cookie banner. This cookie is necessary for GDPR-compliance of the website. Expiry: 2 yearsType: HTTP Preferences 2 Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in. Calendly 1 Learn more about this provider _calendly_sessionIf consent is given by the visitor, this cookie allows the website to add events into the visitor's calendar. Expiry: 21 daysType: HTTP LinkedIn 1 Learn more about this provider langRemembers the user's selected language version of a website Expiry: SessionType: HTTP Statistics 10 Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously. Figma 1 Learn more about this provider ajs_anonymous_idThis cookie is used to identify a specific visitor - this information is used to identify the number of specific visitors on a website. Expiry: 29 daysType: HTTP Google 4 Learn more about this provider _gaRegisters a unique ID that is used to generate statistical data on how the visitor uses the website. Expiry: 2 yearsType: HTTP _ga_#Used by Google Analytics to collect data on the number of times a user has visited the website as well as dates for the first and most recent visit. Expiry: 2 yearsType: HTTP _gatUsed by Google Analytics to throttle request rate Expiry: 1 dayType: HTTP _gidRegisters a unique ID that is used to generate statistical data on how the visitor uses the website. Expiry: 1 dayType: HTTP Oracle 1 Learn more about this provider _at.hist.#Used by the social sharing platform AddThis to store the user's usage history of the AddThis sharing widget Expiry: PersistentType: HTML js-eu1.hs-banner.com 4 __hsscIdentifies if the cookie data needs to be updated in the visitor's browser. Expiry: 1 dayType: HTTP __hssrcUsed to recognise the visitor's browser upon reentry on the website. Expiry: SessionType: HTTP __hstcSets a unique ID for the session. This allows the website to obtain data on visitor behaviour for statistical purposes. Expiry: 1 yearType: HTTP hubspotutkSets a unique ID for the session. This allows the website to obtain data on visitor behaviour for statistical purposes. Expiry: 1 yearType: HTTP Marketing 29 Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers. Hubspot 1 Learn more about this provider __ptq.gifSends data to the marketing platform Hubspot about the visitor's device and behaviour. Tracks the visitor across devices and marketing channels. Expiry: SessionType: Pixel LinkedIn 2 Learn more about this provider bcookieUsed by the social networking service, LinkedIn, for tracking the use of embedded services. Expiry: 2 yearsType: HTTP lidcUsed by the social networking service, LinkedIn, for tracking the use of embedded services. Expiry: 1 dayType: HTTP Oracle 7 Learn more about this provider locGeolocation, which is used to help providers determine how users who share information with each other are geographically located (state level). Expiry: 1 yearType: HTTP uvcDetects how often the social sharing service, AddThis, encounters the same user. Expiry: 1 yearType: HTTP xtcRegisters the user's sharing of content via social media. Expiry: 1 yearType: HTTP __atuvcUpdates the counter of a website's social sharing features. Expiry: 1 yearType: HTTP __atuvsEnsures that the updated counter is displayed to the user if a page is shared with the social sharing service, AddThis. Expiry: 1 dayType: HTTP _at.cwwUsed by the social sharing platform AddThis Expiry: PersistentType: HTML at-randUsed by the social sharing platform AddThis Expiry: PersistentType: HTML Salesforce 7 Learn more about this provider visitor_id# [x3]Used in context with Account-Based-Marketing (ABM). The cookie registers data such as IP-addresses, time spent on the website and page requests for the visit. This is used for retargeting of multiple users rooting from the same IP-addresses. ABM usually facilitates B2B marketing purposes. Expiry: 10 yearsType: HTTP visitor_id#-hash [x3]Used to encrypt and contain visitor data. This is necessary for the security of the user data. Expiry: 10 yearsType: HTTP lpv#Used in context with behavioral tracking by the website. The cookie registers the user’s behavior and navigation across multiple websites and ensures that no tracking errors occur when the user has multiple browser-tabs open. Expiry: 1 dayType: HTTP YouTube 11 Learn more about this provider VISITOR_INFO1_LIVETries to estimate the users' bandwidth on pages with integrated YouTube videos. Expiry: 179 daysType: HTTP YSCRegisters a unique ID to keep statistics of what videos from YouTube the user has seen. Expiry: SessionType: HTTP yt.innertube::nextIdRegisters a unique ID to keep statistics of what videos from YouTube the user has seen. Expiry: PersistentType: HTML yt.innertube::requestsRegisters a unique ID to keep statistics of what videos from YouTube the user has seen. Expiry: PersistentType: HTML yt-remote-cast-availableStores the user's video player preferences using embedded YouTube video Expiry: SessionType: HTML yt-remote-cast-installedStores the user's video player preferences using embedded YouTube video Expiry: SessionType: HTML yt-remote-connected-devicesStores the user's video player preferences using embedded YouTube video Expiry: PersistentType: HTML yt-remote-device-idStores the user's video player preferences using embedded YouTube video Expiry: PersistentType: HTML yt-remote-fast-check-periodStores the user's video player preferences using embedded YouTube video Expiry: SessionType: HTML yt-remote-session-appStores the user's video player preferences using embedded YouTube video Expiry: SessionType: HTML yt-remote-session-nameStores the user's video player preferences using embedded YouTube video Expiry: SessionType: HTML v1.addthisedge.com 1 at-lojson-cache-#Used by the social sharing platform AddThis Expiry: PersistentType: HTML Unclassified 1 Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies. Figma 1 Learn more about this provider initialPathNamePending Expiry: SessionType: HTML Cross-domain consent[#BULK_CONSENT_DOMAINS_COUNT#] [#BULK_CONSENT_TITLE#] List of domains your consent applies to: [#BULK_CONSENT_DOMAINS#] Cookie declaration last updated on 27/02/2022 by Cookiebot [#IABV2_TITLE#] [#IABV2_BODY_INTRO#] [#IABV2_BODY_LEGITIMATE_INTEREST_INTRO#] [#IABV2_BODY_PREFERENCE_INTRO#] [#IABV2_LABEL_PURPOSES#] [#IABV2_BODY_PURPOSES_INTRO#] [#IABV2_BODY_PURPOSES#] [#IABV2_LABEL_FEATURES#] [#IABV2_BODY_FEATURES_INTRO#] [#IABV2_BODY_FEATURES#] [#IABV2_LABEL_PARTNERS#] [#IABV2_BODY_PARTNERS_INTRO#] [#IABV2_BODY_PARTNERS#] Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages. You can at any time change or withdraw your consent from the Cookie Declaration on our website. Learn more about who we are, how you can contact us and how we process personal data in our Privacy Policy. Please state your consent ID and date when you contact us regarding your consent. [#OOI_PERSONAL_INFORMATION#] Deny Allow selection Customize Allow all Powered by Cookiebot by Usercentrics * #RansomAware * Contact * * What We Do * Managed Detection & Response (MDR) * Hybrid SOC & Collaboration Services * Overview * Managed SOAR * Staff Augmentation * Threat Intelligence * Security Advisory & Testing * Security Platform Management * Overview * SIEM Platform Management * SIEM Content Management * Managed EDR * Managed NDR * Vulnerability Management Service * Incident Readiness & Response (IRR) * View all what we do * Why Us * Resources * Blog * Media * Resource Hub * War Stories * Glossary * View all resources * Company * Our Story * Our Values * Executive Team * Partners * Careers * View all company Demo * #RansomAware * Contact * * What We Do * Managed Detection & Response (MDR) * Hybrid SOC & Collaboration Services * Overview * Managed SOAR * Staff Augmentation * Threat Intelligence * Security Advisory & Testing * Security Platform Management * Overview * SIEM Platform Management * SIEM Content Management * Managed EDR * Managed NDR * Vulnerability Management Service * Incident Readiness & Response (IRR) * View all what we do * Why Us * Resources * Blog * Media * Resource Hub * War Stories * Glossary * View all resources * Company * Our Story * Our Values * Executive Team * Partners * Careers * View all company Demo Demo Your browser does not support the video tag. Your browser does not support the video tag. Total Transparency. Complete Control. Giving control back to businesses. Read More WELCOME TO TALION MAKING THE COMPLEX, SIMPLE. 51% of Security Leaders say the ROI of the SOC is getting worse not better, while 80% say their SOC’s complexity is very high.* We specialise in making cyber security management simpler. We leverage the vast volumes of data created across a complex web of security technologies to reduce your security risk. Through simple and easy to consume security management solutions, we deliver actionable results which drive a measurable improvement in your security outcomes. We make cyber simple. WE ARE THRILLED TO BE RANKED #33 ON 2021 MSSPS ALERT’S TOP 250 SECURITY SERVICE PROVIDERS The MSSP Alert annual list of Top MSSPs is an independent ranking of the world’s top managed security services providers. The list, updated each September, identifies and examines trends across the world’s top providers, and is gathered through a series of objective interviews, third party analyst research, and industry surveys. Discover More Watch Demo Video Get full visibility of your managed security operations. Watch Video Unsure of how to leverage your security tools to reduce business risk? Making sense of, and getting value from, your security data can be a daunting task. At Talion you can BYOT (Bring Your Own Tech); our security management platform integrates with your security technologies and utilises orchestration and automation to maximise their value. Discover More Zoom, Slack, MS Teams… cloud-platforms & supported applications have never been busier or more diverse. These real-time platforms need real time threat detection & response. Discover how we secure your cloud-based operations. Looking for a security partner, not a monthly service review? We work as an extension of your security team. We take time to understand your changing business requirements and adapt to those needs, helping you navigate the competitive landscape you operate in. Discover More * * * NEW REPORT HYBRID SOC: COULD A BEST OF BOTH WORLDS APPROACH TO MANAGED SERVICES CURE YOUR CYBER SECURITY HEADACHES? This white paper draws on dedicated research findings to reveal the cyber security challenges that are keeping decision-makers up at night, the role MSSPs currently play, how existing security strategies are performing, and how IT leaders expect this to change over time. Key Findings • Phishing attacks, ransomware and malware are the biggest cyber security threats. • 70 per cent of represented organisations are seeing between 1 and 10 cyber security incidents every week. • False positives are adding to the challenges – 47 per cent experience between 1 and 5 false alerts every week. Download here the full report Problems we solve Our aim is to reduce the complexity involved in securing your organisation and to give security teams unrivalled visibility into their security operations, so they can make optimal decisions, fast. I'm worried about the impact to my business of a cyber attack, or perhaps I've already been breached? Not understanding your cyber risk and your security posture can leave you feeling, and being, exposed. If you’re unsure of where to start, we recommend undertaking a cyber risk assessment. Understanding your cyber risk is the cornerstone to any cyber security programme and will help you to: * Prioritise and align security resources to business objectives * Inform a business case or security improvement programme * Demonstrate return on your security investment Discover more on cyber risk assessments. Download Cyber is so encompassing that my business does not know where to start. The challenge of keeping up with cyber threats is unrelenting. Recruiting and retaining an in-house cyber team with the breadth of skills to effectively protect your organisation is difficult and time consuming. Couple this with the cyber skills shortage and you can end up spending an extortionate amount of time dealing with HR, rather than securing your organisation. There are broadly three ways we can support you in this challenge: 1. Compliment your team with our cyber experts, read more on Staff Augmentation 2. Help manage your security technology to make it more effective and efficient, read more on SIEM Platform Management, SIEM Content Management, Managed EDR and Managed NDR. 3. Leverage Managed SOAR, a single platform that bridges the gap between your data and your disparate security tools, giving you visibility across your security operation. With Managed SOAR you benefit from our expertise in security orchestration & automation, and it allows you to collaborate directly with our most experienced security analysts. Learn more on Staff Augmentation, SIEM Platform Management, SIEM Content Management and our Managed Services. I have invested in security technology but am not getting the value I expected from the investment. This is a problem we see often. Many, if not most, organisation have invested in various security technologies over the years, often ending up with a web of point solutions which are difficult to manage, configure and optimise, let alone stitch together for a comprehensive view of the risk profile across your estate. If you’re running a SIEM platform in-house we have expertise to help in the management of that platform and in writing detection content that will get you fewer false-positives. However, often that does not go far enough. Managed SOAR is the hub of your security operations, it’s a single platform that bridges the gap between your data and your disparate security tools, giving you visibility across your security operation. Rather than working across multiple technologies such as SIEM, EDR and NDR, our platform unifies these systems so that your analysts have one single work bench from which they can detect, investigate and respond, with a complete picture of the threats facing your business. Learn more about SIEM Platform Management, SIEM Content Management and Managed SOAR. My security team doesn't have the time or resource to deal with the constant onslaught of security alerts, we'd rather spend our time doing other things. It’s no secret that the cyber threat is with us 24×7, it’s unrelenting and, a lot of the time the alert triage our analyst must do is, well, dull. Many of our clients want to keep the more interesting work for their in-house team and outsource the more mundane tasks to us, helping to improve job satisfaction and reduce attrition. Or, in some cases, they simply can’t justify staffing there SOC 24×7, so, we take the unsociable hours. Or you may just need the help of some cyber pros when things get hectic, you suffer a breach or perhaps it’s the Christmas retail rush. Whatever you circumstance, we run a 24×7 SOC and can offer staff augmentation to support your security operation. Discover more about Staff Augmentation options. Discover More I have too many alerts, too many false postitives and probably too many security tools. Each security tool purchase begins with the best intentions but what many security teams are left with is a complex web of technologies which are churning out too many alerts, or too many false positives. The implementation, tuning and ongoing management takes time, resources and skills and it often falls down the priority list. Our Hybrid SOC solutions can take this burden away from security teams, leaving them with more time and space to focus on what matters. Discover more on SIEM Platform Management, SIEM Content Management and Managed SOAR. What we do We build cyber security programmes that are woven into the fabric of your organisation. Previous Threat Intelligence Our Threat Intelligence team track the world’s most advanced cyber threat groups, publishing regul... Discover More Security Advisory & Testing Assess and improve your cyber security posture with expert advice and guidance. Discover More Incident Readiness & Response (IRR) In partnership with BAE Systems, we discover the critical facts fast. With unparalleled visibility of ma... Discover More Managed Detection & Response (MDR) Our UK-based SOC delivers a collaborative, threat-led MDR service offering unrivalled levels of transpar... Discover More Hybrid SOC & Collaboration Services Enhance your security operations with our Managed SOAR and staff augmentation options. Discover More Security Platform Management Our Security Platform Management Services are designed to simplify and optimise your in-house security o... Discover More Threat Intelligence Our Threat Intelligence team track the world’s most advanced cyber threat groups, publishing regul... Discover More Security Advisory & Testing Assess and improve your cyber security posture with expert advice and guidance. Discover More Incident Readiness & Response (IRR) In partnership with BAE Systems, we discover the critical facts fast. With unparalleled visibility of ma... Discover More Managed Detection & Response (MDR) Our UK-based SOC delivers a collaborative, threat-led MDR service offering unrivalled levels of transpar... Discover More Hybrid SOC & Collaboration Services Enhance your security operations with our Managed SOAR and staff augmentation options. Discover More Security Platform Management Our Security Platform Management Services are designed to simplify and optimise your in-house security o... Discover More Threat Intelligence Our Threat Intelligence team track the world’s most advanced cyber threat groups, publishing regul... Discover More Security Advisory & Testing Assess and improve your cyber security posture with expert advice and guidance. Discover More Incident Readiness & Response (IRR) In partnership with BAE Systems, we discover the critical facts fast. With unparalleled visibility of ma... Discover More Next Did we mention we like numbers? Technical 70 % of our staff are engineers, analysts and developers who build and maintain our robust managed security service. Informed 200 + We track over 200 of the world's most dangerous cyber attack groups. Collaborative 25 + We’re assembling a collaborative community of experts and innovators, a comprehensive team of industry partners primed to tackle threats from all angles. Whatever your business needs, we have a solution that will fit them. View Your data, demystified. Collaborate Side-by-side support. Control Built on your terms. Whatever your business needs, we have a solution that will fit them. Security solutions you can see We don’t do black-box solutions. You have full visibility across absolutely everything that goes on in our SOC, 24 hours a day, 7 days a week. Request a demo Protecting Your Business We’re your cyber security partner, which means we operate in a way that works for you, whether that’s working through responses together, or simply briefing you on the threats that really need your attention. Request a demo Built on your terms. We grow with your business, adapting to your changing needs, responding to the evolving threat, and putting control firmly back in your hands. Request a demo #RansomAware #RansomAware is a movement to encourage organisations to share experiences, exchange ideas and pool intelligence on ransomware attacks. We believe that the more companies who expose how they were attacked, by whom, if they paid the ransom and if their data was recovered, the more we can learn about attacker tactics, techniques, and procedures to shore up our defences and fight back against ransomware. Discover More Resources Keep up to date with the latest from our industry experts. * Blog * Media * Hub * Glossary Popular Resources All Resources Previous Blog Strategic Cyber Security Advice for Executives Discover More Case Study Talion Threat Intelligence Highlighted North Korean Threat Discover More Blog Is Legal Privilege a Help or Hindrance Following a Data Breach? Discover More Report Ransomware Perceptions Report, 2021 Discover More Blog Is Cyber Insurance Fuelling the Ransomware Crisis? Key Roundtable Takeaways Discover More Podcast Threat Set Radio #131 Discover More Webinars Live Debate: Is Cyber Insurance Fuelling the Ransomware Crisis? Discover More Podcast Threat Set Radio #130 Discover More Podcast Threat Set Radio #129 Discover More Podcast Threat Set Radio #128 Discover More Podcast Threat Set Radio #127 Discover More Report Hybrid SOC: Could a best of both worlds approach to managed services cure your cyber se... Discover More Webinars The Threat of Ransomware to UK Businesses and How to Mitigate it Discover More Podcast Threat Set Radio #126 Discover More Podcast Threat Set Radio #125 Discover More Podcast Threat Set Radio #124 Discover More Podcast Threat Set Radio #123 Discover More Blog Join the #RansomAware Movement Discover More Blog Security in the Cloud Discover More Podcast Threat Set Radio #122 Discover More Podcast Threat Set Radio #121 Discover More Podcast Threat Set Radio #120 Discover More Podcast Threat Set Radio #119 Discover More Podcast Threat Set Radio #118 Discover More Podcast Threat Set Radio #117 Discover More Podcast Threat Set Radio #116 Discover More Podcast Threat Set Radio #115 Discover More Webinars Mapping risk and understanding your threat coverage Discover More Podcast Threat Set Radio #114 Discover More Podcast Threat Set Radio #112 Discover More Podcast Threat Set Radio #111 Discover More Podcast Threat Set Radio #110 Discover More Podcast Threat Set Radio #109 Discover More Webinars Hybrid SOC: Improving Security Outcomes Through Collaboration & Transparency Discover More Podcast Threat Set Radio #108 Discover More Press Women hold only 10% of board positions in top cyber security companies Discover More Press Microsoft Exchange Attacks Declared Emergency By Homeland Security Discover More Podcast Threat Set Radio #107 Discover More Podcast Threat Set Radio #105 Discover More Blog A Ransomware Pandemic Discover More Blog Threat Intelligence Assessment – SolarWinds Discover More Podcast Threat Set Radio #102 Discover More Case Study Data breach ransomware demands and establishing the truth Discover More Case Study Talion’s OSINT Glass Service Thwarts Attack on Law Firm’s Head Office Discover More Blog Your Incident Response Check List Discover More Blog Strategic Cyber Security Advice for Executives Discover More Case Study Talion Threat Intelligence Highlighted North Korean Threat Discover More Blog Is Legal Privilege a Help or Hindrance Following a Data Breach? Discover More Report Ransomware Perceptions Report, 2021 Discover More Blog Is Cyber Insurance Fuelling the Ransomware Crisis? Key Roundtable Takeaways Discover More Podcast Threat Set Radio #131 Discover More Webinars Live Debate: Is Cyber Insurance Fuelling the Ransomware Crisis? Discover More Podcast Threat Set Radio #130 Discover More Podcast Threat Set Radio #129 Discover More Podcast Threat Set Radio #128 Discover More Podcast Threat Set Radio #127 Discover More Report Hybrid SOC: Could a best of both worlds approach to managed services cure your cyber se... Discover More Webinars The Threat of Ransomware to UK Businesses and How to Mitigate it Discover More Podcast Threat Set Radio #126 Discover More Podcast Threat Set Radio #125 Discover More Podcast Threat Set Radio #124 Discover More Podcast Threat Set Radio #123 Discover More Blog Join the #RansomAware Movement Discover More Blog Security in the Cloud Discover More Podcast Threat Set Radio #122 Discover More Podcast Threat Set Radio #121 Discover More Podcast Threat Set Radio #120 Discover More Podcast Threat Set Radio #119 Discover More Podcast Threat Set Radio #118 Discover More Podcast Threat Set Radio #117 Discover More Podcast Threat Set Radio #116 Discover More Podcast Threat Set Radio #115 Discover More Webinars Mapping risk and understanding your threat coverage Discover More Podcast Threat Set Radio #114 Discover More Podcast Threat Set Radio #112 Discover More Podcast Threat Set Radio #111 Discover More Podcast Threat Set Radio #110 Discover More Podcast Threat Set Radio #109 Discover More Webinars Hybrid SOC: Improving Security Outcomes Through Collaboration & Transparency Discover More Podcast Threat Set Radio #108 Discover More Press Women hold only 10% of board positions in top cyber security companies Discover More Press Microsoft Exchange Attacks Declared Emergency By Homeland Security Discover More Podcast Threat Set Radio #107 Discover More Podcast Threat Set Radio #105 Discover More Blog A Ransomware Pandemic Discover More Blog Threat Intelligence Assessment – SolarWinds Discover More Podcast Threat Set Radio #102 Discover More Case Study Data breach ransomware demands and establishing the truth Discover More Case Study Talion’s OSINT Glass Service Thwarts Attack on Law Firm’s Head Office Discover More Blog Your Incident Response Check List Discover More Blog Strategic Cyber Security Advice for Executives Discover More Case Study Talion Threat Intelligence Highlighted North Korean Threat Discover More Blog Is Legal Privilege a Help or Hindrance Following a Data Breach? Discover More Next All Resources Testimonials Don’t just take our word for it. Previous Talion’s model is based on people and partnership and not just technology… We spoke with others who aspired to this, but it simply wasn’t what they did; they had a much greater focus on dashboards and alerts. In contrast, the people at Talion told us: ‘We’re here when you need us – just pick up the phone. We can meet weekly, monthly – whatever works for you. We’re here to help.’ It was hugely important for us. Senior Director – Security Operations One of Britain’s Largest Technology Companies Talion have been a fantastic partner to work with and I really see them as an extension of our team. Having the skillset and agility of a growing organisation but the talent and capability of a much larger organisation from which they were formed, BAE Systems, has proven a great combination. The team work hard to continuously demonstrate and add value to their customers and are always receptive to feedback. Director of Information Security and Risk One of North America’s largest providers of funeral and cemetery services At every level, [the team] gave us quantitative, analytical advice, in the moment, … [You] enabled us to take the business judgements that cyber security requires you to take. CEO FTSE 250 Company Next Our Partners We recognise that there are times when we can’t do it all, where knowledge resides with other parties. Which is why we’re assembling a collaborative community of experts and innovators, a comprehensive team of industry partners primed to tackle threats from all angles. Previous Next I'M READY Request a more in-depth demo. Get Started DISCUSS YOUR CYBER SECURITY NEEDS Fill in the form below and one of our team will be in touch to arrange your demo. CALL US ON 0800 048 5775 Call us directly and we’ll put you in touch with the most relevant cyber expert. Request A Call SEND US A MESSAGE Give us a brief description of what you’re looking for and we’ll put you in touch with the best person. Send A Message * What We Do * Why Us * Resources * Company * Careers Client Login * t+44 (0) 800 048 5775 * ehello@talion.net Subscribe to stay up to date * © Talion 2022 . SY4 Security Limited trading as Talion. All rights reserved. * Privacy * * * * * Design Agency: Steve Edge Design