secrutiny.com Open in urlscan Pro
185.53.56.90  Public Scan

URL: https://secrutiny.com/
Submission: On February 23 via manual from PL — Scanned from GB

Form analysis 3 forms found in the DOM

GET https://secrutiny.com/

<form role="search" class="searchform fusion-search-form  fusion-search-form-clean" method="get" action="https://secrutiny.com/">
  <div class="fusion-search-form-content">
    <div class="fusion-search-field search-field">
      <label><span class="screen-reader-text">Search for:</span>
        <input type="search" value="" name="s" class="s" placeholder="Search..." required="" aria-required="true" aria-label="Search...">
      </label>
    </div>
    <div class="fusion-search-button search-button">
      <input type="submit" class="fusion-search-submit searchsubmit" aria-label="Search" value="">
    </div>
  </div>
</form>

GET https://secrutiny.com/

<form role="search" class="searchform fusion-search-form  fusion-search-form-clean" method="get" action="https://secrutiny.com/">
  <div class="fusion-search-form-content">
    <div class="fusion-search-field search-field">
      <label><span class="screen-reader-text">Search for:</span>
        <input type="search" value="" name="s" class="s" placeholder="Search..." required="" aria-required="true" aria-label="Search...">
      </label>
    </div>
    <div class="fusion-search-button search-button">
      <input type="submit" class="fusion-search-submit searchsubmit" aria-label="Search" value="">
    </div>
  </div>
</form>

POST https://maillist-manage.eu/weboptin.zc

<form method="POST" id="zcampaignOptinForm" style="margin: 0px; width: 100%" action="https://maillist-manage.eu/weboptin.zc" target="_zcSignup">
  <div style="background-color: rgb(220, 220, 220); padding: 10px; color: rgb(210, 0, 0); font-size: 11px; margin: 20px 10px 0px; border: 1px solid rgb(220, 220, 220); opacity: 1; display: none" id="errorMsgDiv">Please correct the marked field(s)
    below.</div>
  <div style="position: relative; width: 218px; height: 30px; margin-top: 20px; display: inline-block">
    <div id="Zc_SignupSuccess" style="position: absolute; width: 87%; background-color: white; padding: 3px; border: 3px solid rgb(194, 225, 154); margin-bottom: 10px; word-break: break-all; opacity: 1; display: none">
      <div style="width: 20px; padding: 5px; display: table-cell"><img class="successicon" src="https://campaigns.zoho.com/images/challangeiconenable.jpg" style="width: 20px"></div>
      <div style="display: table-cell"><span id="signupSuccessMsg" style="color: rgb(73, 140, 132); font-family: sans-serif; font-size: 14px; line-height: 30px; display: block"></span></div>
    </div>
    <p><input type="text"
        style="font-size: 14px; border-width: 0px 0px 1px; border-style: solid; width: 100%; height: 100%; z-index: 4; outline: none; padding: 5px 10px; box-sizing: border-box; color: rgb(37, 55, 70); text-align: left; font-family: Arial; background-color: rgb(255, 255, 255); border-color: rgb(234, 235, 237)"
        placeholder="Email" changeitem="SIGNUP_FORM_FIELD" name="CONTACT_EMAIL" id="EMBED_FORM_EMAIL_LABEL"></p>
  </div>
  <div style="position: relative; width: 218px; height: 30px; margin-top: 20px; display: inline-block"><input type="text"
      style="font-size: 14px; border-width: 0px 0px 1px; border-color: rgb(235, 235, 235); border-style: solid; width: 100%; height: 100%; z-index: 4; outline: none; padding: 5px 10px; box-sizing: border-box; color: rgb(37, 55, 70); text-align: left; font-family: Arial; background-color: rgb(255, 255, 255)"
      placeholder="Name" changeitem="SIGNUP_FORM_FIELD" name="FIRSTNAME" id="FIRSTNAME"></div>
  <div style="position: relative; width: 218px; height: 40px; margin: 20px 0 15px; display: inline-block"><input type="button"
      style="text-align: center; width: 100%; height: 100%; z-index: 5; border: 0px rgb(235, 51, 0); color: rgb(255, 255, 255); border-radius: 2px; cursor: pointer; outline: none; font-size: 14px; background-color: rgb(235, 51, 0)"
      name="SIGNUP_SUBMIT_BUTTON" id="zcWebOptin" value="SUBMIT"
      onclick="saveOptin(this,false,function runOnFormSubmit_sf3zda428ed4168148554b2e4355e86691e63c4cb14d93055015265a207c8f6b98b2(th){/*Before submit, if you want to trigger your event, &quot;include your code here&quot;*/},'#sf3zda428ed4168148554b2e4355e86691e63c4cb14d93055015265a207c8f6b98b2[data-type=&quot;signupform_0&quot;] ',event);">
  </div>
  <p><input type="hidden" id="fieldBorder" value="rgb(234, 235, 237)"><input type="hidden" id="submitType" name="submitType" value="optinCustomView"><input type="hidden" id="emailReportId" name="emailReportId" value=""><input type="hidden"
      id="formType" name="formType" value="QuickForm"><input type="hidden" name="zx" id="cmpZuid" value="14ac2bfe6a"><input type="hidden" name="zcvers" value="2.0"><input type="hidden" name="oldListIds" id="allCheckedListIds" value=""><input
      type="hidden" id="mode" name="mode" value="OptinCreateView"><input type="hidden" id="zcld" name="zcld" value="185c36290733c52"><input type="hidden" id="zctd" name="zctd" value=""><input type="hidden" id="document_domain" value=""><input
      type="hidden" id="zc_Url" value="secr.maillist-manage.eu"><input type="hidden" id="new_optin_response_in" value="0"><input type="hidden" id="duplicate_optin_response_in" value="0"><input type="hidden" name="zc_trackCode" id="zc_trackCode"
      value="ZCFORMVIEW"><input type="hidden" id="zc_formIx" name="zc_formIx" value="3zda428ed4168148554b2e4355e86691e63c4cb14d93055015265a207c8f6b98b2"><input type="hidden" id="viewFrom" value="URL_ACTION"><span style="display: none"
      id="dt_CONTACT_EMAIL">1,true,6,Contact Email,2</span><span style="display: none" id="dt_FIRSTNAME">1,false,1,First Name,2</span><span style="display: none" id="dt_LASTNAME">1,false,1,Last Name,2</span></p><input type="text"
    style="display:none !important;" name="qs" class="ih"><input type="text" style="display:none !important;" name="lf" class="ih" value="1645599808036"><input type="hidden" name="di" value="1145312199171412881645599808036"><input type="hidden"
    id="apbct_visible_fields_2" name="apbct_visible_fields"
    value="{&quot;0&quot;:{&quot;visible_fields&quot;:&quot;CONTACT_EMAIL FIRSTNAME SIGNUP_SUBMIT_BUTTON&quot;,&quot;visible_fields_count&quot;:3,&quot;invisible_fields&quot;:&quot;submitType emailReportId formType zx zcvers oldListIds mode zcld zctd zc_trackCode zc_formIx qs lf di&quot;,&quot;invisible_fields_count&quot;:14}}">
</form>

Text Content

Skip to content
 * EMERGENCY INCIDENT RESPONSE
 * Secrutiny NL

 * EMERGENCY INCIDENT RESPONSE
 * Secrutiny NL


Search for:


 * WHAT WE DO
   * Cyber Maturity Programme
   * Cyber Risk Analyser
   * Cyber Controls
   * Security Operations Centre and Reporting
   * Assurance Testing
   * Incident Response
   * Cyber Recovery
   * Advisory Services
 * ABOUT US
 * RESOURCES
   * Blog
   * E-Books & Reports
   * Infographics
   * Upcoming Events
   * Webinars & Videos
   * Podcasts
 * CONTACT US
 * 


 * WHAT WE DO
   * Cyber Maturity Programme
   * Cyber Risk Analyser
   * Cyber Controls
   * Security Operations Centre and Reporting
   * Assurance Testing
   * Incident Response
   * Cyber Recovery
   * Advisory Services
 * ABOUT US
 * RESOURCES
   * Blog
   * E-Books & Reports
   * Infographics
   * Upcoming Events
   * Webinars & Videos
   * Podcasts
 * CONTACT US


Search for:


 
Secrutiny Cybersecurity Servicesneilphil2022-01-18T13:57:03+00:00


WHAT WE DO

We work with you to analyse where you are on your cyber journey and then produce
a practical plan to reduce risk. We aim to compliment existing investments in
your technology and people.




cyber maturity programme
Cyber Risk Analyser
Cyber Controls
Security Operations Centre and Reporting
Assurance Testing
Incident Response
Cyber Recovery
Advisory Services




WHY CHOOSE SECRUTINY?

Secrutiny brings clarity of vision and a sense of purpose to the cybersecurity
sector. To our founders, it was apparent that complex, mis-configured and
disconnected security solutions were widespread, leading to confusion,
cyberbreaches and greater costs for businesses. For better security and peace of
mind, you deserve:

 * A practical approach in order to get the most from your current investments.
 * Assurance where your existing controls are working.
 * A GAP analysis of blind spots based on your risk appetite.
 * A cyber investment plan driven by evidenced risks.




BLOG

 * USING CYBER RISK ANALYSER TO COMBAT 3 COMMON SECURITY MISTAKES


USING CYBER RISK ANALYSER TO COMBAT 3 COMMON SECURITY MISTAKES

secrutiny2022-02-18T11:05:42+00:00February 15, 2022|



 * HOW TO KEEP RANSOMWARE AT BAY? A CONTINUOUS SECURITY ASSURANCE PROCESS!


HOW TO KEEP RANSOMWARE AT BAY? A CONTINUOUS SECURITY ASSURANCE PROCESS!

secrutiny2022-02-18T10:58:21+00:00February 2, 2022|



 * MULTI-FACTOR AUTHENTICATION: LOW-COST HIGH-REWARD CYBERSECURITY CONTROL


MULTI-FACTOR AUTHENTICATION: LOW-COST HIGH-REWARD CYBERSECURITY CONTROL

secrutiny2022-02-14T12:46:56+00:00January 18, 2022|



Join us in London on the 1st of March to discover global developments in the
latest and greatest game-changing technologies, and to help you filter out the
ones to watch. Next In Cyber RESOURCES SECRUTINY REGISTER NOW Join Secrutiny’s
Director of Product Development and Operations, John Winchester and Cymulate’s
Director and Cyber Evangelist, Dave Klein as they discuss 2021 ransomware survey
results and the secret to ransomware resiliency. Surviving Ransomware in 2022
RESOURCES SECRUTINY LISTEN NOW! Very occasionally in this world we see a market
completely disrupted. Something deemed financially out of reach to the majority
becomes very affordable. This session is about why everyone can
afford-enterprise grade SOC/ SIEM. When Fine Dining Really Does Become All
Inclusive RESOURCES SECRUTINY WATCH NOW! The threat landscape continues to
shift, with more industries under increased risk of cyberattack from pesky cyber
criminals. Keep your organisation safe with our recommended (and free) security
tools, including intrusion detection systems, open-source penetration testing
tools, and vulnerability scanners to threat hunting and real-world intelligence.
12 Tools to Test Your Security Function Without Breaking the Bank RESOURCES
SECRUTINY READ MORE & GET YOUR COPY OF THE E-BOOK It is a round the clock
challenge to secure your organisation; but it’s made even more so by a tendency
to be distracted by threat rather than focusing on business risk. Time for a
Cyber Risk Perspective RESOURCES SECRUTINY READ MORE & GET YOUR COPY OF THE
E-BOOK In this podcast, we discuss best practices that CISO’s should consider
adopting in 2022. Tune in as we explore the planning of a 12-18 month strategy,
supply chain challenges, issues with poor cloud configurations, leveraging
breach attack simulations, and why security controls are so important.
Secrutiny’s 2022 Cybersecurity New Year’s Resolutions RESOURCES SECRUTINY LISTEN
NOW!
"We use Secrutiny because they are always keeping us up to date with emerging
technologies that challenge the norm, to make us better or save us money. They
will have completed the due diligence to reduce our risk and will always deliver
on their commitment” Real Estate - IT Infrastructure Specialist “Secrutiny’s
Cyber Risk Analyser (CRA) has provided comprehension of risks that we were not
aware of. The results will be used to make informed decisions that embed
security by design according to IT operations.” Investment Management -
Information Security Manager
“Traditional cyber audits are based on paper exercises; giving a generic view of
risk based on policy, process and controls in place. Over nearly 30 years in
information security, Secrutiny’s CRA has given the most meaningful results by
far.” Construction - Cyber and Information Security Manager “Secrutiny provide a
service that is more cost-effective than me building out my team to manage
security. They also have the market knowledge to keep my security toolkit ahead
of the curve, ensuring the firm is secure.” Legal - Head of IT


TESTIMONIALS

“Secrutiny’s Cyber Risk Analyser (CRA) has provided comprehension of risks that
we were not aware of. The results will be used to make informed decisions that
embed security by design according to IT operations.”

Investment Management
Information Security Manager


“Traditional cyber audits are based on paper exercises; giving a generic view of
risk based on policy, process and controls in place. Over nearly 30 years in
information security, Secrutiny’s CRA has given the most meaningful results by
far.”

Construction
Cyber and Information Security Manager


“Secrutiny provide a service that is more cost-effective than me building out my
team to manage security. They also have the market knowledge to keep my security
toolkit ahead of the curve, ensuring the firm is secure.”

Legal
Head of IT


“We use Secrutiny because they are always keeping us up to date with emerging
technologies that challenge the norm, to make us better or save us money. They
will have completed the due diligence to reduce our risk and will always deliver
on their commitment”

Real Estate
IT Infrastructure Specialist


COMPANY

 * About Us
 * Blog
 * E-Books & Reports
 * Events and Webinars
 * Infographics
 * Podcasts
 * Testimonials



CONTACT

Call Us
+44 (0)203 8232 999

Email the Team
info@secrutiny.com




RECEIVE NEWS

  Thank you for Signing Up

Please correct the marked field(s) below.






1,true,6,Contact Email,21,false,1,First Name,21,false,1,Last Name,2

Secrutiny – Newsletter Form










Cookies and Privacy Policy | Site Map |copyright © 2021 SECRUTINY |
wag-design.com




Page load link
We use cookies to help us understand and serve you better. To find out more
about the cookies we use, see our Privacy Policy. Learn More Got it!

X

Go to Top