talion.net Open in urlscan Pro
109.228.52.122  Public Scan

URL: https://talion.net/
Submission: On March 23 via api from US — Scanned from GB

Form analysis 2 forms found in the DOM

GET https://talion.net

<form role="search" method="get" id="searchform" class="searchform" action="https://talion.net">
  <div class="header-search-input-holder">
    <input type="text" name="s" id="s" placeholder="Search">
    <input class="header-submit" type="submit">
    <input type="hidden" value="site-search" name="post_type">
  </div> <!-- header-search-input-holder Ends -->
</form>

GET https://talion.net/

<form action="https://talion.net/" method="get">
  <div class="header-search-input-holder">
    <input type="text" name="s" id="s" placeholder="Search">
    <input class="header-submit" type="submit">
    <input type="hidden" name="post_type" value="site-search">
  </div> <!-- header-search-input-holder Ends -->
</form>

Text Content

Powered by Cookiebot
 * Consent
 * Details
 * [#IABV2SETTINGS#]
 * About


THIS WEBSITE USES COOKIES

We use cookies to personalise content and ads, to provide social media features
and to analyse our traffic. We also share information about your use of our site
with our social media, advertising and analytics partners who may combine it
with other information that you’ve provided to them or that they’ve collected
from your use of their services.
Consent Selection
Necessary

Preferences

Statistics

Marketing

Show details
Necessary 7

Necessary cookies help make a website usable by enabling basic functions like
page navigation and access to secure areas of the website. The website cannot
function properly without these cookies.
Calendly
1
Learn more about this provider
OptanonConsentDetermines whether the visitor has accepted the cookie consent
box. This ensures that the cookie consent box will not be presented again upon
re-entry.
Expiry: 1 yearType: HTTP
Cookiebot
1
Learn more about this provider
CookieConsentStores the user's cookie consent state for the current domain
Expiry: 1 yearType: HTTP
Hubspot
2
Learn more about this provider
embed/v3/counters.gifUsed to implement forms on the website.
Expiry: SessionType: Pixel
__cf_bmThis cookie is used to distinguish between humans and bots. This is
beneficial for the website, in order to make valid reports on the use of their
website.
Expiry: 1 dayType: HTTP
LinkedIn
1
Learn more about this provider
li_gcStores the user's cookie consent state for the current domain
Expiry: 2 yearsType: HTTP
Stripe
1
Learn more about this provider
mDetermines the device used to access the website. This allows the website to be
formatted accordingly.
Expiry: 2 yearsType: HTTP
YouTube
1
Learn more about this provider
CONSENTUsed to detect if the visitor has accepted the marketing category in the
cookie banner. This cookie is necessary for GDPR-compliance of the website.
Expiry: 2 yearsType: HTTP
Preferences 2

Preference cookies enable a website to remember information that changes the way
the website behaves or looks, like your preferred language or the region that
you are in.
Calendly
1
Learn more about this provider
_calendly_sessionIf consent is given by the visitor, this cookie allows the
website to add events into the visitor's calendar.
Expiry: 21 daysType: HTTP
LinkedIn
1
Learn more about this provider
langRemembers the user's selected language version of a website
Expiry: SessionType: HTTP
Statistics 10

Statistic cookies help website owners to understand how visitors interact with
websites by collecting and reporting information anonymously.
Figma
1
Learn more about this provider
ajs_anonymous_idThis cookie is used to identify a specific visitor - this
information is used to identify the number of specific visitors on a website.
Expiry: 29 daysType: HTTP
Google
4
Learn more about this provider
_gaRegisters a unique ID that is used to generate statistical data on how the
visitor uses the website.
Expiry: 2 yearsType: HTTP
_ga_#Used by Google Analytics to collect data on the number of times a user has
visited the website as well as dates for the first and most recent visit.
Expiry: 2 yearsType: HTTP
_gatUsed by Google Analytics to throttle request rate
Expiry: 1 dayType: HTTP
_gidRegisters a unique ID that is used to generate statistical data on how the
visitor uses the website.
Expiry: 1 dayType: HTTP
Oracle
1
Learn more about this provider
_at.hist.#Used by the social sharing platform AddThis to store the user's usage
history of the AddThis sharing widget
Expiry: PersistentType: HTML
js-eu1.hs-banner.com
4
__hsscIdentifies if the cookie data needs to be updated in the visitor's
browser.
Expiry: 1 dayType: HTTP
__hssrcUsed to recognise the visitor's browser upon reentry on the website.
Expiry: SessionType: HTTP
__hstcSets a unique ID for the session. This allows the website to obtain data
on visitor behaviour for statistical purposes.
Expiry: 1 yearType: HTTP
hubspotutkSets a unique ID for the session. This allows the website to obtain
data on visitor behaviour for statistical purposes.
Expiry: 1 yearType: HTTP
Marketing 29

Marketing cookies are used to track visitors across websites. The intention is
to display ads that are relevant and engaging for the individual user and
thereby more valuable for publishers and third party advertisers.
Hubspot
1
Learn more about this provider
__ptq.gifSends data to the marketing platform Hubspot about the visitor's device
and behaviour. Tracks the visitor across devices and marketing channels.
Expiry: SessionType: Pixel
LinkedIn
2
Learn more about this provider
bcookieUsed by the social networking service, LinkedIn, for tracking the use of
embedded services.
Expiry: 2 yearsType: HTTP
lidcUsed by the social networking service, LinkedIn, for tracking the use of
embedded services.
Expiry: 1 dayType: HTTP
Oracle
7
Learn more about this provider
locGeolocation, which is used to help providers determine how users who share
information with each other are geographically located (state level).
Expiry: 1 yearType: HTTP
uvcDetects how often the social sharing service, AddThis, encounters the same
user.
Expiry: 1 yearType: HTTP
xtcRegisters the user's sharing of content via social media.
Expiry: 1 yearType: HTTP
__atuvcUpdates the counter of a website's social sharing features.
Expiry: 1 yearType: HTTP
__atuvsEnsures that the updated counter is displayed to the user if a page is
shared with the social sharing service, AddThis.
Expiry: 1 dayType: HTTP
_at.cwwUsed by the social sharing platform AddThis
Expiry: PersistentType: HTML
at-randUsed by the social sharing platform AddThis
Expiry: PersistentType: HTML
Salesforce
7
Learn more about this provider
visitor_id# [x3]Used in context with Account-Based-Marketing (ABM). The cookie
registers data such as IP-addresses, time spent on the website and page requests
for the visit. This is used for retargeting of multiple users rooting from the
same IP-addresses. ABM usually facilitates B2B marketing purposes.
Expiry: 10 yearsType: HTTP
visitor_id#-hash [x3]Used to encrypt and contain visitor data. This is necessary
for the security of the user data.
Expiry: 10 yearsType: HTTP
lpv#Used in context with behavioral tracking by the website. The cookie
registers the user’s behavior and navigation across multiple websites and
ensures that no tracking errors occur when the user has multiple browser-tabs
open.
Expiry: 1 dayType: HTTP
YouTube
11
Learn more about this provider
VISITOR_INFO1_LIVETries to estimate the users' bandwidth on pages with
integrated YouTube videos.
Expiry: 179 daysType: HTTP
YSCRegisters a unique ID to keep statistics of what videos from YouTube the user
has seen.
Expiry: SessionType: HTTP
yt.innertube::nextIdRegisters a unique ID to keep statistics of what videos from
YouTube the user has seen.
Expiry: PersistentType: HTML
yt.innertube::requestsRegisters a unique ID to keep statistics of what videos
from YouTube the user has seen.
Expiry: PersistentType: HTML
yt-remote-cast-availableStores the user's video player preferences using
embedded YouTube video
Expiry: SessionType: HTML
yt-remote-cast-installedStores the user's video player preferences using
embedded YouTube video
Expiry: SessionType: HTML
yt-remote-connected-devicesStores the user's video player preferences using
embedded YouTube video
Expiry: PersistentType: HTML
yt-remote-device-idStores the user's video player preferences using embedded
YouTube video
Expiry: PersistentType: HTML
yt-remote-fast-check-periodStores the user's video player preferences using
embedded YouTube video
Expiry: SessionType: HTML
yt-remote-session-appStores the user's video player preferences using embedded
YouTube video
Expiry: SessionType: HTML
yt-remote-session-nameStores the user's video player preferences using embedded
YouTube video
Expiry: SessionType: HTML
v1.addthisedge.com
1
at-lojson-cache-#Used by the social sharing platform AddThis
Expiry: PersistentType: HTML
Unclassified 1
Unclassified cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.
Figma
1
Learn more about this provider
initialPathNamePending
Expiry: SessionType: HTML
Cross-domain consent[#BULK_CONSENT_DOMAINS_COUNT#] [#BULK_CONSENT_TITLE#]
List of domains your consent applies to: [#BULK_CONSENT_DOMAINS#]
Cookie declaration last updated on 27/02/2022 by Cookiebot


[#IABV2_TITLE#]

[#IABV2_BODY_INTRO#]
[#IABV2_BODY_LEGITIMATE_INTEREST_INTRO#]
[#IABV2_BODY_PREFERENCE_INTRO#]
[#IABV2_LABEL_PURPOSES#]
[#IABV2_BODY_PURPOSES_INTRO#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_LABEL_FEATURES#]
[#IABV2_BODY_FEATURES_INTRO#]
[#IABV2_BODY_FEATURES#]
[#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PARTNERS_INTRO#]
[#IABV2_BODY_PARTNERS#]

Cookies are small text files that can be used by websites to make a user's
experience more efficient.

The law states that we can store cookies on your device if they are strictly
necessary for the operation of this site. For all other types of cookies we need
your permission.

This site uses different types of cookies. Some cookies are placed by third
party services that appear on our pages.

You can at any time change or withdraw your consent from the Cookie Declaration
on our website.

Learn more about who we are, how you can contact us and how we process personal
data in our Privacy Policy.

Please state your consent ID and date when you contact us regarding your
consent.
[#OOI_PERSONAL_INFORMATION#]
Deny Allow selection Customize

Allow all
Powered by Cookiebot by Usercentrics
 * #RansomAware
 * Contact

 * 

 * What We Do
   
    * Managed Detection & Response (MDR)
    * Hybrid SOC & Collaboration Services
       * 
         Overview
       * 
         Managed SOAR
       * 
         Staff Augmentation
   
    * Threat Intelligence
    * Security Advisory & Testing
    * Security Platform Management
       * 
         Overview
       * 
         SIEM Platform Management
       * 
         SIEM Content Management
       * 
         Managed EDR
       * 
         Managed NDR
       * 
         Vulnerability Management Service
   
    * Incident Readiness & Response (IRR)
    * View all what we do

 * Why Us
 * Resources
   
    * Blog
    * Media
    * Resource Hub
    * War Stories
    * Glossary
    * View all resources

 * Company
   
    * Our Story
    * Our Values
    * Executive Team
    * Partners
    * Careers
    * View all company

Demo

 * #RansomAware
 * Contact

 * 


 * What We Do
   
   * Managed Detection & Response (MDR)
   * Hybrid SOC & Collaboration Services
     
     * Overview
     * Managed SOAR
     * Staff Augmentation
   * Threat Intelligence
   * Security Advisory & Testing
   * Security Platform Management
     
     * Overview
     * SIEM Platform Management
     * SIEM Content Management
     * Managed EDR
     * Managed NDR
     * Vulnerability Management Service
   * Incident Readiness & Response (IRR)
   * View all what we do
 * Why Us
 * Resources
   
   * Blog
   * Media
   * Resource Hub
   * War Stories
   * Glossary
   * View all resources
 * Company
   
   * Our Story
   * Our Values
   * Executive Team
   * Partners
   * Careers
   * View all company

Demo

Demo
Your browser does not support the video tag. Your browser does not support the
video tag.
Total Transparency. Complete Control. Giving control back to businesses.
Read More


WELCOME TO TALION


MAKING THE COMPLEX, SIMPLE.

51% of Security Leaders say the ROI of the SOC is getting worse not better,
while 80% say their SOC’s complexity is very high.* We specialise in making
cyber security management simpler. We leverage the vast volumes of data created
across a complex web of security technologies to reduce your security risk.
Through simple and easy to consume security management solutions, we deliver
actionable results which drive a measurable improvement in your security
outcomes. We make cyber simple.

 

 




WE ARE THRILLED TO BE RANKED #33 ON 2021 MSSPS ALERT’S TOP 250 SECURITY SERVICE
PROVIDERS

The MSSP Alert annual list of Top MSSPs is an independent ranking of the world’s
top managed security services providers. The list, updated each September,
identifies and examines trends across the world’s top providers, and is gathered
through a series of objective interviews, third party analyst research, and
industry surveys.

Discover More

Watch Demo Video


Get full visibility of your managed security operations.

Watch Video


Unsure of how to leverage your security tools to reduce business risk?

Making sense of, and getting value from, your security data can be a daunting
task. At Talion you can BYOT (Bring Your Own Tech); our security management
platform integrates with your security technologies and utilises orchestration
and automation to maximise their value.

Discover More



Zoom, Slack, MS Teams… cloud-platforms & supported applications have never been
busier or more diverse.

These real-time platforms need real time threat detection & response. Discover
how we secure your cloud-based operations.




Looking for a security partner, not a monthly service review?

We work as an extension of your security team. We take time to understand your
changing business requirements and adapt to those needs, helping you navigate
the competitive landscape you operate in.

Discover More


 * 
 * 
 * 

NEW REPORT

HYBRID SOC: COULD A BEST OF BOTH WORLDS APPROACH TO MANAGED SERVICES CURE YOUR
CYBER SECURITY HEADACHES?

This white paper draws on dedicated research findings to reveal the cyber
security challenges that are keeping decision-makers up at night, the role MSSPs
currently play, how existing security strategies are performing, and how IT
leaders expect this to change over time.

Key Findings

• Phishing attacks, ransomware and malware are the biggest cyber security
threats.
• 70 per cent of represented organisations are seeing between 1 and 10 cyber
security incidents every week.
• False positives are adding to the challenges – 47 per cent experience between
1 and 5 false alerts every week.

Download here the full report

 


Problems we solve
 
Our aim is to reduce the complexity involved in securing your organisation and
to give security teams unrivalled visibility into their security operations, so
they can make optimal decisions, fast.
 
I'm worried about the impact to my business of a cyber attack, or perhaps I've
already been breached?

Not understanding your cyber risk and your security posture can leave you
feeling, and being, exposed.

If you’re unsure of where to start, we recommend undertaking a cyber risk
assessment. Understanding your cyber risk is the cornerstone to any cyber
security programme and will help you to:

 * Prioritise and align security resources to business objectives
 * Inform a business case or security improvement programme
 * Demonstrate return on your security investment

 

Discover more on cyber risk assessments.

Download
Cyber is so encompassing that my business does not know where to start.

The challenge of keeping up with cyber threats is unrelenting. Recruiting and
retaining an in-house cyber team with the breadth of skills to effectively
protect your organisation is difficult and time consuming. Couple this with the
cyber skills shortage and you can end up spending an extortionate amount of time
dealing with HR, rather than securing your organisation.

There are broadly three ways we can support you in this challenge:

 1. Compliment your team with our cyber experts, read more on Staff Augmentation
 2. Help manage your security technology to make it more effective and
    efficient, read more on SIEM Platform Management, SIEM Content Management,
    Managed EDR and Managed NDR.
 3. Leverage Managed SOAR, a single platform that bridges the gap between your
    data and your disparate security tools, giving you visibility across your
    security operation. With Managed SOAR you benefit from our expertise in
    security orchestration & automation, and it allows you to collaborate
    directly with our most experienced security analysts.

Learn more on Staff Augmentation, SIEM Platform Management, SIEM Content
Management and our Managed Services.

I have invested in security technology but am not getting the value I expected
from the investment.

This is a problem we see often. Many, if not most, organisation have invested in
various security technologies over the years, often ending up with a web of
point solutions which are difficult to manage, configure and optimise, let alone
stitch together for a comprehensive view of the risk profile across your estate.

If you’re running a SIEM platform in-house we have expertise to help in the
management of that platform and in writing detection content that will get you
fewer false-positives. However, often that does not go far enough.

Managed SOAR is the hub of your security operations, it’s a single platform that
bridges the gap between your data and your disparate security tools, giving you
visibility across your security operation. Rather than working across multiple
technologies such as SIEM, EDR and NDR, our platform unifies these systems so
that your analysts have one single work bench from which they can detect,
investigate and respond, with a complete picture of the threats facing your
business.

Learn more about SIEM Platform Management, SIEM Content Management and Managed
SOAR.

My security team doesn't have the time or resource to deal with the constant
onslaught of security alerts, we'd rather spend our time doing other things.

It’s no secret that the cyber threat is with us 24×7, it’s unrelenting and, a
lot of the time the alert triage our analyst must do is, well, dull. Many of our
clients want to keep the more interesting work for their in-house team and
outsource the more mundane tasks to us, helping to improve job satisfaction and
reduce attrition. Or, in some cases, they simply can’t justify staffing there
SOC 24×7, so, we take the unsociable hours.

Or you may just need the help of some cyber pros when things get hectic, you
suffer a breach or perhaps it’s the Christmas retail rush. Whatever you
circumstance, we run a 24×7 SOC and can offer staff augmentation to support your
security operation.

Discover more about Staff Augmentation options.

Discover More
I have too many alerts, too many false postitives and probably too many security
tools.

Each security tool purchase begins with the best intentions but what many
security teams are left with is a complex web of technologies which are churning
out too many alerts, or too many false positives. The implementation, tuning and
ongoing management takes time, resources and skills and it often falls down the
priority list.

Our Hybrid SOC solutions can take this burden away from security teams, leaving
them with more time and space to focus on what matters.

Discover more on SIEM Platform Management, SIEM Content Management and Managed
SOAR.



What we do
We build cyber security programmes that are woven into the fabric of your
organisation.
 



Previous
Threat Intelligence

Our Threat Intelligence team track the world’s most advanced cyber threat
groups, publishing regul...

Discover More

Security Advisory & Testing

Assess and improve your cyber security posture with expert advice and guidance.

Discover More

Incident Readiness & Response (IRR)

In partnership with BAE Systems, we discover the critical facts fast. With
unparalleled visibility of ma...

Discover More

Managed Detection & Response (MDR)

Our UK-based SOC delivers a collaborative, threat-led MDR service offering
unrivalled levels of transpar...

Discover More

Hybrid SOC & Collaboration Services
Enhance your security operations with our Managed SOAR and staff augmentation
options.
Discover More

Security Platform Management

Our Security Platform Management Services are designed to simplify and optimise
your in-house security o...

Discover More

Threat Intelligence

Our Threat Intelligence team track the world’s most advanced cyber threat
groups, publishing regul...

Discover More

Security Advisory & Testing

Assess and improve your cyber security posture with expert advice and guidance.

Discover More

Incident Readiness & Response (IRR)

In partnership with BAE Systems, we discover the critical facts fast. With
unparalleled visibility of ma...

Discover More

Managed Detection & Response (MDR)

Our UK-based SOC delivers a collaborative, threat-led MDR service offering
unrivalled levels of transpar...

Discover More

Hybrid SOC & Collaboration Services
Enhance your security operations with our Managed SOAR and staff augmentation
options.
Discover More

Security Platform Management

Our Security Platform Management Services are designed to simplify and optimise
your in-house security o...

Discover More

Threat Intelligence

Our Threat Intelligence team track the world’s most advanced cyber threat
groups, publishing regul...

Discover More

Security Advisory & Testing

Assess and improve your cyber security posture with expert advice and guidance.

Discover More

Incident Readiness & Response (IRR)

In partnership with BAE Systems, we discover the critical facts fast. With
unparalleled visibility of ma...

Discover More

Next

Did we mention we like numbers?
Technical
70
%
of our staff are engineers, analysts and developers who build and maintain our
robust managed security service.
Informed
200
+
We track over 200 of the world's most dangerous cyber attack groups.
Collaborative
25
+
We’re assembling a collaborative community of experts and innovators, a
comprehensive team of industry partners primed to tackle threats from all
angles.

Whatever your business needs, we have a solution that will fit them.
View
Your data, demystified.
Collaborate
Side-by-side support.
Control
Built on your terms.
Whatever your business needs, we have a solution that will fit them.
Security solutions you can see

We don’t do black-box solutions. You have full visibility across absolutely
everything that goes on in our SOC, 24 hours a day, 7 days a week.

Request a demo

Protecting Your Business

We’re your cyber security partner, which means we operate in a way that works
for you, whether that’s working through responses together, or simply briefing
you on the threats that really need your attention.

Request a demo

Built on your terms.

We grow with your business, adapting to your changing needs, responding to the
evolving threat, and putting control firmly back in your hands.

Request a demo



#RansomAware

#RansomAware is a movement to encourage organisations to share experiences,
exchange ideas and pool intelligence on ransomware attacks.  We believe that the
more companies who expose how they were attacked, by whom, if they paid the
ransom and if their data was recovered, the more we can learn about attacker
tactics, techniques, and procedures to shore up our defences and fight back
against ransomware.

Discover More

Resources
Keep up to date with the latest from our industry experts.
 * Blog
 * Media
 * Hub
 * Glossary


Popular Resources
All Resources


Previous
Blog
Strategic Cyber Security Advice for Executives
Discover More
Case Study
Talion Threat Intelligence Highlighted North Korean Threat
Discover More
Blog
Is Legal Privilege a Help or Hindrance Following a Data Breach?
Discover More
Report
Ransomware Perceptions Report, 2021
Discover More
Blog
Is Cyber Insurance Fuelling the Ransomware Crisis? Key Roundtable Takeaways
Discover More
Podcast
Threat Set Radio #131
Discover More
Webinars
Live Debate: Is Cyber Insurance Fuelling the Ransomware Crisis?
Discover More
Podcast
Threat Set Radio #130
Discover More
Podcast
Threat Set Radio #129
Discover More
Podcast
Threat Set Radio #128
Discover More
Podcast
Threat Set Radio #127
Discover More
Report
Hybrid SOC: Could a best of both worlds approach to managed services cure your
cyber se...
Discover More
Webinars
The Threat of Ransomware to UK Businesses and How to Mitigate it
Discover More
Podcast
Threat Set Radio #126
Discover More
Podcast
Threat Set Radio #125
Discover More
Podcast
Threat Set Radio #124
Discover More
Podcast
Threat Set Radio #123
Discover More
Blog
Join the #RansomAware Movement
Discover More
Blog
Security in the Cloud
Discover More
Podcast
Threat Set Radio #122
Discover More
Podcast
Threat Set Radio #121
Discover More
Podcast
Threat Set Radio #120
Discover More
Podcast
Threat Set Radio #119
Discover More
Podcast
Threat Set Radio #118
Discover More
Podcast
Threat Set Radio #117
Discover More
Podcast
Threat Set Radio #116
Discover More
Podcast
Threat Set Radio #115
Discover More
Webinars
Mapping risk and understanding your threat coverage
Discover More
Podcast
Threat Set Radio #114
Discover More
Podcast
Threat Set Radio #112
Discover More
Podcast
Threat Set Radio #111
Discover More
Podcast
Threat Set Radio #110
Discover More
Podcast
Threat Set Radio #109
Discover More
Webinars
Hybrid SOC: Improving Security Outcomes Through Collaboration & Transparency
Discover More
Podcast
Threat Set Radio #108
Discover More
Press
Women hold only 10% of board positions in top cyber security companies
Discover More
Press
Microsoft Exchange Attacks Declared Emergency By Homeland Security
Discover More
Podcast
Threat Set Radio #107
Discover More
Podcast
Threat Set Radio #105
Discover More
Blog
A Ransomware Pandemic
Discover More
Blog
Threat Intelligence Assessment – SolarWinds
Discover More
Podcast
Threat Set Radio #102
Discover More
Case Study
Data breach ransomware demands and establishing the truth
Discover More
Case Study
Talion’s OSINT Glass Service Thwarts Attack on Law Firm’s Head Office
Discover More
Blog
Your Incident Response Check List
Discover More
Blog
Strategic Cyber Security Advice for Executives
Discover More
Case Study
Talion Threat Intelligence Highlighted North Korean Threat
Discover More
Blog
Is Legal Privilege a Help or Hindrance Following a Data Breach?
Discover More
Report
Ransomware Perceptions Report, 2021
Discover More
Blog
Is Cyber Insurance Fuelling the Ransomware Crisis? Key Roundtable Takeaways
Discover More
Podcast
Threat Set Radio #131
Discover More
Webinars
Live Debate: Is Cyber Insurance Fuelling the Ransomware Crisis?
Discover More
Podcast
Threat Set Radio #130
Discover More
Podcast
Threat Set Radio #129
Discover More
Podcast
Threat Set Radio #128
Discover More
Podcast
Threat Set Radio #127
Discover More
Report
Hybrid SOC: Could a best of both worlds approach to managed services cure your
cyber se...
Discover More
Webinars
The Threat of Ransomware to UK Businesses and How to Mitigate it
Discover More
Podcast
Threat Set Radio #126
Discover More
Podcast
Threat Set Radio #125
Discover More
Podcast
Threat Set Radio #124
Discover More
Podcast
Threat Set Radio #123
Discover More
Blog
Join the #RansomAware Movement
Discover More
Blog
Security in the Cloud
Discover More
Podcast
Threat Set Radio #122
Discover More
Podcast
Threat Set Radio #121
Discover More
Podcast
Threat Set Radio #120
Discover More
Podcast
Threat Set Radio #119
Discover More
Podcast
Threat Set Radio #118
Discover More
Podcast
Threat Set Radio #117
Discover More
Podcast
Threat Set Radio #116
Discover More
Podcast
Threat Set Radio #115
Discover More
Webinars
Mapping risk and understanding your threat coverage
Discover More
Podcast
Threat Set Radio #114
Discover More
Podcast
Threat Set Radio #112
Discover More
Podcast
Threat Set Radio #111
Discover More
Podcast
Threat Set Radio #110
Discover More
Podcast
Threat Set Radio #109
Discover More
Webinars
Hybrid SOC: Improving Security Outcomes Through Collaboration & Transparency
Discover More
Podcast
Threat Set Radio #108
Discover More
Press
Women hold only 10% of board positions in top cyber security companies
Discover More
Press
Microsoft Exchange Attacks Declared Emergency By Homeland Security
Discover More
Podcast
Threat Set Radio #107
Discover More
Podcast
Threat Set Radio #105
Discover More
Blog
A Ransomware Pandemic
Discover More
Blog
Threat Intelligence Assessment – SolarWinds
Discover More
Podcast
Threat Set Radio #102
Discover More
Case Study
Data breach ransomware demands and establishing the truth
Discover More
Case Study
Talion’s OSINT Glass Service Thwarts Attack on Law Firm’s Head Office
Discover More
Blog
Your Incident Response Check List
Discover More
Blog
Strategic Cyber Security Advice for Executives
Discover More
Case Study
Talion Threat Intelligence Highlighted North Korean Threat
Discover More
Blog
Is Legal Privilege a Help or Hindrance Following a Data Breach?
Discover More
Next
All Resources




Testimonials
Don’t just take our word for it.
 

Previous

Talion have been a fantastic partner to work with and I really see them as an
extension of our team. Having the skillset and agility of a growing organisation
but the talent and capability of a much larger organisation from which they were
formed, BAE Systems, has proven a great combination. The team work hard to
continuously demonstrate and add value to their customers and are always
receptive to feedback.

Director of Information Security and Risk

One of North America’s largest providers of funeral and cemetery services

At every level, [the team] gave us quantitative, analytical advice, in the
moment, … [You] enabled us to take the business judgements that cyber security
requires you to take.

CEO

FTSE 250 Company

Talion’s model is based on people and partnership and not just technology… We
spoke with others who aspired to this, but it simply wasn’t what they did; they
had a much greater focus on dashboards and alerts. In contrast, the people at
Talion told us: ‘We’re here when you need us – just pick up the phone. We can
meet weekly, monthly – whatever works for you. We’re here to help.’ It was
hugely important for us.

Senior Director – Security Operations

One of Britain’s Largest Technology Companies

Next
Our Partners

We recognise that there are times when we can’t do it all, where knowledge
resides with other parties. Which is why we’re assembling a collaborative
community of experts and innovators, a comprehensive team of industry partners
primed to tackle threats from all angles.


Previous

Next



I'M READY

Request a more in-depth demo.

Get Started


DISCUSS YOUR CYBER SECURITY NEEDS

Fill in the form below and one of our team will be in touch to arrange your
demo.


CALL US ON 0800 048 5775

Call us directly and we’ll put you in touch with the most relevant cyber expert.


Request A Call

SEND US A MESSAGE

Give us a brief description of what you’re looking for and we’ll put you in
touch with the best person.


Send A Message

 
 * What We Do
 * Why Us
 * Resources
 * Company
 * Careers

Client Login
 * t+44 (0) 800 048 5775
 * ehello@talion.net

Subscribe to stay up to date
 * © Talion 2022 . SY4 Security Limited trading as Talion. All rights reserved.
 * Privacy

 * 
 * 
 * 
 * 

 * Design Agency: Steve Edge Design