talion.net Open in urlscan Pro
35.204.181.134  Public Scan

Submitted URL: http://talion-sec.com/
Effective URL: https://talion.net/
Submission Tags: falconsandbox
Submission: On January 14 via api from US — Scanned from DE

Form analysis 8 forms found in the DOM

<form>
  <fieldset>
    <legend class="visuallyhidden">Consent Selection</legend>
    <div id="CybotCookiebotDialogBodyFieldsetInnerContainer">
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonNecessary"><strong
            class="CybotCookiebotDialogBodyLevelButtonDescription">Necessary</strong></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper CybotCookiebotDialogBodyLevelButtonSliderWrapperDisabled"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonNecessary"
            class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelButtonDisabled" disabled="disabled" checked="checked"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonPreferences"><strong
            class="CybotCookiebotDialogBodyLevelButtonDescription">Preferences</strong></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonPreferences" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
            data-target="CybotCookiebotDialogBodyLevelButtonPreferencesInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonStatistics"><strong
            class="CybotCookiebotDialogBodyLevelButtonDescription">Statistics</strong></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonStatistics" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
            data-target="CybotCookiebotDialogBodyLevelButtonStatisticsInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonMarketing"><strong
            class="CybotCookiebotDialogBodyLevelButtonDescription">Marketing</strong></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonMarketing" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
            data-target="CybotCookiebotDialogBodyLevelButtonMarketingInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
    </div>
  </fieldset>
</form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonNecessaryInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelButtonDisabled" disabled="disabled" checked="checked"> <span
    class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonPreferencesInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonPreferences"
    checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonStatisticsInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonStatistics"
    checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonMarketingInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonMarketing" checked="checked"
    tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyContentCheckboxPersonalInformation" class="CybotCookiebotDialogBodyLevelButton"> <span
    class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

GET https://talion.net

<form role="search" method="get" id="searchform" class="searchform" action="https://talion.net">
  <div class="header-search-input-holder">
    <input type="text" name="s" id="s" placeholder="Search">
    <input class="header-submit" type="submit">
    <input type="hidden" value="site-search" name="post_type">
  </div> <!-- header-search-input-holder Ends -->
</form>

GET https://talion.net/

<form action="https://talion.net/" method="get">
  <div class="header-search-input-holder">
    <input type="text" name="s" id="s" placeholder="Search">
    <input class="header-submit" type="submit">
    <input type="hidden" name="post_type" value="site-search">
  </div> <!-- header-search-input-holder Ends -->
</form>

Text Content

Powered by Cookiebot
 * Consent
 * Details
 * [#IABV2SETTINGS#]
 * About


THIS WEBSITE USES COOKIES

We use cookies to personalise content and ads, to provide social media features
and to analyse our traffic. We also share information about your use of our site
with our social media, advertising and analytics partners who may combine it
with other information that you’ve provided to them or that they’ve collected
from your use of their services.
Consent Selection
Necessary

Preferences

Statistics

Marketing

Show details
 * Necessary 17
   
   Necessary cookies help make a website usable by enabling basic functions like
   page navigation and access to secure areas of the website. The website cannot
   function properly without these cookies.
    * Cookiebot
      2
      Learn more about this provider
      1.gifUsed to count the number of sessions to the website, necessary for
      optimizing CMP product delivery.
      Expiry: SessionType: Pixel
      CookieConsentStores the user's cookie consent state for the current domain
      Expiry: 1 yearType: HTTP
    * Figma
      2
      Learn more about this provider
      AWSALBCORSRegisters which server-cluster is serving the visitor. This is
      used in context with load balancing, in order to optimize user experience.
      Expiry: 7 daysType: HTTP
      AWSALBTGCORSRegisters which server-cluster is serving the visitor. This is
      used in context with load balancing, in order to optimize user experience.
      Expiry: 7 daysType: HTTP
    * Google
      2
      Learn more about this provider
      test_cookiePending
      Expiry: 1 dayType: HTTP
      _GRECAPTCHAThis cookie is used to distinguish between humans and bots.
      This is beneficial for the website, in order to make valid reports on the
      use of their website.
      Expiry: 180 daysType: HTTP
    * Hubspot
      5
      Learn more about this provider
      rc::aThis cookie is used to distinguish between humans and bots. This is
      beneficial for the website, in order to make valid reports on the use of
      their website.
      Expiry: PersistentType: HTML
      rc::bThis cookie is used to distinguish between humans and bots.
      Expiry: SessionType: HTML
      rc::cThis cookie is used to distinguish between humans and bots.
      Expiry: SessionType: HTML
      rc::d-15#This cookie is used to distinguish between humans and bots.
      Expiry: PersistentType: HTML
      _cfuvidPending
      Expiry: SessionType: HTTP
    * LinkedIn
      2
      Learn more about this provider
      li_gcStores the user's cookie consent state for the current domain
      Expiry: 180 daysType: HTTP
      bscookieThis cookie is used to identify the visitor through an
      application. This allows the visitor to login to a website through their
      LinkedIn application for example.
      Expiry: 1 yearType: HTTP
    * New Relic
      1
      Learn more about this provider
      JSESSIONIDPreserves users states across page requests.
      Expiry: SessionType: HTTP
    * YouTube
      1
      Learn more about this provider
      CONSENTUsed to detect if the visitor has accepted the marketing category
      in the cookie banner. This cookie is necessary for GDPR-compliance of the
      website.
      Expiry: 2 yearsType: HTTP
    * calendly.com
      hubspot.com
      
      2
      __cf_bm [x2]This cookie is used to distinguish between humans and bots.
      This is beneficial for the website, in order to make valid reports on the
      use of their website.
      Expiry: 1 dayType: HTTP

 * Preferences 1
   
   Preference cookies enable a website to remember information that changes the
   way the website behaves or looks, like your preferred language or the region
   that you are in.
    * Hubspot
      1
      Learn more about this provider
      messagesUtkStores a unique ID string for each chat-box session. This
      allows the website-support to see previous issues and reconnect with the
      previous supporter.
      Expiry: 180 daysType: HTTP

 * Statistics 18
   
   Statistic cookies help website owners to understand how visitors interact
   with websites by collecting and reporting information anonymously.
    * Figma
      2
      Learn more about this provider
      ajs_anonymous_idThis cookie is used to identify a specific visitor - this
      information is used to identify the number of specific visitors on a
      website.
      Expiry: 30 daysType: HTTP
      STATSIG_LOCAL_STORAGE_STABLE_IDThis cookie is used by the website’s
      operator in context with multi-variate testing. This is a tool used to
      combine or change content on the website. This allows the website to find
      the best variation/edition of the site.
      Expiry: PersistentType: HTML
    * Google
      6
      Learn more about this provider
      collectUsed to send data to Google Analytics about the visitor's device
      and behavior. Tracks the visitor across devices and marketing channels.
      Expiry: SessionType: Pixel
      _gaRegisters a unique ID that is used to generate statistical data on how
      the visitor uses the website.
      Expiry: 2 yearsType: HTTP
      _ga_#Used by Google Analytics to collect data on the number of times a
      user has visited the website as well as dates for the first and most
      recent visit.
      Expiry: 2 yearsType: HTTP
      _gatUsed by Google Analytics to throttle request rate
      Expiry: 1 dayType: HTTP
      _gidRegisters a unique ID that is used to generate statistical data on how
      the visitor uses the website.
      Expiry: 1 dayType: HTTP
      tdRegisters statistical data on users' behaviour on the website. Used for
      internal analytics by the website operator.
      Expiry: SessionType: Pixel
    * Hubspot
      4
      Learn more about this provider
      __hsscIdentifies if the cookie data needs to be updated in the visitor's
      browser.
      Expiry: 1 dayType: HTTP
      __hssrcUsed to recognise the visitor's browser upon reentry on the
      website.
      Expiry: SessionType: HTTP
      __hstcSets a unique ID for the session. This allows the website to obtain
      data on visitor behaviour for statistical purposes.
      Expiry: 180 daysType: HTTP
      hubspotutkSets a unique ID for the session. This allows the website to
      obtain data on visitor behaviour for statistical purposes.
      Expiry: 180 daysType: HTTP
    * LinkedIn
      1
      Learn more about this provider
      AnalyticsSyncHistoryUsed in connection with data-synchronization with
      third-party analysis service.
      Expiry: 30 daysType: HTTP
    * Microsoft
      5
      Learn more about this provider
      c.gifCollects data on the user’s navigation and behavior on the website.
      This is used to compile statistical reports and heatmaps for the website
      owner.
      Expiry: SessionType: Pixel
      _clckCollects data on the user’s navigation and behavior on the website.
      This is used to compile statistical reports and heatmaps for the website
      owner.
      Expiry: 1 yearType: HTTP
      _clskRegisters statistical data on users' behaviour on the website. Used
      for internal analytics by the website operator.
      Expiry: 1 dayType: HTTP
      _cltkRegisters statistical data on users' behaviour on the website. Used
      for internal analytics by the website operator.
      Expiry: SessionType: HTML
      CLIDCollects data on the user’s navigation and behavior on the website.
      This is used to compile statistical reports and heatmaps for the website
      owner.
      Expiry: 1 yearType: HTTP

 * Marketing 37
   
   Marketing cookies are used to track visitors across websites. The intention
   is to display ads that are relevant and engaging for the individual user and
   thereby more valuable for publishers and third party advertisers.
    * Google
      4
      Learn more about this provider
      IDEUsed by Google DoubleClick to register and report the website user's
      actions after viewing or clicking one of the advertiser's ads with the
      purpose of measuring the efficacy of an ad and to present targeted ads to
      the user.
      Expiry: 1 yearType: HTTP
      pagead/landingCollects data on visitor behaviour from multiple websites,
      in order to present more relevant advertisement - This also allows the
      website to limit the number of times that they are shown the same
      advertisement.
      Expiry: SessionType: Pixel
      pagead/1p-user-list/#Tracks if the user has shown interest in specific
      products or events across multiple websites and detects how the user
      navigates between sites. This is used for measurement of advertisement
      efforts and facilitates payment of referral-fees between websites.
      Expiry: SessionType: Pixel
      _gcl_auUsed by Google AdSense for experimenting with advertisement
      efficiency across websites using their services.
      Expiry: 3 monthsType: HTTP
    * Hubspot
      3
      Learn more about this provider
      rc::fThis cookie is used to distinguish between humans and bots.
      Expiry: PersistentType: HTML
      __ptq.gifSends data to the marketing platform Hubspot about the visitor's
      device and behaviour. Tracks the visitor across devices and marketing
      channels.
      Expiry: SessionType: Pixel
      HUBLYTICS_EVENTS_53Collects data on visitor behaviour from multiple
      websites, in order to present more relevant advertisement - This also
      allows the website to limit the number of times that they are shown the
      same advertisement.
      Expiry: PersistentType: HTML
    * LinkedIn
      4
      Learn more about this provider
      bcookieUsed by the social networking service, LinkedIn, for tracking the
      use of embedded services.
      Expiry: 1 yearType: HTTP
      li_sugrCollects data on user behaviour and interaction in order to
      optimize the website and make advertisement on the website more relevant.
      Expiry: 3 monthsType: HTTP
      lidcUsed by the social networking service, LinkedIn, for tracking the use
      of embedded services.
      Expiry: 1 dayType: HTTP
      UserMatchHistoryEnsures visitor browsing-security by preventing cross-site
      request forgery. This cookie is essential for the security of the website
      and visitor.
      Expiry: 30 daysType: HTTP
    * Microsoft
      7
      Learn more about this provider
      MR [x2]Used to track visitors on multiple websites, in order to present
      relevant advertisement based on the visitor's preferences.
      Expiry: 7 daysType: HTTP
      MUID [x2]Pending
      Expiry: 1 yearType: HTTP
      SRM_BTracks the user’s interaction with the website’s search-bar-function.
      This data can be used to present the user with relevant products or
      services.
      Expiry: 1 yearType: HTTP
      ANONCHKRegisters data on visitors from multiple visits and on multiple
      websites. This information is used to measure the efficiency of
      advertisement on websites.
      Expiry: 1 dayType: HTTP
      SMRegisters a unique ID that identifies the user's device during return
      visits across websites that use the same ad network. The ID is used to
      allow targeted ads.
      Expiry: SessionType: HTTP
    * Pardot
      1
      Learn more about this provider
      pardotUsed in context with Account-Based-Marketing (ABM). The cookie
      registers data such as IP-addresses, time spent on the website and page
      requests for the visit. This is used for retargeting of multiple users
      rooting from the same IP-addresses. ABM usually facilitates B2B marketing
      purposes.
      Expiry: SessionType: HTTP
    * YouTube
      18
      Learn more about this provider
      LAST_RESULT_ENTRY_KEYUsed to track user’s interaction with embedded
      content.
      Expiry: SessionType: HTTP
      LogsDatabaseV2:V#||LogsRequestsStorePending
      Expiry: PersistentType: IDB
      nextIdUsed to track user’s interaction with embedded content.
      Expiry: SessionType: HTTP
      remote_sidNecessary for the implementation and functionality of YouTube
      video-content on the website.
      Expiry: SessionType: HTTP
      requestsUsed to track user’s interaction with embedded content.
      Expiry: SessionType: HTTP
      TESTCOOKIESENABLEDUsed to track user’s interaction with embedded content.
      Expiry: 1 dayType: HTTP
      VISITOR_INFO1_LIVETries to estimate the users' bandwidth on pages with
      integrated YouTube videos.
      Expiry: 180 daysType: HTTP
      VISITOR_PRIVACY_METADATAStores the user's cookie consent state for the
      current domain
      Expiry: 180 daysType: HTTP
      YSCRegisters a unique ID to keep statistics of what videos from YouTube
      the user has seen.
      Expiry: SessionType: HTTP
      yt.innertube::nextIdRegisters a unique ID to keep statistics of what
      videos from YouTube the user has seen.
      Expiry: PersistentType: HTML
      YtIdbMeta#databasesUsed to track user’s interaction with embedded content.
      Expiry: PersistentType: IDB
      yt-remote-cast-availableStores the user's video player preferences using
      embedded YouTube video
      Expiry: SessionType: HTML
      yt-remote-cast-installedStores the user's video player preferences using
      embedded YouTube video
      Expiry: SessionType: HTML
      yt-remote-connected-devicesStores the user's video player preferences
      using embedded YouTube video
      Expiry: PersistentType: HTML
      yt-remote-device-idStores the user's video player preferences using
      embedded YouTube video
      Expiry: PersistentType: HTML
      yt-remote-fast-check-periodStores the user's video player preferences
      using embedded YouTube video
      Expiry: SessionType: HTML
      yt-remote-session-appStores the user's video player preferences using
      embedded YouTube video
      Expiry: SessionType: HTML
      yt-remote-session-nameStores the user's video player preferences using
      embedded YouTube video
      Expiry: SessionType: HTML

 * Unclassified 8
   Unclassified cookies are cookies that we are in the process of classifying,
   together with the providers of individual cookies.
    * Figma
      8
      Learn more about this provider
      __Host-figma.didPending
      Expiry: 1 yearType: HTTP
      figma.refPending
      Expiry: SessionType: HTTP
      figma.sessionPending
      Expiry: 40 daysType: HTTP
      figma-autosave-v3#editor-sessionsPending
      Expiry: PersistentType: IDB
      figma-autosave-v3#new-filesPending
      Expiry: PersistentType: IDB
      figma-autosave-v3#node-changesPending
      Expiry: PersistentType: IDB
      figma-autosave-v3#referenced-nodesPending
      Expiry: PersistentType: IDB
      figma-autosave-v3#saved-imagesPending
      Expiry: PersistentType: IDB

Cross-domain consent[#BULK_CONSENT_DOMAINS_COUNT#] [#BULK_CONSENT_TITLE#]
List of domains your consent applies to: [#BULK_CONSENT_DOMAINS#]
Cookie declaration last updated on 18.12.23 by Cookiebot


[#IABV2_TITLE#]

[#IABV2_BODY_INTRO#]
[#IABV2_BODY_LEGITIMATE_INTEREST_INTRO#]
[#IABV2_BODY_PREFERENCE_INTRO#]
[#IABV2_LABEL_PURPOSES#]
[#IABV2_BODY_PURPOSES_INTRO#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_LABEL_FEATURES#]
[#IABV2_BODY_FEATURES_INTRO#]
[#IABV2_BODY_FEATURES#]
[#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PARTNERS_INTRO#]
[#IABV2_BODY_PARTNERS#]

Cookies are small text files that can be used by websites to make a user's
experience more efficient.

The law states that we can store cookies on your device if they are strictly
necessary for the operation of this site. For all other types of cookies we need
your permission.

This site uses different types of cookies. Some cookies are placed by third
party services that appear on our pages.

You can at any time change or withdraw your consent from the Cookie Declaration
on our website.

Learn more about who we are, how you can contact us and how we process personal
data in our Privacy Policy.

Please state your consent ID and date when you contact us regarding your
consent.

Do not sell or share my personal information
Deny Allow selection Customize

Allow all
Powered by Cookiebot by Usercentrics
 * #RansomAware
 * Contact

 * 

 * What We Do
   
    * Managed Detection & Response (MDR)
    * Managed Phishing Detection & Response (MPDR)
    * Managed Extended Detection & Response (XDR)
    * Hybrid SOC & Collaboration Services
       * 
         Overview
       * 
         Managed SOAR
       * 
         Staff Augmentation
   
    * Threat Intelligence
    * Security Advisory & Testing
    * Security Platform Management
       * 
         Overview
       * 
         SIEM Platform Management
       * 
         SIEM Content Management
       * 
         Managed EDR
       * 
         Vulnerability Management Service
   
    * Incident Readiness & Response (IRR)
    * View all what we do

 * Who We Help
   
    * Higher Education
    * Manufacturing
    * Legal
    * Other Industries

 * Why Us
 * Resources
   
    * Blog
    * Media
    * Resource Hub
    * War Stories
    * Glossary
    * View all resources

 * Company
   
    * Our Story
    * Our Values
    * Executive Team
    * Partners
    * Events
    * Careers
    * View all company

Contact

 * #RansomAware
 * Contact

 * 


 * What We Do
   
   * Managed Detection & Response (MDR)
   * Managed Phishing Detection & Response (MPDR)
   * Managed Extended Detection & Response (XDR)
   * Hybrid SOC & Collaboration Services
     
     * Overview
     * Managed SOAR
     * Staff Augmentation
   * Threat Intelligence
   * Security Advisory & Testing
   * Security Platform Management
     
     * Overview
     * SIEM Platform Management
     * SIEM Content Management
     * Managed EDR
     * Vulnerability Management Service
   * Incident Readiness & Response (IRR)
   * View all what we do
 * Who We Help
   
   * Higher Education
   * Manufacturing
   * Legal
   * Other Industries
 * Why Us
 * Resources
   
   * Blog
   * Media
   * Resource Hub
   * War Stories
   * Glossary
   * View all resources
 * Company
   
   * Our Story
   * Our Values
   * Executive Team
   * Partners
   * Events
   * Careers
   * View all company

Contact

Contact
Your browser does not support the video tag. Your browser does not support the
video tag.
We Detect Cyber Threats 24/7 Delivering best-in-class MDR, Hybrid SOC, and
Threat Intelligence Services, giving you total transparency and complete control
Get Started


WELCOME TO TALION


TOTAL TRANSPARENCY. COMPLETE CONTROL.

We believe every organisation deserves full visibility and complete control over
how threats are monitored, how decisions are made, and how their business
is protected. Our Hybrid service is a partnership that allows organisations to
have as much or little control over their cyber security as they want.

51% of Security Leaders say the ROI of the SOC is getting worse not better,
while 80% say their SOC’s complexity is very high.* We specialise in making
cyber security management simpler. We leverage the vast volumes of data created
across a complex web of security technologies to reduce your security risk.
Through simple and easy to consume security management solutions, we deliver
actionable results which drive a measurable improvement in your security
outcomes. We make cyber simple.

🎙️ PODCAST – Get the lowdown on the AlphV ransomware outage

Find Out More About Hybrid

Talion Collaborates With Technology Partner DEVO


Maximising value and flexibility.

Watch Video
What we do
We build cyber security programmes that are woven into the fabric of your
organisation.
 



Previous
Threat Intelligence
Our Threat Intelligence team track the world’s most advanced cyber threat
groups, publishing regular ...
Discover More

Security Advisory & Testing
Assess and improve your cyber security posture with expert advice and guidance.
Discover More

Incident Readiness & Response (IRR)
In partnership with BAE Systems, we discover the critical facts fast. With
unparalleled visibility of malic...
Discover More

Managed Detection & Response (MDR)
Our world-class SOC delivers a collaborative, threat-led MDR service offering
unrivalled levels of transpar...
Discover More

Hybrid SOC & Collaboration Services
Enhance your security operations with our Managed SOAR and cyber security staff
augmentation options.
Discover More

Managed Phishing Detection & Response (MPDR)
Our SOC delivers a collaborative, threat-led MDR service offering unrivalled
levels of transparency.
Discover More

Managed Extended Detection & Response (XDR)

Discover More

Security Platform Management
Our Security Platform Management Services are designed to simplify and optimise
your in-house security oper...
Discover More

Threat Intelligence
Our Threat Intelligence team track the world’s most advanced cyber threat
groups, publishing regular ...
Discover More

Security Advisory & Testing
Assess and improve your cyber security posture with expert advice and guidance.
Discover More

Incident Readiness & Response (IRR)
In partnership with BAE Systems, we discover the critical facts fast. With
unparalleled visibility of malic...
Discover More

Managed Detection & Response (MDR)
Our world-class SOC delivers a collaborative, threat-led MDR service offering
unrivalled levels of transpar...
Discover More

Hybrid SOC & Collaboration Services
Enhance your security operations with our Managed SOAR and cyber security staff
augmentation options.
Discover More

Managed Phishing Detection & Response (MPDR)
Our SOC delivers a collaborative, threat-led MDR service offering unrivalled
levels of transparency.
Discover More

Managed Extended Detection & Response (XDR)

Discover More

Security Platform Management
Our Security Platform Management Services are designed to simplify and optimise
your in-house security oper...
Discover More

Threat Intelligence
Our Threat Intelligence team track the world’s most advanced cyber threat
groups, publishing regular ...
Discover More

Security Advisory & Testing
Assess and improve your cyber security posture with expert advice and guidance.
Discover More

Incident Readiness & Response (IRR)
In partnership with BAE Systems, we discover the critical facts fast. With
unparalleled visibility of malic...
Discover More

Next

Problems we solve
 
Our aim is to reduce the complexity involved in securing your organisation and
to give security teams unrivalled visibility into their security operations, so
they can make optimal decisions, fast.
 
I'm worried about the impact to my business of a cyber attack, or perhaps I've
already been breached?

Not understanding your cyber risk and your security posture can leave you
feeling, and being, exposed.

If you’re unsure of where to start, we recommend undertaking a cyber risk
assessment. Understanding your cyber risk is the cornerstone to any cyber
security programme and will help you to:

 * Prioritise and align security resources to business objectives
 * Inform a business case or security improvement programme
 * Demonstrate return on your security investment

 

Discover more on cyber risk assessments.

Download
Cyber is so encompassing that my business does not know where to start.

The challenge of keeping up with cyber threats is unrelenting. Recruiting and
retaining an in-house cyber team with the breadth of skills to effectively
protect your organisation is difficult and time consuming. Couple this with the
cyber skills shortage and you can end up spending an extortionate amount of time
dealing with HR, rather than securing your organisation.

There are broadly three ways we can support you in this challenge:

 1. Compliment your team with our cyber experts, read more on Staff Augmentation
 2. Help manage your security technology to make it more effective and
    efficient, read more on SIEM Platform Management, SIEM Content Management,
    Managed EDR and Managed NDR.
 3. Leverage Managed SOAR, a single platform that bridges the gap between your
    data and your disparate security tools, giving you visibility across your
    security operation. With Managed SOAR you benefit from our expertise in
    security orchestration & automation, and it allows you to collaborate
    directly with our most experienced security analysts.

Learn more on Staff Augmentation, SIEM Platform Management, SIEM Content
Management and our Managed Services.

I have invested in security technology but am not getting the value I expected
from the investment.

This is a problem we see often. Many, if not most, organisation have invested in
various security technologies over the years, often ending up with a web of
point solutions which are difficult to manage, configure and optimise, let alone
stitch together for a comprehensive view of the risk profile across your estate.

If you’re running a SIEM platform in-house we have expertise to help in the
management of that platform and in writing detection content that will get you
fewer false-positives. However, often that does not go far enough.

Managed SOAR is the hub of your security operations, it’s a single platform that
bridges the gap between your data and your disparate security tools, giving you
visibility across your security operation. Rather than working across multiple
technologies such as SIEM, EDR and NDR, our platform unifies these systems so
that your analysts have one single work bench from which they can detect,
investigate and respond, with a complete picture of the threats facing your
business.

Learn more about SIEM Platform Management, SIEM Content Management and Managed
SOAR.

My security team doesn't have the time or resource to deal with the constant
onslaught of security alerts, we'd rather spend our time doing other things.

It’s no secret that the cyber threat is with us 24×7, it’s unrelenting and, a
lot of the time the alert triage our analyst must do is, well, dull. Many of our
clients want to keep the more interesting work for their in-house team and
outsource the more mundane tasks to us, helping to improve job satisfaction and
reduce attrition. Or, in some cases, they simply can’t justify staffing there
SOC 24×7, so, we take the unsociable hours.

Or you may just need the help of some cyber pros when things get hectic, you
suffer a breach or perhaps it’s the Christmas retail rush. Whatever you
circumstance, we run a 24×7 SOC and can offer staff augmentation to support your
security operation.

Discover more about Staff Augmentation options.

Discover More
I have too many alerts, too many false postitives and probably too many security
tools.

Each security tool purchase begins with the best intentions but what many
security teams are left with is a complex web of technologies which are churning
out too many alerts, or too many false positives. The implementation, tuning and
ongoing management takes time, resources and skills and it often falls down the
priority list.

Our Hybrid SOC solutions can take this burden away from security teams, leaving
them with more time and space to focus on what matters.

Discover more on SIEM Platform Management, SIEM Content Management and Managed
SOAR.



Did we mention we like numbers?
Technical
70
%
of our staff are engineers, analysts and developers who build and maintain our
robust managed security service.
Informed
200
+
We track over 200 of the world's most dangerous cyber attack groups.
Collaborative
25
+
We’re assembling a collaborative community of experts and innovators, a
comprehensive team of industry partners primed to tackle threats from all
angles.

Whatever your business needs, we have a solution that will fit them.
View
Your data, demystified.
Collaborate
Side-by-side support.
Control
Built on your terms.
Whatever your business needs, we have a solution that will fit them.
Security solutions you can see

We don’t do black-box solutions. You have full visibility across absolutely
everything that goes on in our SOC, 24 hours a day, 7 days a week.

Request a demo

Protecting Your Business

We’re your cyber security partner, which means we operate in a way that works
for you, whether that’s working through responses together, or simply briefing
you on the threats that really need your attention.

Request a demo

Built on your terms.

We grow with your business, adapting to your changing needs, responding to the
evolving threat, and putting control firmly back in your hands.

Request a demo




Unsure of how to leverage your security tools to reduce business risk?

Making sense of, and getting value from, your security data can be a daunting
task. At Talion you can BYOT (Bring Your Own Tech); our security management
platform integrates with your security technologies and utilises orchestration
and automation to maximise their value.

Discover More



Zoom, Slack, MS Teams… cloud-platforms & supported applications have never been
busier or more diverse.

These real-time platforms need real time threat detection & response. Discover
how we secure your cloud-based operations.




Looking for a security partner, not a monthly service review?

We work as an extension of your security team. We take time to understand your
changing business requirements and adapt to those needs, helping you navigate
the competitive landscape you operate in.

Discover More


 * 
 * 
 * 

 


HYBRID SOC DATASHEET

BUILD A FLEXIBLE SECURITY SOLUTION THAT SUITS YOU

We live in a world of hybrid working. Why should cyber security be any
different?

Discover:

• 5 Hybrid SOC components, including SIEM, Managed SOAR, Staff Augmentation and
Threat Intelligence
• How Hybrid SOC leverages your existing technology investments whilst
augmenting missing capabilities for the ultimate flexible solution
• How 2 customers utilised Hybrid SOC to solve their security challenges

Download your Hybrid SOC datasheet here

 



#RansomAware

#RansomAware is a movement to encourage organisations to share experiences,
exchange ideas and pool intelligence on ransomware attacks.  We believe that the
more companies who expose how they were attacked, by whom, if they paid the
ransom and if their data was recovered, the more we can learn about attacker
tactics, techniques, and procedures to shore up our defences and fight back
against ransomware.

Discover More

Resources
Keep up to date with the latest from our industry experts.
 * Blog
 * Media
 * Hub
 * Glossary


Popular Resources
All Resources


Blog
Threat Intelligence Update: Dangerous Trends to Monitor in 2024
Discover More
Blog
Balancing Security and Agility: The Advantages of Hybrid SOC Solutions for
Cybersecurity
Discover More
Blog
12 Days of Cyber Christmas: 2023 Trends & 2024 Outlook
Discover More
Blog
How Do University CISO’s Share Threat Intelligence? – Research Paper
Discover More
Blog
Cyber Security At Board Level: A Strategic Business Risk
Discover More
Blog
CISO Cyber Dinner Oct 2023 – Recap
Discover More
Blog
SEC Cyber Security Rules: A Game-Changer For CFOs
Discover More
Blog
4 Ways Agile Security Providers Outpace the Big Ones
Discover More
Blog
Talion Cyber Summit 2023 – Recap Of The Day!
Discover More
Blog
4 Key Takeaways From Cofense’s Email Security Report 2023
Discover More
Blog
Lost Your Appetite? Yum Brands Admits to Compromised PII
Discover More
Blog
Emotet Returns & Exploits Passages From “Moby Dick”
Discover More
Blog
Let’s Empower Women In Cyber Security – #IWD2023
Discover More
Blog
Cyber Criminals Take Advantage Of ChatGPT: Should We Let Them?
Discover More
Blog
Calling All CISOs – Let’s Talk About The Recession
Discover More
Blog
Royal Mail Cyber Attack – Where’s My Mail Gone?
Discover More
Blog
4 Cyber Security Trends In 2023 – Prepare Now
Discover More
Blog
What Impact Does Christmas Have On Cyber Security Teams?
Discover More
Blog
Hear From The CEO: Is Covering Up A Data Breach Ethical?
Discover More
Blog
LockBit Ransomware Mastermind Is Arrested
Discover More
Blog
The Impact Of Cyberattacks On IT Security Professionals’ Mental Health
Discover More
Blog
That “Bl00dy” New Ransomware Strain!
Discover More
Blog
Cisco Data Breach Shakes The Tech World
Discover More
Blog
Blurred Lines: Phishing Catches Ransomware Bait
Discover More
Blog
What Is XDR, Really? Let’s Face The Confusion
Discover More
Blog
Phish For Threats: The Emerging Need For MPDR
Discover More
Blog
Phishing – What’s The Problem?
Discover More
Blog
5 Tips To Fight Phishing
Discover More
Blog
The Ultimate Phishing Guide (e-Book)
Discover More
Blog
Stop! Which Data Is Most At Risk From Ransomware?
Discover More
Blog
Black Basta Ransomware Is On The Rise
Discover More
Blog
Ransomware Dominates The Healthcare Industry With 650% Increase In Attacks
Discover More
Blog
Threat Intelligence: Do You Know What Threats You Actually Face?
Discover More
Blog
GoodWill Ransomware Forces Kindness – Is It Ethical?
Discover More
Blog
Going Hybrid: Why Hybrid SOC is the Next Big Thing!
Discover More
Blog
MDR Security: Putting Your Organisation First
Discover More
Blog
CEO Misconceptions About Paying Ransom: Is It Really A Good Idea?
Discover More
Blog
Lockbit 2.0 and Conti Overshadow with the Highest Ransomware Activity
Discover More
Blog
REvil Ransomware Returns: Who’s At Stake?
Discover More
Blog
Is Antivirus Enough To Prevent Ransomware?
Discover More
Blog
5 Key Findings From The Cyber Security Breaches Survey 2022
Discover More
Blog
Small Businesses Are Also At Risk of Ransomware Attacks – Here’s Why
Discover More
Blog
Spies at No.10, a $540 Million Crypto Heist & a Botnet Takedown
Discover More
Blog
Ransomware Costs: Beyond The Cash
Discover More
Blog
Ransomware Predictions for 2022
Discover More
Blog
FIN7 Cyber Tactics – The Return of USB’s, Fake Companies & Teddy Bears
Discover More
Blog
Cyber-Attacks: Is China Giving Russia a Helping Hand?
Discover More
Blog
New US Cybersecurity Laws – Will UK Follow Suit?
Discover More
Blog
Will Cyber Operations Ever Replace Conventional Conflict Tactics?
Discover More
Blog
6 Unique Cyber Security Challenges in Higher Education
Discover More
Blog
Do Economic Sanctions Increase The Risk Of Cyber Attacks?
Discover More
Blog
Man vs Skill: Russia’s Increased Volume Of Cyber Attacks
Discover More
Blog
DDoS Attacks & Malware: Remediation Guidance Is Critical
Discover More
Report
Ransomware Perceptions Report, 2021
Discover More
Blog
Is Cyber Insurance Fuelling the Ransomware Crisis? Key Roundtable Takeaways
Discover More
Podcast
Threat Set Radio #131
Discover More
Webinars
Live Debate: Is Cyber Insurance Fuelling the Ransomware Crisis?
Discover More
Podcast
Threat Set Radio #130
Discover More
Podcast
Threat Set Radio #129
Discover More
Podcast
Threat Set Radio #128
Discover More
Podcast
Threat Set Radio #127
Discover More
Report
Hybrid SOC: Cure Your Cyber Security Headaches
Discover More
Webinars
The Threat of Ransomware to UK Businesses and How to Mitigate it
Discover More
Podcast
Threat Set Radio #126
Discover More
Podcast
Threat Set Radio #125
Discover More
Podcast
Threat Set Radio #124
Discover More
Podcast
Threat Set Radio #123
Discover More
Blog
Join the #RansomAware Movement
Discover More
Blog
Security in the Cloud
Discover More
Podcast
Threat Set Radio #122
Discover More
Podcast
Threat Set Radio #121
Discover More
Podcast
Threat Set Radio #120
Discover More
Podcast
Threat Set Radio #119
Discover More
Podcast
Threat Set Radio #118
Discover More
Podcast
Threat Set Radio #117
Discover More
Podcast
Threat Set Radio #116
Discover More
Podcast
Threat Set Radio #115
Discover More
Webinars
Mapping risk and understanding your threat coverage
Discover More
Podcast
Threat Set Radio #114
Discover More
Podcast
Threat Set Radio #112
Discover More
Podcast
Threat Set Radio #111
Discover More
Podcast
Threat Set Radio #110
Discover More
Podcast
Threat Set Radio #109
Discover More
Webinars
Hybrid SOC: Improving Security Outcomes Through Collaboration & Transparency
Discover More
Podcast
Threat Set Radio #108
Discover More
Press
Women hold only 10% of board positions in top cyber security companies
Discover More
Press
Microsoft Exchange Attacks Declared Emergency By Homeland Security
Discover More
Podcast
Threat Set Radio #107
Discover More
Podcast
Threat Set Radio #105
Discover More
Blog
A Ransomware Pandemic
Discover More
Blog
Threat Intelligence Assessment – SolarWinds
Discover More
Podcast
Threat Set Radio #102
Discover More
Case Study
Data breach ransomware demands and establishing the truth
Discover More
Case Study
Talion’s OSINT Glass Service Thwarts Attack on Law Firm’s Head Office
Discover More
Blog
Your Incident Response Check List
Discover More
Blog
Strategic Cyber Security Advice for Executives
Discover More
Case Study
Talion Threat Intelligence Highlighted North Korean Threat
Discover More
Blog
Is Legal Privilege a Help or Hindrance Following a Data Breach?
Discover More
All Resources




Testimonials
Don’t just take our word for it.
 

Previous

Talion’s model is based on people and partnership and not just technology… We
spoke with others who aspired to this, but it simply wasn’t what they did; they
had a much greater focus on dashboards and alerts. In contrast, the people at
Talion told us: ‘We’re here when you need us – just pick up the phone. We can
meet weekly, monthly – whatever works for you. We’re here to help.’ It was
hugely important for us.

Senior Director – Security Operations

One of Britain’s Largest Technology Companies

Talion have been a fantastic partner to work with and I really see them as an
extension of our team. Having the skillset and agility of a growing organisation
but the talent and capability of a much larger organisation from which they were
formed, BAE Systems, has proven a great combination. The team work hard to
continuously demonstrate and add value to their customers and are always
receptive to feedback.

Director of Information Security and Risk

One of North America’s largest providers of funeral and cemetery services

At every level, [the team] gave us quantitative, analytical advice, in the
moment, … [You] enabled us to take the business judgements that cyber security
requires you to take.

CEO

FTSE 250 Company

Next
Our Partners

We recognise that there are times when we can’t do it all, where knowledge
resides with other parties. Which is why we’re assembling a collaborative
community of experts and innovators, a comprehensive team of industry partners
primed to tackle threats from all angles.


Previous

Next



LOOKING TO MAXIMISE VALUE AND FLEXIBILITY?

Learn how Talion and DEVO partner to achieve this.

Watch Video


DISCUSS YOUR CYBER SECURITY NEEDS

Contact us below and one of our team will be in touch to answer your questions.


CALL US ON 0800 048 5775

Call us directly and we’ll put you in touch with the most relevant cyber expert.


Contact Us

GET IN TOUCH WITH US

Not currently free to call? Give us a brief description of what you’re looking
for by filling out our form and we’ll email you as soon as we can.


Get In Touch With Us



CISO CYBER DINNER – REGISTER YOUR INTEREST!

Thought-provoking cyber security discussion at Michelin-star restaurants across
the UK.

Find Out More
Close

 
 * What We Do
 * Why Us
 * Resources
 * Company
 * Careers

Client Login
 * t+44 (0) 800 048 5775
 * ehello@talion.net

Subscribe to stay up to date
 * © Talion 2024 . SY4 Security Limited trading as Talion. All rights reserved.
 * Privacy

 * 
 * 
 * 
 * 

 * Design Agency: Steve Edge Design