Sales: 0845 470 4001 | Support: 0845 230 6001 | Contact Form | NPS

University of Sussex partners with Exponential-e to implement a managed Cyber Security Operations Centre

University-of-Sussex-partners-with-Exponential-e-to-implement-a-managed-Cyber-Security-Operations-Centre

Collaboration with Exponential-e will strengthen the university's cyber security capabilities as part of its long-term cyber strategy.

January 2025 - Exponential-e, a pioneer in cloud, connectivity, communications, and cyber security, has been selected by the University of Sussex to provide a fully managed Cyber Security Operations Centre (SOC) to detect and respond to cyber threats in real time.

Located near Brighton in the south of England, the University of Sussex is a leading higher education and research institution, home to over 18,500 students and nearly 3,500 staff. As part of its ongoing commitment to enhancing cyber security, the University has created a Cyber Security Programme, partnering with Exponential-e to implement a fully managed SOC, to support its vision.

The SOC, which will operate as a hybrid model, will see Exponential-e work in close collaboration with the University's internal IT Services team. Together they will ensure that cyber security capabilities are strengthened, providing 24 / 7, 365 days a year monitoring, threat detection and response.

The key benefits that the managed SOC service will deliver is an increased capacity for earlier detection and response to events, incidents, and threats to minimise disruption to IT services, leading to a reduction in the number and severity of cyber incidents that occur.

Suzanne Elmore, Cyber Security Manager, at the University of Sussex, said: "In an ever-changing threat landscape, there is a continual need for improved insight and awareness of emerging cyber threats within the University. Working with Exponential-e to deliver the managed SOC, we will be able to access an informed source of intelligence to efficiently monitor threat analysis and respond to cyber threats, 24/7."

Afshin Attari, Director of Public Sector at Exponential-e, said: "We understand the complexities of malicious behaviour and have deep rooted experience counteracting emerging threats, so we are looking forward to working with the University of Sussex to support its forward-thinking cyber strategy. The managed SOC service will not only monitor and manage threat analysis for quicker response rates to minimise IT disruption for students and staff, but it will also help to reduce the University's exposure to financial and reputational risk from cyber security threats."

The contract spans an initial period of three years following implementation, with two annual extension options to a maximum of five years total.

‐‐ ENDS ‐‐

  3515 Hits

Why Legal firms are making SIEM systems a key element of their cyber security strategies

b2ap3_large_Why-Legal-firms-are-making-SIEM-systems-a-key-element-of-their-cyber-security-strategie_20220425-164703_1

The UK's Legal sector must contend with some of the most stringent compliance and data protection obligations in the current digital landscape. For many years, this has hindered the progress of digital transformation initiatives within firms, but in recent years, in order to meet the challenges of COVID-19, many firms have seized the opportunity to modernise cumbersome legacy systems and develop cutting-edge IT infrastructure that enables their staff to work more flexibly.

  1471 Hits

The finance sector rises to meet its latest cyber security challenges

The-finance-sector-rises-to-meet-its-latest-cyber-security-challenges-header

The finance sector is required to have one of the most sophisticated cyber security postures in the world, with bureaus, banks, finance companies and insurers working closely with their technology partners to ensure sensitive financial data is managed, stored and transferred, with a stringent range of international security standards that must be adhered to at all times. However, cyber criminals have demonstrated repeatedly that they are constantly working to breach even the most sophisticated security ecosystems, devising new ways to exploit both technological vulnerabilities and human error.

  2164 Hits