• We help our clients optimise investment in cyber security through tools that:

    • Simplify
    • Automate
    • Manage

    The digital cyber posture

    Dome9 Greyping identity

    cymulate logo2radware logo2

  • We help turn workforces into teams of well-trained cyber defence warriors in one of our World Cyber Warfare Arena's

    CyberGym SA

  • "Cyber criminals are well connected. We need to be better networked than they are."

    Yossi Schneck (HO Cyber Entrepreneurship) Israel Electric Corporation


Observer Solutions simplify and automate cyber security through selected best of breed tools that our consultants and engineers implement, optimise and support.

RISK led thinking - Bringing it all together

Organizations face a real challenge with balancing running the business and ensuring assets are secure is usually based on a prioritization call. Observer solutions can assist with that call bringing together information from multiple sources and presenting this in a Risk context.

Vulnerability Scanning

Known Vunerabilities – often in the thousands' which ones to patch first based on threat intel and asset criticality

Attack Vector testing (pentesting, phishing WAF etc…)

Identify weaknesses in your posture across all attack vectors. Avoid duplication with known information from Vunerability scanning. Run daily not annually and avoid missing weakness for months.

Threat Intelligence

Let real world activity drive your investment and efforts to secure against actual threats not historic prespectives.

Controls Status

Typically self assessed there will always be changes needed to control settings as the organization changes and transforms. New features and functions evolve as the tools protecting the organization improve. Include this information into the risk based decision making process.


Tim Vincent

Tim is a C-suite executive with a global track record of supporting businesses through transformation, development and growth. His experience includes early phase technology commercialisation to forging rapid growth leading to turnover exceeding $500m. He has worked globally and is renowned for his knowledge of the contemporary cyber security space.

Dave Barrett

Dave is a strategic, executive manager, who is experienced in a variety of roles within IT, technology and financial services organisations. He is a well-regarded leader known, through his vision and strategic thinking, for supporting businesses to constantly achieve success.

Reporting can be focused on specific areas of concern such as by department, by site / region or indeed by specific controls.


Observer Solutions was founded by business leaders who saw that the fog of cyber security had become so dense that we built a research and consulting team to cut through to provide absolute clarity on the as is situation with clear plain English recommendations on steps to enhance.
Our mantra has become two-fold: Simplify and Automate.


  • +44 (0) 203 697 1364
  • +44 (0) 7767 766653
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

© 2018 Observer Solutions. All Rights Reserved. Created & Designed by Gekkota     | Privacy Policy | Sitemap |  

Account Management

  • Directory Service
  • Identity Governance and Administration
  • Privileged Account Management
  • User Authentication

Malware Defence

  • Endpoint Detection and Response
  • Endpoint Protection
  • Specialized Threat Analysis and Protection
  • Unified Threat Management

Secure Network

  • IPS
  • NAC
  • Network Behaviour Monitoring
  • Network Firewall
  • Network Security Policy Management
  • Secure Remote Access
  • Threat Intelligence

Secure Configuration

  • MDM
  • Security Configuration Management

Data Security

  • Active Breach Detection
  • Database Activity Monitoring
  • DLP
  • Email Security Gateway
  • File Integrity Monitoring
  • Web Security Gateway

Incident Management

  • Cybersecurity Management
  • Incident Response
  • Security Orchestration and Automation
  • SIEM
  • Ticketing System

Security Assessment

  • Database Vulnerability Assessment
  • Policy and Risk Management
  • Vulnerability Scanner
  • Web Application Vulnerability Scanner

Physical Security

  • Physical Access Control
  • Security Cameras

Secure Applications

  • WAP
  • Web Application Security Scanner

This site uses cookies for a better user experience. By continuing on it you accept our privacy policy terms.

Learn more