Welcome to Glock Enterprises

We're healthily paranoid about cyber security so you don't have to be. We chant the mantra "Data protection by design and by default", lifted straight from the GDPR (and if you don't know what that is you definitely should talk to us).

Want to ensure security and privacy for your existing applications? Got an idea for a disruptive new service?  We're the right people to ask.

We provide software tools and consulting services for organisations that want to get the best out of digital transformation, but want to do it their way.

We've teamed up with some of the most innovative information security companies to bring you tools to make your life easier and more secure. Check out our Partners section for more details.

Finally. Were you expecting some fancy website with lots of product stuff? We do that for our clients but we keep things simple wherever possible. So there's not much to see here. What we really want you to do is start a conversation...

Just lurking? check out our Blog or visit us on Mastodon

What we do

Deal with Human Risk

Security awareness training deployed? Compliance box ticked? So why have the number of security incidents not improved? Don't just teach your people, learn from them: feedback, intention, sentiment and engagement analysis. Who is not behaving securely and why? How to address it? Data provides the foundation for risk decision making and treatment prioritisation. Leverage existing data sources (antivirus, web filters, email DLP) to measure real security behaviours. Catalyse your existing security assets. Measure human risk, from individual to company level.

Find and Manage Your Assets

Somewhere along the line, asset management became very “unsexy” compared to all of the other things we do in cybersecurity, yet everything we do relies on knowing which assets are in our environments. We like to call asset management the Toyota Camry of cybersecurity: it’s not as sexy as some of the bleeding edge technologies out there, but understanding the relationship between assets and our security policies is a fundamental and basic need. We provide validation, remediation & securing of IT Policies and IT Infrastructure both on-premise and in the cloud.

Threat Modelling

Whether developing new applications or reviewing the risks associated with your IT real estate, your organisation needs a way to identify, predict and define threats across the entire attack surface so you can take appropriate security decisions and minimise overall risk. Even better, you want to draw on the best practise that the industry has to offer. We provide a threat modelling service that automates a lot of the modelling process and adapts as you change and develop your application set.

Data Leakage Detection

Your enterprise’s sensitive information is already outside your network, and outside of your control. Your data could be exposed across the various layers of the internet, from the Surface Web to the Dark Web, or across countless unsecured connected devices. You could spend countless hours finding and analysing what is 'out there', or you could use an automated platform that instantly alerts you to your data leaks and digital threats, providing all the actionable information you'll need for remediation.  

Detect and stop breaches

Breaches are inevitable but you want to know when a breach occurs, and stop access to sensitive data. We implement and manage cyber deception platforms to detect, investigate, and contain attackers. You probably already have some deception measures in place (honeypots, honeytokens...), find out about migrating to a modern deception platform that pulls together Threat Intelligence, email deception, network deception, AD deception, and more to build your deception program.

Protect personal data

When sending documents around or outside your organisation you need to ensure that personal information is protected. Anonymization is the process of either encrypting or removing personally identifiable information from data sets so that the people whom the data describe, remain anonymous. Isolating and protecting your sensitive data is the foundation for proper governance, data security and control.

Tools for you to use

We have teamed up with innovative startups to bring their platforms and tools to our enterprise and government customers and for some, that's a great way of engaging with us. However, we recognise that not everyone wants to contract with us to build a service for them. Some of you, especially consultants and managed service providers, want to build the tools we use into your own services. That's fine with us. We have reseller/distributor arrangements with all of our technology partners.

Startup support

You might recognise this problem... You're a startup and have a great idea and a young, passionate team but you need some experience on the board to help with decisions about technology, marketing, data protection...anything concerned with taking your great idea, turning it into a Minimum Viable Product (without falling foul of data protection regulations) and getting it to market. Why not 'rent-a-CTO/CMO/DPO'? We'll find experienced executives to work with you and accelerate your digital business. We're flexible enough to work for equity, though we usually work on a mix of equity and a retainer.  

Data Protection HealthCheck

Concerned about the GDPR? Looking for a Data Protection Officer? Want validation that your security controls are robust enough? Our Data Protection HealthCheck service is aimed at organisations that want to embed security into their business, whether validating existing or developing new applications and processes. Typical engagements: Produce a Privacy Impact Assessment (DPIA) to support GDPR requirements; Review and harden a healthcare application; Develop and launch a secure method of capturing memories...
See all our services

Start a Conversation


Our Partners