Our Services

Managed Services

Performanta Services is characterised by a history of demonstrable successful implementations and optimised solutions across 5 Continents with a reach of over 1.2 million users.

Technologies

Performanta Technologies invests in cutting-edge IT security technology to give our customers the edge in understanding the threats encountered across their security landscape.

Consulting

Today’s Information Security Officer is required to simultaneously address a multitude of requirements, from regulatory compliance to risk operations, with everything in between.

Our Partners

Five Security Predictions for 2015: Bolder Threats Leading to Bolder Security Teams

No one is safe from getting hacked. This has been no more evident than in 2014 where we have seen some of the biggest high-end data breaches of large companies ever seen to date. Data, personal records and financial information has been stolen and sold on the black market in a matter of days. eBay, Target and more recently Sony … Read the rest

Read More

Assessing and Prioritising Cyber Defence Controls

In a previous blog, we showed how to map prevalent threats to the different business channel tiers using the gaming industry as a lateral example, in this blog we’re going to describe an approach to protect the Core and Middle tiers of the business against breaches.

Embarking on a Security Improvement Program (SIP) for the Core and Middle tier is … Read the rest

Read More

Online Gaming: Mapping Threats to High Level Business Channels

In a previous blog, we covered the most common threats seen in the gaming industry, in addition, we described a high-level approach for a security improvement program (SIP).

As a reminder from previous blog, the high-level approach for improving security for businesses in the gaming industry is comprised of three main layers we can apply a SIP to and holding … Read the rest

Read More

Prevalent Threats in Online Gaming – Every Second Counts

In our previous blog, we looked at a recommended approach for a security improvement program (SIP) at the highest level. Recognising that having the basis to build on and improve security is essential, however it’s also vital that the business understands different threats that the gaming industry faces. They run parallel to the SIP program.

To sustain a successful

Read the rest
Read More

The Online Gaming Industry: Protecting Data Inside Out

The worldwide online gaming industry is worth over £33B and expected to grow 10% year on year going forward. With more money flowing into online gaming and the continual global evolution of cyber-attacks, businesses that develop or operate betting platforms online and traditional casinos, become part of a lucrative eco-system that is a prime target to cyber criminals.

Breaches experienced … Read the rest

Read More

Threat Level ‘DNA Immunity’: Mapping and Prioritising Controls through Threat Modelling

Everyone is at risk of being hacked, in fact, the last few years have seen some of the biggest high-end data breaches of large companies to date. The trend signifies a large increase in attacks from ‘trusted insiders’ or threat actors, aided by the increased availability of underground offensive security technology. Malicious actors can now utilise attack toolkits of sorts … Read the rest

Read More

The cyber-security industry in the UK post Brexit

Today’s cyber-security landscape

The cyber-security challenge within the UK is dual-faceted – not only are the amount of attacks increasing, we are also facing a cyber skills shortage where the time to hire new employees is regularly upwards of 6 months and in many cases a potential employee with the required skills doesn’t exist to hire. The 2015 Global Cybersecurity Read the rest

Read More