IT Security Done Properly

Solid Foundations

Solid Foundations

Confidence in IT Security frees rather than restricts, giving users the safety to create and innovate. Let us empower you to do more.

Check Point Experts

Check Point Experts

No-one has the depth of expertise which we bring to Check Point deployment. Let us help you get the very most from your implementation.

Unrivalled Experience in OT

Unrivalled Experience in OT

Lithify has an international reputation for our work securing power stations. Our understanding and experience in OT is unsurpassed.

Endpoint Delivered Seamlessly

Endpoint Delivered Seamlessly

Protect your users wherever they are, quickly and without disruption. Market leading solutions with unbeaten catch rates.

Lithify for Cloud

Lithify for Cloud

Industry leading protection, cloud native security and analytics for complex deployments in AWS, Azure, Google Cloud Services and beyond.

Check Point Mentor

Check Point Mentor

Ongoing help with your Check Point deployment, bringing specialist expertise to your team without the need for inflexible managed services.

Security is our Sole Focus 

IT security shouldn't restrict, it should empower:
By providing a solid foundation, we enable business to be more innovative, more creative, more productive. 

Lithify is a specialist security reseller. We provide complex IT Security solutions to the largest companies in the UK and worldwide.
Our solutions are market-leading, delivered by experts with international reputations for excellence in their chosen fields.

We work with our clients on an ongoing basis to ensure that the investment made in IT security is utilised to the full and grows as the organisation evolves. 

We work in the most challenging environments to make security work for the business it serves. Our reputation for troubleshooting and problem resolution is unparalleled. 

Talk to us today about how we can help you reach your goals. 

I Want Help With......

OT & SCADA

Cloud Security

Endpoint Security for Users

Disaster Recovery Planning

Detailed Security Evaluation

Troubleshooting Check Point

Security Strategy

Incident Response

Email Security

Check Point Mentor

A successful phishing attack had obtained the password of the head of purchasing department.
 
This happened while we only had O365 and Microsoft security.
 
This was the office 365 Password so they had access to his email in the cloud.
 
We implemented Check Point email protection after the bad guys getting that password but just before they were to commence the main payload of the attack.
 
So when they started sending lots of emails as that individual to various other individuals both within the organisation and in important government organisations CloudGuard SaaS immediately started marking all of those emails as suspicious and alerted us to this.
 
It is common practice to implement in monitor only mood for a short while before going into full on prevent so sadly whilst we were alerted to them, those emails actually did go out but we were able to put a stop to it and we had a perfect list of all the suspicious emails which went out and could tell recipients what’s going on.
 
Since this attack and having gone into full prevent mode (and changed the user’s password) he is still of course under quite extreme attack because they know this is a person whom they have successfully phished previously.
 
We have seen many and various fishing attempts sent to him which have passed through Microsoft a few admittedly stopped by Microsoft but plenty not. 100% of these have been stopped by CloudGuard SaaS and no false positives for this user. He is on high alert and confirms no new phishing attacks have come through to him since we went in to prevent mode.
 
On top of this has been implemented the anomalous login feature which has demonstrated that two further users have their passwords compromised at some point in the past and the initial first ‘tester’ login that the bad guys carried out was observed and alerted.
 
Next we will be able to implement the complex and granular authentication methodologies to ensure that we don’t allow anomalous logon but protect against them in a manner which whilst bringing security does not compromise efficient usability For legitimate users in common situations (ie known user, known machine in a known country - no second factor authentication) - take away any one of those elements and we will automatically request a second for of authentication. This is most likely to be Check Point’s agent on a mobile. It’s the perfect answer to balancing security to usability.

Lithify:

/ˈlɪθɪfʌɪ/ : to change to stone : petrify; especially : to convert (unconsolidated sediment) into solid rock.
intransitive verb: to become changed into stone.
IT Security: to cut through the mire of conflicting advice and provide a solid foundation for business.

Latest from our Blog

Findings from A Customer Installation of Check Point Email Protection

07 Oct 2020

A successful phishing attack had obtained the password of the head of purchasing department.   This happened while we only had O365 and Microsoft security.   This was the office 365 Password so...

Read More

BE PHISH FREE - E MAIL SECURITY WEBINAR WITH CHECK POINT - 23/9/2020

23 Sep 2020

Phishing has exploded during Lockdown, in this webinar we explore strategies to protect enterprise from phishing attacks and account takeovers. The Lithify team are joined by our colleagues from...

Read More

Check Point Mid Year Report 2020

14 Sep 2020

The pandemic has precipitated a tidal wave of change to the security landscape. Check Point's mid year report highlights these changes and their impact. Its an insightful read, get your copy here...

Read More

SandBlast Mobile - A Customer Perspective

14 Sep 2020

If you're considering Check Point's SandBlast Mobile, you might be interested to read the following review just in from one of our customers, who recently deployed the product.   We  recently...

Read More

Purple Team Podcast

08 Sep 2020

Lithify CEO Liz Deakin was recently invited onto the popular podcast "The Purple Team Podcast". Liz sat down with podcast host Eliza-May Austin to discuss the complexities of the OT ICS/SCADA...

Read More

How to Engage Us

Lithify is available for short or long term engagements, to help with a problem, to implement a specific project or as your preferred partner in IT Security. 

Contact us, book an initial (free of charge) consultation or request an urgent call back

Contact Us