Latest News and Opinions

Our latest news, views and how-to's. 

You Deserve the Best Security - We Love the New Strapline

02 Feb 2022

  You don't have to have known the Lithify team for very long to understand what total fans we are of the Check Point brand - we feel passionately that our customers need the best protection we can give them, and for us, that's often Check Point.  You can therefore imagine how thrilled we are with the rebrand and particularly, the new strapline "You...


17 May 2021

ITS BACK!  In 2019 Lithify was proud to sponsor Summer Spin. A 60 (odd) mile jaunt around the spectacular Cotswold countryside raising money for charity with 30 like minded people, roof's down, braving the British weather! Obviously we couldn't do it again in 2020 but that just mean's that we are raring to go this year! New start and finish points, a new...


18 Mar 2021

Wish you could get rid of clunky VPNs and multiple connection methods for users. In this webinar, Gethin Jones, Harmony Architect at Check Point UK joins us to discuss why Check Point Harmony is a giant leap forward in capabilities for user connections. {youtube}Sru0LPW7VEg{/youtube}

Lithify Joins the Good Business Charter

15 Mar 2021

  The Lithify team is pleased to announce that we are now an accredited member of the Good Business Charter.  The charter seeks to to encourage responsible business behaviour and to publicly acknowledge those organisations who exhibit such behaviour. The aim is to inspire as many organisations as possible to change their behaviour, where required, in...

CITRIX SD-WAN - 5 Reasons Why Citrix is your Optimum Choice

15 Dec 2020

In this video, Citrix Manager for Partner Development, Justin Thorogood tells us his top 5 reasons why Citrix SD-WAN is the ideal choice for large and distributed enterprise {youtube}bb3Orql00r0{/youtube}


20 Nov 2020

How do organisations put users at the centre of security posture? How do you ensure complete security whilst most are working from home? If users are your organisation's greatest asset, how do we keep them safe? We discuss all this and more in this webinar. {youtube}SoXWmYvV8S8{/youtube}

Help Us with Research

27 Oct 2020

  We're working with Cambridge University on a study into the standards required by Essential Infrastructure organisations.  Henri van Soest is a PhD researcher in Land Economy at the University of Cambridge. His thesis deals with cybersecurity issues in the electricity system. A combination of decarbonisation, distributed generation, and digitalization...

Findings from A Customer Installation of Check Point Email Protection

07 Oct 2020

A successful phishing attack had obtained the password of the head of purchasing department.   This happened while we only had O365 and Microsoft security.   This was the office 365 Password so they had access to his email in the cloud.   We implemented Check Point email protection after the bad guys getting that password but just before they were to...


23 Sep 2020

Phishing has exploded during Lockdown, in this webinar we explore strategies to protect enterprise from phishing attacks and account takeovers. The Lithify team are joined by our colleagues from Check Point and customers across the UK and EMEA.   {youtube}LWsM2kUBqss{/youtube}

Check Point Mid Year Report 2020

14 Sep 2020

The pandemic has precipitated a tidal wave of change to the security landscape. Check Point's mid year report highlights these changes and their impact. Its an insightful read, get your copy here

SandBlast Mobile - A Customer Perspective

14 Sep 2020

If you're considering Check Point's SandBlast Mobile, you might be interested to read the following review just in from one of our customers, who recently deployed the product.   We  recently implemented Check Point SandBlast mobile on *all* mobile (phone) devices both ‘Droid and Apple during lockdown, following a security breach. There were quite a few...

Purple Team Podcast

08 Sep 2020

Lithify CEO Liz Deakin was recently invited onto the popular podcast "The Purple Team Podcast". Liz sat down with podcast host Eliza-May Austin to discuss the complexities of the OT ICS/SCADA environments. The podcast can be found...

Introducing Check Point Mentor

23 Jun 2020

Over the years, we've watched many clients become disillusioned by the support provided by their vendors and partners.  In many cases, the framework offered by vendors simply fails to meet the requirements for the client. When it comes to telephone support, the "gap" between what the customer thinks that they have purchased, and what was actually...

Welcome to the Revolution

17 Jun 2020

Business traditionally put data at the center of the network, machines and premises second and users last on the list of network priorities. Lockdown has changed all that. Business has realised that employees are what makes a successful enterprise, and that home-working is truly viable. It's up to network managers and us as IT security specialists to help...

Installing SandBlast Mobile

17 Jun 2020

Think installing endpoint is hard work? In this video, Gareth shows us how easy it can be   {youtube}v=fiHcOP9R37E&{/youtube}

The Perimeter is Gone: Long Live Work Anywhere

15 Jun 2020

  What strange times we live in, and what changes we’ve seen in just a short couple of weeks. What’s clear is that there have been major changes In all areas of life, and that’s affected corporate business as much as anywhere else but apart from the many negatives, there are some great positives.     Change, however uncomfortable, brings development...

Free Endpoint Tools for Remote Working

12 Mar 2020

  Check Point is offering free 60-day licences to enable your team to work from home during these trying times.  Use these tools to enable secure access for employees working from home or via mobile devices.  Installation can be carried out from a remote location by Lithify's team of experts, in short timescales.  This is an unprecedented offer by...

Key Steps to Cloud Migration

10 Feb 2020

Moving data and services to the cloud is the hot topic on everyone's lips at the moment, but as with all IT projects, there's no magic bullet. Done correctly, it takes more than a moment no matter what the various cloud providers would have us believe.  Careful planning and a good understanding of the needs of the environment are both key to a successful...

Key Steps to IT/OT Network Convergence

09 Feb 2020

It seems inevitable that IT & OT convergence will be addressed by many operators in the near to mid term. It's certainly a desirable outcome and offers economies of scale and practical benefits for most networks, but there are hurdles to overcome and special considerations to be made.  The need for coherent policy across all parts of the enterprise,...

Making Skype Work Properly with https Inspection

19 Nov 2019

  Tech Chat: This blog comes from our very own John Fenoughty and was originally posted on CheckMates. In this detailed report, John discussed the issues and outlines fixes for the problem.  The piece started life as a discussion of https inspection in general, and in particular about the probe bypass feature, with Skype being an example (along with...

Emmet Cleere Check Point Demonstration

06 Nov 2019

  Think you are safe just surfing? In this video Emmet Cleere from Check Point shows us how easy is can be for Malware to infect your computer then demonstrates how Check Point protects you   {youtube}TJiPbhkF3tM{/youtube}

Easy Transition From N3 to HSCN

30 Jul 2019

  Hard cut over is never fun and is highly dependent on all elements coming together seamlessly for everything to go to plan. It introduces considerable risk in any scenario. Where the change from N3 to HSCN is concerned, firewall changes are needed and these need to happen immediately that the switch from old to new is made. BT are commonly slipping...

Vendor Flip Flopping Serves No-One But Unscrupulous Resellers

28 May 2019

  If your organisation has changed vendors more than twice in the last 8 years, it might be time to re-think your approach.  We all know large enterprises which seem to have run the gamut of every security and networking vendor, changing their estate every three years as one deal comes to an end and another one starts. Until recently I presumed that...

Security Still Centred on Perimeter Firewalls? Let's Think Bigger!

20 May 2019

Still hanging your security on perimeter firewalls? Its time to broaden your scope Who reading this thinks that perimeter firewalls are the main game in security? Many people still do. We've based security on perimeter firewalls for so long that they're just the accepted way of doing things. Firewall are the mainstay - everyone knows that,...

Account Takeover - Why Now?

26 Feb 2019

One of the oldest breaches in the book is back and the consequences (which have always been bad) are now worse than ever. Account takeover has existed for a long time. It used to rely on poor password policies and exploited those users who used the same username and password combination for everything. Stolen email addresses and passwords (normally...

Thinking Of Downsizing Your Firewalls?

19 Feb 2019

I'm constantly talking to both existing & prospective clients and a new phenomenon is catching my eye. Downsizing, simplification and cost cutting are becoming a trend. I can see why. Firewalls are being commoditised and finance teams are simply asking "what am I getting for my investment?" It's a sensible question brought about for sound commercial...

SaaS Application Security - The Missing Puzzle Piece

12 Feb 2019

  These days we're all using "served" applications (SaaS) - Asana, 0365, Google G Suite, Salesforce, SageOne, Slack, Dropbox - there are many. I can't think of a single enterprise in our current customer base who doesn't have at least one.   This change has happened gradually over the last 5-10 years. We've adopted these technologies because they...

Zero Day Video

04 Feb 2019

The concept of Zero Day can be quite tricky to understand so we've made this awesome video to make it a little bit clearer!     {youtube}b5-50df7Whk{/youtube}

Mobile - The Overlooked Entry Point

30 Jan 2019

Hands up who enables uses to access their corporate email on their mobiles? What about other systems? CRM? Accounts? HR? What about document shares such as One Drive or Dropbox? Pretty well every organisation allows at least one of these, many allow far more.  Whether corporate or employee owned (known by the term BYOD - bring your own device),...

What is Zero Day

10 Dec 2018

The concept of zero day has been around for some considerable time, but its only just starting to gain traction, so what is it, why now, and why should you consider it for your network.  What is Zero Day? A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the...

Why Wait?

27 Nov 2018

What's your next layer of protection before your firewall? How can we help you stop threats before they even reach your gateways? Clearly, the safest threat is one which is neutralised before it even reaches you, and therefore products which help you acheive this are inherently desirable.  Rather than stopping threats on your own gateway, a product which...

Check Point SandBlast Now

26 Nov 2018

  Check Point's SandBlast protection is now available to protect any environment, regardless of current firewall provider, as an appliance which sits alongside your current firewall solution.  This enables organisations with an existing non-Check Point firewall estate to quickly augment their environment with these zero-day controls.  SandBlast Zero-Day...

Think Twice Before Switching to an Inferior Product Set

20 Nov 2018

  If you're considering your options on IT security, it can be tempting to think that something new will be cheaper to run than your current product, will be easier to maintain and may offer a more stable platform. I'm here to tell you that more often than not, that isn't true.  I can understand if you're switching from a solution that is greater than 5...

Joined Up Threats Need a Joined Up Solution

13 Nov 2018

We're entering Gen 5 of security threats. Every vendor and analyst will tell you that threats are sophisticated in a way we've never seen before.  There's much in the press about it:   breaches now hit far and wide, targeting multiple systems at once (or over a sustained campaign). Gone are the days of one-off incidents which can be easily deflected by a...

Think 5 - 7 years out

06 Nov 2018

  We've been providing expert professional services as a team now for many years and in that time, the complexity of the solutions we're providing have moved on considerably. Our most complex install 5 years ago would be pretty standard today - even smaller enterprises today have more sophisticated set-ups than the largest organisations back...

Fantastic Posters!

01 Nov 2018

  The say a picture paints a thousand words. We love these fantastic posters by LogRhythm. Whether you're a current LogRhythm client or not, these fun messages are great for instilling good practice across your workforce. The posters all have snappy analogies and easy ways to remember to change your password often, be aware of phishing, and prevent cyber...

Can you trust Security Comparisons?

30 Oct 2018

  There was a heated debate on LinkedIn last week regarding the usefulness of Gartner and whether an organisation should be using their findings as the basis of their IT decisions.  The crux of the question came from concerns about how Gartner and others (such as Forrester) are funded, how they obtain their ratings and the role that sponsorship plays in...

Doing More with Less

23 Oct 2018

  How to avoid overload and get the most from your time and resources.    More frequently, I'm coming across security teams and IT Directors who are having their operating budgets for IT security cut at a time when they should really be expanding.    The scale of the task in security grows larger by the day, and the complexity that we see as standard...

Hidden Pain Points are Where the Real Danger Lies

16 Oct 2018

  What does the threat landscape mean to you? What are your biggest threats? Where are you putting your energy and resources? What if I said that you're very likely worrying about the wrong thing, and that it's the small thing you're not worrying about which presents the biggest challenge?  The most pressing threat to your environment, the reputation of...

Visibility is Everything

09 Oct 2018

  Ever tried to make a decision with only half the facts? It's a hiding to nothing - how can one possibly expect to make the right devision with only part of the picture? An "informed decision" is impossible. Why then do we expect our networking and security teams to routinely do just this - make their decisions without all of the data, sometimes with...

Risk - It's a Fact of Life

03 Oct 2018

  We live in a world of threats. They're a fact of life, just like common cold or uneven paving slabs. We all deal with threats every day, from the moment we wake up to the moment we go to sleep, and don't fall out of bed and hurt yourself, because that's a threat too.  OK, these examples are silly, but it's true - we're surrounded by risk. For the most...

Full Disclosure - The impact of GDPR

25 Sep 2018

  Here comes GDPR and with it, the first wave of major disclosures by UK organisations admitting that breaches have occurred.  Why now? Why so many? Why on such a massive scale. There's a few answers to all of this:     Why Now? GDPR regulations came into force in May and this means that companies are bound to publish details of any breach within 72...

Snooze You Lose

19 Sep 2018

  We've had a flurry of major disclosures in recent weeks - large enterprise (many of them those long revered institutions who were considered unassailable/efficient/trustworthy). If there's one positive we should take from all this it's that no-one is immune to data breach, and that it truly, does happen to us all.      Here's a few recent notable...

Mind the Gap! Why Point Solutions are Pointless

12 Sep 2018

We've all been there - wanting to solve a specific problem without the disruption that's caused by making wholesale changes, or taking on additional network elements (e.g. by acquisition) that come with their own set of tools. We've all been seduced by the claims of a niche provider who has a great product for a particular network need which could take...

Banking Update

30 Aug 2018

TSB have just published their year end results and have stated that the banking problems from earlier in the year have cost at least £176m with more impact still to follow, they've also intimated that this would have been enough to take the business down, were it not for investment from their parent banking group, Sabadell. They also reported a loss of...

Buckle Up! The ride is wild, but so are the rewards

15 Aug 2018

Get ready to blow your mind!! Cloud Security Turns Everything on its Head   There are many reasons for organisations to consider adopting cloud infrastructure including improved availability, flexibility and scalability being just a few. There are many blogs and other resources on the benefits of having a flexible infrastructure and I bet having your...

"Difficult": Where the Best Experiences are Found

03 Aug 2018

Many service providers shy away from the most difficult stuff, but we know that complexity brings the biggest challenges but also the biggest rewards. It's the difference between "that'll do" and "this is a game changer".  Security has for too long been put in the category of "necessary evil" and this is terrible. It takes huge potential, promise and...

10 Security Maxims Debunked

04 Jul 2018

IT Security is a huge and daunting topic, it takes an expert to stay on top of everything!  So much information, so much conflicting advice, it's difficult to know where to start, but not all advice is good advice.  There are some common messages that we really don't like. Here's our top ten ways that our industry is getting it wrong:   1. "Security Is...

HR: Your Front Line in Network Security

13 Jun 2018

HR has a huge role to play in the security of your networks   Yes, Human Resources. For all the effort your organisation expends to implement robust IT policies and infrastructure, the biggest threat to an organisation’s safety comes from its people. Whether through malice, ignorance or human error; the people in your businesses are the most likely...

Troubleshooting- The Most Expedient Improvement

04 Jun 2018

If you have a problem, if no one else can help, and if you can find them, maybe you can hire the A-Troubleshooting Team. When you have a solution which isn’t working correctly, or you just don’t think it’s performing well enough, it’s common for organisations to think that a rip and replace strategy is better than spending the time to resolve...

Lessons from a UK Bank's Catastrophic Data Breach

30 May 2018

I've been watching the news surrounding one of the UK's major retail banks aghast. I could ask "how could they let this happen" but it's obvious why it happened, and very sad. We have a major UK institution in crisis through ineffective security and archaic data architecture.  First of all there was a data breach following a system upgrade. This resulted...

Optimisation- Making the Most of your Existing Tools

03 Apr 2018

One of the most annoying things I see on a daily basis is companies with great security products – huge capital expenditure, spent wisely on market-leading products which are great assets, but which are totally under-utilised and going to waste because the infrastructure, fundamentally hasn't been set up correctly. ​  Even worse, we sometimes come across...

How to Engage Us

Lithify is available for short or long term engagements, to help with a problem, to implement a specific project or as your preferred partner in IT Security. 

Contact us, book an initial (free of charge) consultation or request an urgent call back

Contact Us