360 is Performance, Security and Virtualization

One of the largest defence and aerospace companies in the world

360is consultants assisted the firm in uncovering and closing down a serious case of industrial espionage which sought to reveal their negotiating position on a multi-billion dollar contract for weapon system development and supply. More

One of the top 5 online sports betting companies

360is provided an Application Security Assessment and Penetration Test as part of the companies anti-fraud/anti-money-laundering program. Findings were presented to Oracle, their application vendor, for remediation. More

A multinational chemicals and precious metals processing company

360is provided an Infrastructure Security Assessment directed at the internal systems of a recent acquisition. Our comprehensive report enabled the parent company to complete the integration of the target’s network on time without jeopardising IT security. More

A multinational news & publishing organisation

360is conducted a wireless penetration test prior to the roll-out of a multi-site secure wireless network for 2000 central London journalists, analysts, and visitors. More

A corporate intelligence firm advising on litigation & country risk

360is provided the firm with a repeatable framework for systematically addressing technical compliance challenges from clients, including 3 of the worlds top 5 investment banks. More

Corporate finance advisors to the mining & metals processing sector

360is provided a secure design for the London office network and technical security guidance for employees working in countries with complex and delicate geopolitical issues. More


Today, the job of building and maintaining secure IT systems is more complex than ever before. The imperative for zero downtime, a mobile workforce, distributed applications, and new infrastructure concepts like cloud all conspire to prevent you from securing your data.

Meanwhile the consequences of a failure in security have increased several-fold. There are more stringent regulatory powers, more electronic links to suppliers, organised crime and extortion, and personal privacy obligations. All this in an environment where litigation is rife.

Together this increase in complexity coupled with greater penalties for failure mean that you need a higher level of assurance that your investments in security are delivering. Are they deployed in the right place? Are they configured according to the best current advice? Are they operating as the vendor stated?

Read more