DDoS Protection Service
Protect your website from DDoS Attack
FIND OUT MORE
A little about what we do.
Phishing is still the leading cause of cyber attacks. Approximately 90% of all cyber attacks begin with a phishing email. In 2016 Phishing was even more prevalent than ever and may have tipped a US election, due to John Podesta falling victim to a phishing scheme that compromised his accounts and exposed insider communications. Our Friends […]
With the haze of 2016 behind us, albeit a few days, here at Razorthorn we are already looking forward to a prosperous new year and hopefully a secure one, especially for our last remaining idols. However, there are always some things or people out there that are determined to hinder that prosperity and security. Below […]
Cyber Attack Hacking Myths Cyber attacks can be performed for either criminal, terrorist, activism or political gain. In the end though, they all use similar Tactics, Techniques and Procedures (TTPs) to achieve their ultimate goals. From a criminal point of view, finical institutions have often bared the brunt of the hacker’s target sights. However, now […]
What our customers are saying.
“They are a great team with a great philosophy towards collaborative learning and teaching. Ensuring the delivery of their material directly relates to real-world events and individual engagement is of the upmost importance to Razor Thorn! I highly recommend Razor Thorn and continue to work with them today.”- Training Customer
Razorthorn was founded in 2007 and since that time have become a leading provider of trusted Information Security Consultancy for companies and institutions of all sizes on the subject of Cyber Security and Information Security.
With offices in London and New York we are a truly global organisation who prides itself on quality and discretion at all times.
Razorthorn Ltd is a dedicated Information Security Consultancy with an international presence that helps its clients to take an integrated approach to Information security and Cyber intelligence ensuring the main pillars of People, Process and Technology are always included in the information life-cycle. Our belief in quality and discretion drives everything, resulting in satisfied, long term clients.
We specialize in building end-to-end Cyber strategies for companies, building true cyber threat intelligence, evaluating their major weak points and vulnerabilities before putting in a place a plan of action that will increase Total-Control of their cyber presence.
We provide cyber Intelligence and threat analysis and a range of services from ad hoc consultancy to fully managed information security services. Razorthorn helps clients manage complex security needs from conducting audit and compliance reviews, embedding risk and compliance methodologies and technical cyber services and intelligence.
If you are looking to outsource parts of your information security consultancy needs then we can help. We have dedicated teams of specialist who can manage development and delivery of Governance, Risk and Compliance processes and technology across your organization.
• Information Governance, Risk and Compliance
• Information Security Polices & Standards development
• PCI and ISO preparation and Certification
• Information Security and IT Technical Reviews
• Security Architecture and Design
• Cyber Intelligence automated tool-set
• Pen Testing and Vulnerability Management
• Web Application Security
• DDoS Protection
• Database Security
• File Security
• SharePoint Security
• Cloud Security