We ensure many of the networks and finance platforms critical to the UK’s infrastructure and economy remain online, secure, and performing optimally.
Services that take away the pain and let you concentrate on what matters most.
Managed Security Monitoring
Improving security and delivering the business outcomes you need...
Managed Zero Trust Access
Managing a secure access strategy is often thankless and seldom desirable...
Managed Security Testing
Ensuring security tools can block new threats is key to success, but hard to run...
Lab as a Service
A place where you can develop and test without contraints like data centre change controls and restricted access...
Solutions and services to industry-specific Network, Monitoring, Security, and Test Automation challenges.

Select your challenge area

The Appgate Zero Trust Network Access (ZTNA) platform provides secure and contextual access to just the right assets and locations – for just the right people.

Whether you need to provide Contractors with controlled access to specific assets or are looking to replace your VPN with something built for this digital era, our Appgate ZTNA solution will provide the secure means to achieve your objectives.

We also offer a Zero Trust Managed Service for customers wishing to upgrade without managing the platform themselves.


A Distributed Denial-of-Service (DDoS) attack occurs when a cyber-attacker uses multiple systems to flood the bandwidth and resources of a server hosting a web site or application.

With visibility into one-third of the world’s internet traffic, Arbor Networks’ DDoS Mitigation platforms from Phoenix Datacom provide early warning and blocking of DDoS attacks before they can take down servers and the applications and web sites they host.

Gone are the days where DDoS attacks were launched exclusively by cyber-criminals. Companies can now buy Botnets that serve to barrage their competitors’ web site with DDoS attacks designed to take them down.

If your web site is critical to your business, and downtime costs money or reputational damage, contact us to see how we can provide, install, and configure Arbor DDoS Mitigation measures to protect your web site and applications against the growing threat of targeted DDoS attacks.

Arbor Networks

Accepting a motivated attacker will bypass even the most sophisticated security layers, Attivo’s Deception approach lures them to what appears to be a legitimate environment and provides you with instant visibility of the incursion.

Not to be confused with Honeypots, Deception enhances security measures by deceiving human attackers and advanced threats in to thinking they have reached their target destination. This enables you to detect, investigate and remove them as soon as they arrive. You can also monitor their activity to safely learn more about their attack methods and motivations.

We provide Attivo ThreatDefend and can integrate it with your security infrastructure to enhance your posture and replace false positives with high fidelity alerts – cutting threat fatigue and optimising Security Analysts’ time.

Attivo Networks

ExtraHop’s Reveal(x) platform decrypts and analyses all cloud and network traffic to eliminate blind spots and detect and investigate cyber-threats in real-time.

Reveal(x) can also revolutionise your SIEM platform by only feeding it the events it needs. This lets you triage based on high-fidelity alerts whilst reducing SIEM costs and threat fatigue.

Due to the way in which Reveal(x) looks at wire data to uncover threats, it can also provide real-time actionable intel for network and application performance monitoring and problem resolution.

As ExtraHop’s partner in the UK, we can also provide the means to safely copy your network and cloud traffic, condition it as needed, and send it out-of-band to your Reveal (x) platform.

ExtraHop Networks

FireEye’s sandboxing technology works to prevent the types of sophisticated threats designed to circumnavigate traditional security measures. We supply and support FireEye’s full range of email, endpoint, and network security protection tools, so please contact us to discuss your needs.




We combine forces with our colleagues at Fortis Information Security & Risk Management to bring you the tailored services you need to improve your security posture.



Our joint services include:

  • Information security strategy creation & development
  • Security process and technology risk assessments
  • Ethical hacking and security penetration testing

We also provide compromise assessment and remediation services in the event of a cyber-attack or security breach.


Available as a cloud service and on-prem solution, Garrison’s SAVI platform from Phoenix Datacom provides the means to securely click links and visit web sites that contain malware.

This enables you to reduce your cyber-attack surface, safely conduct dark web investigations, and even surf the internet on computers reserved for things like SWIFT payments, HR payroll and other sensitive functions.

Garrison’s hardware isolation approach is not the same as VDI-based solutions that lack scalability, and ironically have their own security vulnerabilities. We think of it as being like an airgap network, but without any of the drawbacks in user experience or acceptance.

As Garrison’s partner for the UK, we can show you the SAVI platform in action and integrate the solution to your environment.

Garrison Technology

Whether you need real-time provisioning and link protection in your Data Centre or Internet Exchange, want to enable Test Automation in your Lab, see greater flexibility for UHD Broadcast transmission, or need to access monitored WAN interfaces for Cyber-Surveillance, our range of Huber+Suhner Polatis Layer 1 Optical Matrix Switches has you covered.

With single mode and multimode options available, numerous port counts from 4×4 all the way to 576×576, our SDN-enabled Huber+Suhner Polatis Switches have ultra-low loss and ultra-low deterministic latency, meaning they provide a dependable strategy for your high-speed data requirements.

Not only do Huber+Suhner Polatis optical switches avoid the cost and power requirements of signal conversion to electrical and back to optical again, but they are also agnostic to bandwidth and protocols – which means future-proof.

Huber+Suhner Polatis

Mergers and acquisitions over the years have culminated with Test, Visibility, and Security companies formerly known as BreakingPoint Systems, NetOptics, Anue, and in 2017; Ixia, all becoming part of Keysight Technologies.

As a long-term Elite Partner, we provide and support Keysight’s Network Performance, Test, Cyber-Security, and Visibility solutions to companies for whom network, security, and application uptime are critical to success.

For security resilience, we provide Keysight’s Network TAPs, Bypass TAPs, and Vision Series Network Packet Brokers that copy and condition traffic to allow security tool chains like Firewalls, Intrusion Prevention Systems and Malware Sandboxes to perform their functions without introducing risk to security or network uptime.

We use the same network traffic conditioning techniques to safely send traffic out-of-band to network and application performance monitoring tools.

If desired, we can look after your entire Keysight Security Resilience Platform with a dedicated 24/7/365 managed service designed for your unique needs.

Please contact us to discuss your requirements in these areas.

For security protection, breach and attack simulation, network/security stress testing, and active network performance monitoring, please see below links to Keysight solution overview pages.

Keysight Technologies

NetQuest Corporation’s WAN visibility solutions cover a wide range of specialist needs, including automated mass cyber-surveillance, rapid WAN network survey and high capacity unsampled network metadata generation to monitor high speed networks up to 100Gbps.

Without previous knowledge of signal provisioning, NetQuest’s technology can automatically discover the transport technologies used on any monitored WAN interface (like DWDM, OTN, SONET/SDH) and convert it to Ethernet for analysis. This reduces the time taken to reach high-fidelity, actionable intel for a variety of critical applications.

NetQuest Corporation

If the speed at which you can reach high-fidelity and actionable intel is critical, our Niksun Packet Capture and Forensic Analysis Platform will provide the rich detail you need at a speed we believe to be unmatched in the cyber-security industry.

And due to the way in which our Niksun Platform quickly finds and reconstructs precise detail of things like web pages, chat, email, and other IP sessions from raw data packets, you can also use the technology to monitor network, VoIP, financial transaction, and market feed performance with precise detail.

If you need a local partner to provide, support and even manage your Niksun solution, contact us today to discuss your requirements.


One platform ingesting your logs and delivering your SIEM, cloud migration, application performance, and operational intelligence needs is a compelling and cost-effective proposition that benefits Security, Network, and Applications Teams, as well as Marketing, HR, and Business Analysts.

We at Phoenix Datacom are Sumo Logic’s partners for the supply and integration of Sumo’s Intelligent Log Collection Platform for companies in the UK. Whatever your SIEM, performance monitoring, or trends intel needs may be, we can supply and configure the Sumo Logic Platform to fulfil them.

Sumo Logic

Toyo Corporation designs and manufactures measurement systems for communication networks and has developed Synesis – the world’s first portable Packet Capture and analysis system for 100 Gig Ethernet Networks.

Synesis captures all packets without requiring load balancing or clustering hardware, which is critical for 100G Network Performance Troubleshooting and for high-fidelity analysis of cyber-attacks and breaches.

Toyo Corporation

We can help you maintain competitive advantage

Send us your enquiry and we’ll get back to you ASAP