Network Security Services

Mitigating security risks using best practice, innovative technology and common sense.


Cyber security: a never-ending story

Over the past few years, IT (or Cyber) Security has been recognised as a major business risk. What began as an irritation – early viruses and worms were annoying, but did not pose a serious threat – has developed into a set of serious issues for both industry and Governments.

The major problem facing organisations is how to manage the business risk; like most other risk elements, Cyber risk cannot be completely eradicated, but it can be effectively managed.

Many organisations are unaware of the security elements available within their existing investment inside the Microsoft stack. We can help you deploy these elements, and maximise the benefits without investment in additional technologies.


How do we make your life easier?

We can provide review and deployment consultancy to help mitigate Cyber business risk, and advice on additional technologies and training to further enhance this.

Utilise 5 In-built
Security Solutions

minimum cost

Best Practices
and Certifications


BitLocker is a full disk encryption feature included within Windows and is designed to protect data by providing encryption for entire volumes, and can be deployed with no capital expenditure

Trusted Platform Module (TPM)

The TPM is an international standard for a secure cryptoprocessor. TPM’s are found on most business-class computers, and can be used both for Machine Identity and storing Bitlocker keys

Virtual Smartcards

Virtual smart card technology from Microsoft offers comparable security benefits to physical smart cards by using two-factor authentication. Virtual smart cards are created in the TPM.


DirectAccess uses IPsec so all data in transit is encrypted. Combine it with Microsoft’s Bitlocker Drive Encryption and keep all of your data secure.

Microsoft Certificate Services

Available on most Enterprise versions of Microsoft Windows Server, Certificate Services creates a high assurance Public Key Infrastructure


How does it all work?

Services & Process

We have over 20 years combined experience with the Microsoft stack, and allied security technologies. We are not a “Technology Sales” company, we believe that organisations can improve their security without further extensive capital expenditure.

  • Talk to us

    Algiz Technology is happy to investigate potential security improvements using the customer’s existing technology investment. Our technical staff bring extensive experience of the Microsoft stack, and can discuss opportunities for system improvement, without obligation.

  • Agree a way forward

    Following discussions, if there are elements within the customer infrastructure that offer security improvements, Algiz Technology consultants can help with the design and implementation of the requirement.

  • Implement

    Following the deign and agreement of the implementation, Algiz Technology can assist, if required, with the delivery of the project.