Software Engineering services

Platform security specialists

Managed alongside our core product development, our London-based software development team have over 15 years experience of software project delivery, ranging from large multi-year defence programmes to small agile projects for private sector customers.

Some of our focus areas

  • Secure operating system builds from EUD to IoT, for Android & Linux
  • Trusted Platforms & Identity: Remote Attestation, Identity Management, SAML, Hardware Security Extensions
  • Mobile Device Management

Desktop as a Service

Managed Desktop Services

Originally focused on a cloud-hosted version of our Paradox end user device platform, our desktop as a service offering has expanded to include a range of devices including Windows, Mac and iOS.

We're not a Systems Integrator, but with many customers increasingly cloud focused, our management technology and expertise can be easily deployed to allow organisations to fully or partially outsource commodity IT, and focus on business applications.

Customers such as East West Railway depend on us for day to day management of commodity IT, leveraging the security and cost savings of a cloud platform for business service delivery.

EWR

Consultancy

OS Security, Cloud migration, High Assurance Systems

Through Becrypt's R&D and consultancy engagements with UK Government, including NCSC, we have built extensive cyber security expertise that is relevant and available to our customers through consultancy engagement.

We help organisations adopt the latest in 'High Assurance' systems, by leveraging the experience gained from from working with early adopters in government. Projects range for container orchestration for 'High Assurance' MDM platforms to secure operating system deployment and configuration within IT and OT environments.

Contact us to
learn more

Arrow

Latest News

  • ​Is there room for new MSSPs to enter the cyber security market?

    Summary of a recent debate at VSEC 18 discussing the MSSP market ...Read more

    24/09/2018

  • Device Identity Management

    Device identity management critical for secure digital transformation ...Read more

    24/09/2018

  • Securing the Security Operations Centre

    Blog exploring why the Security Operations Centre (SOC) itself must be protected adequately ...Read more

    24/09/2018