“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”

IT Operations Manager
Simon Darley
Trusted by industry leaders

Let's Talk

Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.

BriSTOL HQ & The South West

London & Surrounding Areas

Manchester & the North

“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call-back.

First we need a few details.

ENQUIRY - Contact Popup DEPRECIATED (#3)

“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call

First we need a few details.

ENQUIRY - Popup w/ Captcha for light backgrounds (#21)

Expert Intel

Senior Cloud Consultant
Rob Say

What is Modern Endpoint Management?

Effective, unified endpoint management is integral to maintaining security, compliance and productivity within modern organisations. Selecting the right tool to deliver on your aims is critical to any successful adoption and I do believe that Microsoft’s UEM technologies ensure that any organisation, of any size, can get control and keep it. Read my latest guide to delve more into the latest UEM technologies.
Read MoreWhat is Modern Endpoint Management?
Lead Security Automation Engineer
Liam Jones

Data-Driven Defence: Obtaining actionable data from M365 Defender for Endpoint using KQL

Defender for Endpoint contains a whole host of software inventories and vulnerability information for onboarded devices in your environment – which is great in terms of technical capability. However gathering this data quickly isn't always the easiest... Our security engineer Liam provides some handy KQL tips to speed up this process within Defender.
Read MoreData-Driven Defence: Obtaining actionable data from M365 Defender for Endpoint using KQL
Technical Director
Alex Eley

Microsoft Roundup – April 2024

Over the last month, Microsoft has rolled out a series of significant updates that are helping to reshape how businesses use their software and secure their digital environments. As ever, Microsoft continues to launch new products and make changes to existing software - so our Technical Director Alex, has distilled his favourite April updates and this month provides us with a roundup of his top three takeaways...
Read MoreMicrosoft Roundup – April 2024
SOC Lead
Sam B

Gootkit Malware Exploit

At Stripe OLT, our analysts face new challenges every day, and occasionally, we come across something noteworthy - recently at Stripe OLT, our team encountered a Gootkit malware exploit in one of our client's systems. Our SOC lead, Sam B, takes us through the encounter.
Read MoreGootkit Malware Exploit
Penetration Tester
Toby Davenport

The importance of proper filtering within web applications

Many times, during software security testing (penetration tests), whitelisting and blacklisting are encountered, with testers trying to bypass the regex (regular expression). But, what is the actual process of identifying these characters that can bypass filters? How are new payloads formed? If you're looking for some technical, offensive security insights, you've come to the right place...
Read MoreThe importance of proper filtering within web applications

Sign up for the latest news and Podcasts

Keep Up with the experts,
MAIL LIST - Newsletter in Sidebar and In content and In Block (#2)