“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”

IT Operations Manager
Simon Darley
Trusted by industry leaders

Let's Talk

Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.

BriSTOL HQ & The South West

London & Surrounding Areas

Manchester & the North

“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call-back.

First we need a few details.

ENQUIRY - Contact Popup DEPRECIATED (#3)

“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call

First we need a few details.

ENQUIRY - Popup w/ Captcha for light backgrounds (#21)

Expert Intel

Technical Director
Alex Eley

Microsoft Roundup – April 2024

Over the last month, Microsoft has rolled out a series of significant updates that are helping to reshape how businesses use their software and secure their digital environments. As ever, Microsoft continues to launch new products and make changes to existing software - so our Technical Director Alex, has distilled his favourite April updates and this month provides us with a roundup of his top three takeaways...
Read MoreMicrosoft Roundup – April 2024
SOC Lead
Sam B

Gootkit Malware Exploit

At Stripe OLT, our analysts face new challenges every day, and occasionally, we come across something noteworthy - recently at Stripe OLT, our team encountered a Gootkit malware exploit in one of our client's systems. Our SOC lead, Sam B, takes us through the encounter.
Read MoreGootkit Malware Exploit
Penetration Tester
Toby Davenport

The importance of proper filtering within web applications

Many times, during software security testing (penetration tests), whitelisting and blacklisting are encountered, with testers trying to bypass the regex (regular expression). But, what is the actual process of identifying these characters that can bypass filters? How are new payloads formed? If you're looking for some technical, offensive security insights, you've come to the right place...
Read MoreThe importance of proper filtering within web applications

Sign up for the latest news and Podcasts

Keep Up with the experts,
MAIL LIST - Newsletter in Sidebar and In content and In Block (#2)