Mandelbrot Portion



The use of encryption is becoming increasingly common as a means to keep information secure. We use standard symmetric and asymmetric algorithms in our cryptographic library software.

Key Management

Using widely available, well-known and standardised algorithms it is relatively easy to implement cryptographic functions in software. An often overlooked part of developing cryptographic systems is that of managing cryptographic keys, both on local devices and in centralised key management systems.

Often used in conjunction with or part of key management systems, authentication protocols enable cryptographic verification of users and end-devices.

Secure Software

A crucial aspect of developing cryptographic systems is the process of secure design and implementation of software.

Cyber Security Awareness

Cyber Security

Make sure your staff are aware of common threats and know how to prevent attacks occurring. Take a look at our cyber security training and learning resources.


The WannaCry ransomware outbreak in May showed how devastating these kinds of attacks can be to services we depend upon. Read our ransomware guide to learn more about this increasingly significant problem for businesses and organisations

Personal Data

Complete our GDPR Survey and find out whether your business complies with the new legislation.