The Partnership Network
Every vendor in our network was selected for a reason. We don't resell software. We curate capabilities.
KnowBe4 powers our security awareness and anti-phishing training through CyberMBA. Their platform is the market leader in simulated phishing - but left to its own devices, it becomes another tool nobody configures properly. We manage the full programme: campaign design, user segmentation, reporting, and escalation. The tool works because we operate it.
ImmuniWeb drives our third-party risk management and attack surface monitoring through CyberClearance. Their AI-powered scanning gives us automated security ratings, dark web intelligence, and vulnerability detection across a client's entire vendor ecosystem. We layer analyst review and managed questionnaires on top — turning raw data into actionable vendor risk programmes.
Secureframe handles compliance automation for clients pursuing ISO 27001, SOC 2, GDPR, and NIS 2 certification. Instead of months of manual evidence collection, Secureframe integrates directly with cloud infrastructure and pulls evidence automatically. We manage the remediation, the gap analysis, and the auditor coordination.
Resilix Cybersecurity extends our managed SOC capabilities — 24/7 monitoring, threat detection, and incident response delivered by a team that already knows our clients' environments because they're embedded in the same operational fabric.
Egida Security Solutions adds specialised penetration testing and offensive security capabilities. When a client needs red-team exercises or targeted vulnerability assessments, eGida's operators work alongside our forward-deployed engineers to scope, execute, and remediate in a single continuous workflow.
BE-terna (Telefónica Tech), Callidus, Anni, and 4 Spaces round out the network with infrastructure services, managed IT, hardware procurement, and workspace solutions - the operational backbone that makes the whole stack function.
N2K CyberWire and ACI Learning feed our training and development pipeline, keeping both our internal teams and our clients' teams current on the threat landscape.
The result is a supply chain of security capabilities that no single vendor could deliver alone - orchestrated by a team that understands how all the pieces fit together.