Cybersecurity Partners and Technology Innovation

Modern cybersecurity requires not just strategy, but the right tools implemented effectively.
Peritus partners with leading cybersecurity vendors to deliver measurable outcomes across endpoint protection, cloud security, identity, governance, and threat detection.

Ransomware Research & Threat Intelligence

Ransomware remains one of the most disruptive threats facing organisations today. Defending against it effectively requires a deep understanding of how modern attackers operate in real-world campaigns, not just theoretical models or historic patterns.

We help organisations harden Microsoft 365, Azure and identity environments, reducing the misconfigurations and credential weaknesses that attackers frequently exploit.

Our work includes:

  • Microsoft 365 and Azure security posture assessments

  • Identity and access hardening using Entra ID (MFA, Conditional Access, Privileged Access)

  • Microsoft Defender configuration and ongoing tuning

  • Cloud threat detection and monitoring improvements

  • Use of Azure-native security tooling to identify misconfigurations and improve Secure Score

Outcome:
A more resilient Microsoft cloud and identity environment with reduced attack paths and improved visibility.

Microsoft Cloud & Identity Security

Microsoft cloud and identity environments are a primary target for modern attacks. Small configuration gaps in Microsoft 365, Azure or identity controls are often all that’s needed to gain initial access and move laterally.

Agger Labs is a specialist ransomware research organisation focused on analysing real-world attacker behaviour, emerging threat groups, exploit chains and adversary tradecraft.

Peritus works closely with Agger Labs to ensure our ransomware defence strategies are informed by current, real-world threat intelligence, rather than static frameworks or outdated assumptions.

Through this partnership, we are able to:

  • Track emerging ransomware techniques and evolving attacker methods

  • Analyse real attack chains observed in active campaigns

  • Translate research insights into practical detection and prevention controls

  • Design defences aligned to how adversaries actually operate in the wild

Outcome:
Stronger, intelligence-led ransomware resilience built on active research, live threat insights and evidence-based defensive strategy.


Endpoint Security & Threat Prevention

Effective ransomware defence depends on stopping attackers early, across endpoints and network pathways. Peritus works with leading endpoint and network security platforms to deliver a layered threat-prevention capability.

CrowdStrike provides behavioural endpoint protection designed to detect and stop ransomware, malware and advanced threats before they can spread.

Vulnerability & Risk Intelligence

Security Scorecard logo with purple hexagonal icon and black text.

SecurityScorecard provides external risk scoring and attack surface intelligence, supporting governance, third-party assurance and supplier risk programmes.

Our work includes:

  • Continuous identification and validation of vulnerabilities across cloud and on-premise environments

  • Risk-based prioritisation to focus remediation on issues that materially increase exposure

  • External risk scoring to understand internet-facing weaknesses

  • Third-party and supplier risk visibility to support governance and assurance programmes

Outcome:
Clear, prioritised insight into weaknesses that could lead to compromise, with remediation decisions tied to real-world risk and external exposure.

Palo Alto Networks provides advanced network security and Zero Trust controls that limit attacker movement and disrupt ransomware activity across hybrid environments.

Our work includes:

  • Deployment and optimisation of CrowdStrike Falcon for behavioural threat and ransomware detection

  • Policy configuration and tuning to improve detection quality and reduce noise

  • Network threat prevention using Palo Alto Networks Next-Generation Firewalls

  • Segmentation and Zero Trust controls to limit lateral movement

  • Integration across endpoint, network and monitoring platforms to improve visibility

Outcome:
Reduced ransomware risk and improved detection through coordinated endpoint and network threat prevention.

We use Qualys to identify, validate and prioritise vulnerabilities across cloud and on-premise environments, enabling teams to focus remediation efforts where risk is highest rather than chasing raw vulnerability volume.

We provide continuous visibility into vulnerabilities and external risk exposure, helping organisations reduce attack surface before adversaries can exploit it.


Proofpoint provides advanced protection against phishing, business email compromise and malicious payload delivery. Peritus works with Proofpoint to help organisations reduce email-borne risk, improve detection of targeted attacks and protect users most frequently targeted by adversaries.

Hoxhunt focuses on strengthening human resilience through adaptive phishing training and real-world simulations. Peritus uses Hoxhunt to help organisations improve user behaviour, increase reporting rates and reduce the likelihood of successful phishing attacks leading to compromise.

Outcome:
Reduced risk from email and human-driven attack paths through a combination of technical controls and behavioural resilience.

AI Security Governance

As organisations adopt AI tools at speed, new risks emerge around data exposure, compliance, and uncontrolled usage. Effective AI security requires visibility, governance and clear guardrails that allow innovation without increasing organisational risk.

Noma Security provides visibility and control over enterprise AI usage, helping organisations understand where AI tools are being used and how data is flowing through them. Peritus works with Noma to help clients identify shadow AI usage, reduce data leakage risk and implement governance controls aligned to policy and compliance requirements.

Peritus uses Noma to help organisations:

  • Detect unsanctioned AI tool usage

  • Prevent sensitive data exposure

  • Implement AI usage policies

  • Align enterprise AI use to governance frameworks

  • Practical, implementable security, focused on reducing real attack paths rather than producing shelfware reports

Outcome:
Clear visibility and governance over AI usage, enabling organisations to adopt AI securely while managing risk and regulatory obligations.

Email Security & Human Risk Protection

Email remains one of the most common initial access points for cyber attacks, including phishing, credential compromise and ransomware delivery. Effective defence requires both strong technical controls and an understanding of how attackers target people within the organisation.


Vendor-agnostic approach

The technologies highlighted here represent key platforms we regularly work with, but they are not exhaustive. Peritus takes a vendor-agnostic approach and has experience supporting a wide range of security tools and technologies. If your organisation uses a different platform, we’re happy to discuss how we can support and optimise it.

How We Work With These Technologies

Assess

Posture, gaps, misconfigurations and attack paths

Deploy

Implement and configure the right technologies

Why Peritus

  • UK-based cybersecurity consultancy with senior-led delivery, not junior hand-offs

  • Deep Microsoft and CrowdStrike expertise, securing the platforms most organisations actually rely on

  • Strong cloud and identity capabilities across Microsoft 365, Azure and hybrid estates

  • Proven experience securing AI and high-risk environments, including governance and shadow AI control

Optimise

Tune controls for max coverage & minimal noise

Monitor

Ensure continuous visibility & ongoing improvement

  • Consultants with hands-on technical backgrounds who design controls they’ve implemented themselves

  • Vendor-agnostic by design, focused on reducing risk and improving security outcomes, not pushing tools

Book a discovery call