Anthony Barrow
What will be the top areas of cyber security focus in 2021?


What will be the top 5 areas for cyber security focus in 2021?
As the curtains close out on 2020 and the promise of new things shines the lights on to 2021 we look back at what enterprises did in the previous year to support the rise of the teleworker, the unfaltering desire to move more and more in to the cloud and the never ending threat from cyber crooks that keep businesses leaders and cyber professionals alike tossing and turning at night.

1. Securing remote and dynamic workforce - identity assurance and XDR
Pre-covid19 and with digitalisation, organisations were already working with geographically distributed teams, and with covid19, many are now looking to keep their workforces remote even beyond the crisis. As workforces become more distributed and remote, and with a widened and complex threat landscape, the traditional approach to security must has to be reimagined.
Protection combined with proactive approach to threat detection and response delivers visibility into data across networks, clouds and endpoints while applying analytics and automation to address today’s increasingly sophisticated threats. Enter eXtended Detection and Response (XDR) and Zero Trust (ZTNA) to support the noticeable acceleration in SaaS-based Identity Access Management (IAM) and Identity Governance and Administration (IGA) seen in 2019-2020.

2- Ransomware protection and cyber hygiene
According to ENISA, an estimated €10.1B were paid in ransoms during April 2019 – April 2020, €3.3B more than 2018. This makes ransomware the second most common and costliest types of extreme cyber events, according to IRIS2020 report. The sophistication of threat capabilities increased in 2020, with many attackers using exploits, credential stealing and multi-stage attacks. Considering the high yield for attackers and organisations struggling with cyber hygiene, we expect an increase in ransomware.
Significant progress has been achieved by organisations such as Europol and over 150 partners with the ‘No more ransom project’ . The portal has added more than 30 tools and can now decrypt 140 different types of ransomware infections. The Lockheed Martin Cyber Kill Chain framework can be used to map each step with the controls that organisations can implement.

3- Cloud Posture - CSPM, CWP (host, container, serverless), and microsegmentation
A successful move to the cloud is much more than just moving data. It’s an opportunity to transform the way organisations work, how they interact with data, how they interact with each other, and how they enable their teams to work with the best possible tools. Welcome to the world of “workload-based architecture” and hybrid multi cloud environment.
Unfortunately, nearly all successful attacks on cloud services are the result of customer misconfiguration, mismanagement and mistakes. Security leaders would increase investment in cloud security posture management (CSPM) processes and tools as well as monitoring and protecting cloud workloads (Cloud Workload Protection – CWP) to proactively identify and remediate these risks.

4- Visibility and monitoring – adopt the triad model but bring in DevOps and AppSec
The Security Operations Centre (SOC) Visibility Triad is a network-centric approach to threat detection and response, as described by Gartner in 2015 and 2019. The SOC Visibility Triad model leverages data from three core pillars:
- Logs/user and entity behaviour through SIEM complemented by UEBA and SOAR
- Network traffic through network detection and response (NDR)
- Endpoint detection and response (EDR).
Although this is still valid in 2020, modern security operations will continue to demand integration of applications and modern development practices such as DevOps, from the first line of written code through production. Aligning the contrast platform to the modern enterprise security architecture with the SOC provides deeper visibility and enhances the security posture of the digital landscape while benefiting from efficiently secure software at DevOps speed and providing intelligent, real-time, and actionable responses to block and mitigate application threats.
Security must shift left. Security leaders will need to completely reimagine how SOCs are built and managed — sentient enough — to keep pace with digitalisation with new level of rigour, adaptive and agile processes, and collaboration across the organisation.

5- Data access governance (DAG)
As more and more organisations are making their journey to the cloud, they are faced with regulatory challenges and what to do with an increasing amount of sensitive data in unstructured formats, often found in storage solutions that are far less secure such as file shares, collaboration portals (such as SharePoint), cloud storage systems (such as OneDrive or Box), or emails.
Although Cloud Native DLP and CASB DLP both act on data at rest, organisations are confronted with running multiple disjointed governance solutions exposing themselves to security risks which often stem from duplicated and inconsistent policies, access requests and certification in this new world of work-from-anywhere, IoT, Cloud and GDPR.
DAG is becoming of more interest as a solution that works on the same basis as DLP, but instead of quarantining, encrypting or deleting data, provides large amounts of information about the data structures, access and use – as well as sensitivity and therefore some idea of risk, especially Data Security Governance.
Special mention: Iot and IoMT for manufacturing and healthcare
A June 2020 research by HelpnetSecurity of anonymised data from more than five million unmanaged IoT and IoMT deployments across a variety of verticals including healthcare, life sciences, retail and manufacturing, found a staggering number of vulnerabilities and risks concerning connected devices.
There are real risks and threats posed by IoT, IoMT, and other connected devices if not accounted for and properly managed. As many analysts predict, there is no sign of the slowing of adoption of IoT devices, thus security needs to be prioritised.
Organisations need to refocus on this growing attack surface of unmanaged and IoT devices with a better uptake on solutions to discover every managed, unmanaged, and IoT device on and off of their network, analyse device behaviour to identify risks or attacks, and protect critical business information and systems.
Iris Networks Cloud & Security offers four distinct Managed Security Services to support our customers:
- One-off Cloud Security Posture Assessment Service
This one-off cloud security assessment helps organisations to reduce their risk, and improves the visibility of their data life cycle in an era where cyber threats are complex and multi-faceted.
In this model, we provide a one-time assessment service our SaaS environment or for highly regulated customers, we also set up an on-demand offering.
Carrying out a cloud security assessment is a practical and strategic exercise to improve your cloud security health. A cloud security assessment helps you reduce your risk, and improves the visibility of the data life cycle in an era where cyber threats are complex and multi-faceted.
- Managed Cloud Monitoring
This service provides organisations with continuous security monitoring, compliance adherence and custom policy building effectiveness, across multiple major cloud platforms.
As businesses everywhere move onto the cloud, they face new security challenges. There are thousands of configurations in the cloud and the numbers increase exponentially as you start leveraging more and more services from Cloud Service Providers and more so, when you have a multi cloud posture. It then becomes humanly impossible to keep up with and understand the nuances of the configurations involved in some of the key components in the cloud, mainly centred around Compute, Networks, Identity and Storage.
Using our industry-leading cloud-native platform, our Mission Control team enable you to have assurance that continuous monitoring, compliance adherence and custom policy building are effective as well as detecting cloud vulnerabilities and attacks as they occur, across multiple major cloud platforms. Our team work directly with you as an extension of your team, bringing their cloud security expertise to bear to guide implementation, risk surface identification, and ongoing cloud monitoring, enhancing your cloud strategy security posture.
- Managed SIEM
This service goes beyond Managed Security Services, and is tailored for organisations not comfortable off-loading their data to a provider, while maintaining full transparency working with our Mission Control.
It covers a blended group of security operations specialists, running, managing, and perfecting your tools, while you retain total ownership.
This service enables your security analysts to prioritise alerts, and respond to the most suspicious threat behaviour faster, and ensuring that threats don’t go unnoticed and linger in your environment.
- Managed Detection & Response (MDR)
MDR is for organisations struggling with detecting and responding to modern cyber threats efficiently across all environments: IT, OT, and cloud. MDR a cost-effective alternative to building an in-house SOC, delivers real-time monitoring, detection, and response using a holistic, turnkey approach.
We provide 24×7 coverage, extensive security expertise, and a well-staffed security team ensuring that threats don’t go unnoticed. We eliminate alert fatigue and false positives to promote a faster response with detection, and response capabilities that are tailored to your specific needs. Our Mission Control team work directly with you as an extension of your team to perform threat hunting, incident response, and guided remediation, while also providing strategic recommendations tailored to the unique needs of your environment.
For more information, or to book a no obligation solution overview, contact the team on
Tel: 01925 357 770
Email: sales@irisnetworks.co.uk

What are successful organisations doing to beat today’s sophisticated cyber threats?


What are successful organisations doing to beat today’s sophisticated cyber threats?
Security Information Event Management (SIEM) has been the centre of the security operations centre for over a decade now. SIEMs are intended to log as much data as possible in order to assist with incident detection, response, and investigation. One challenge is that it can be prohibitive, either from a cost or storage perspective, to log everything. This is particularly true for the logs on all of the endpoints in an environment.
Modern IT and OT networks push massive amounts of data throughout the ecosystems per day, generating thousands of alerts and not enough security operations analysts to address these. Valuable time is wasted searching for the missing context needed to determine what’s a real threat and its priority, and too much time lost due to overwhelming numbers of false positives. Unfortunately, this has been the golden goose for countless number of MSSPs. With attackers aware of these limitations of SIEM tools (both technology and economics), the best way to evade a SIEM security is to use tactics that are unlikely to be logged at all. SIEM solutions do a fantastic job of aggregating logs, but need more context for them to make sense of the data
Over the last five years, the industry began shifting from log aggregation and rule-based event monitoring to security analytics, and user and entity behaviour analytics (UEBA). Unfortunately, attackers are growing confident and focus more and more on avoiding detection by well-known security analytics use cases such as in the recent Solorigate supply chain attack, where they took steps to avoid being detected based on IP geolocation anomalies, or by detecting Command & Control traffic based on typical beaconing behaviour. In short, experienced attackers are paying attention to what the best blue teams (e.g., FireEye) are doing out there and tweaking their methods to avoid detection.
SIEM tools are good but remain low on the detection maturity scale. Security Analytics methods are a powerful, and sometimes the only way to detect advanced attacks. Organisations adopting SIEM and security analytics-based use cases across the many tactics of the Mitre ATT&CK framework have a higher chance; however, monitoring remains an arduous task. Enter threat hunting, a proactive technique that combines security tools, analytics, and threat intelligence with human analysis and instinct as well as the quality of the data, not the quantity.
SIEM, Security Analytics, UEBA, security use-cases as well as Security Threat Hunting are capabilities that have provided a new map to direct and address execution and critical resourcing issues that have troubled the industry. To complement these, security automation technology such as Security Orchestration, Automation, and Response (SOAR) driven by artificial intelligence offers streamlined security operations in three key areas: threat and vulnerability management, incident response, and security operations automation.
The rapid rise of cyber threats is outpacing many organisation’s ability to combat these. At Iris Networks, we believe that a winning approach requires rapid detection that provides greater contextual relevance to the business and built on a dynamic understanding of an ever-changing threat landscape. This means a different AI-driven capability combining SIEM, Security Analytics, UBA, security use-cases as well as threat hunting and security automation to provide a new map to direct and address execution and resourcing issues that have troubled the industry.
Iris Networks Cloud & Security offers four distinct Managed Security Services to support our customers:
- One-off Cloud Security Posture Assessment Service
This one-off cloud security assessment helps organisations to reduce their risk, and improves the visibility of their data life cycle in an era where cyber threats are complex and multi-faceted.
In this model, we provide a one-time assessment service our SaaS environment or for highly regulated customers, we also set up an on-demand offering.
Carrying out a cloud security assessment is a practical and strategic exercise to improve your cloud security health. A cloud security assessment helps you reduce your risk, and improves the visibility of the data life cycle in an era where cyber threats are complex and multi-faceted.
- Managed Cloud Monitoring
This service provides organisations with continuous security monitoring, compliance adherence and custom policy building effectiveness, across multiple major cloud platforms.
As businesses everywhere move onto the cloud, they face new security challenges. There are thousands of configurations in the cloud and the numbers increase exponentially as you start leveraging more and more services from Cloud Service Providers and more so, when you have a multi cloud posture. It then becomes humanly impossible to keep up with and understand the nuances of the configurations involved in some of the key components in the cloud, mainly centred around Compute, Networks, Identity and Storage.
Using our industry-leading cloud-native platform, our Mission Control team enable you to have assurance that continuous monitoring, compliance adherence and custom policy building are effective as well as detecting cloud vulnerabilities and attacks as they occur, across multiple major cloud platforms. Our team work directly with you as an extension of your team, bringing their cloud security expertise to bear to guide implementation, risk surface identification, and ongoing cloud monitoring, enhancing your cloud strategy security posture.
- Managed SIEM
This service goes beyond Managed Security Services, and is tailored for organisations not comfortable off-loading their data to a provider, while maintaining full transparency working with our Mission Control.
It covers a blended group of security operations specialists, running, managing, and perfecting your tools, while you retain total ownership.
This service enables your security analysts to prioritise alerts, and respond to the most suspicious threat behaviour faster, and ensuring that threats don’t go unnoticed and linger in your environment.
- Managed Detection & Response (MDR)
MDR is for organisations struggling with detecting and responding to modern cyber threats efficiently across all environments: IT, OT, and cloud. MDR a cost-effective alternative to building an in-house SOC, delivers real-time monitoring, detection, and response using a holistic, turnkey approach.
We provide 24×7 coverage, extensive security expertise, and a well-staffed security team ensuring that threats don’t go unnoticed. We eliminate alert fatigue and false positives to promote a faster response with detection, and response capabilities that are tailored to your specific needs. Our Mission Control team work directly with you as an extension of your team to perform threat hunting, incident response, and guided remediation, while also providing strategic recommendations tailored to the unique needs of your environment.
For more information, or to book a no obligation solution overview, contact the team on
Tel: 01925 357 770
Email: sales@irisnetworks.co.uk

Security Awareness is Dead

If we’re honest with ourselves, we’ve all known it for a long time. Posters. Compulsory e-learning. Seminars and desk-drops. They’re security awareness staples. And they’re now all, without question, ineffective. They’re designed to teach people about security. Just on our terms.
People have overdue deadlines. Expectant bosses. Kids to feed. So we run our campaigns. And people smile and nod. Meanwhile, cyber criminals laugh and joke. For a long time, we’ve needed an overhaul.
It’s arrived.
Times have changed
Borderless security awareness is a radical change of thinking for a radically different world.
Consider COVID-19 for a second.
First, COVID-19 changed our tech. It changed the way we live, learn, shop and work. And by the way, the changes are permanent.
Now, old security awareness campaigns are absurd.
How many people are putting up their own security awareness posters at home?
How many people have security desk drops on their kitchen tables?
Good luck holding people’s attention in a virtual seminar. Or getting people on board by attacking them in their own home.
Compulsory e-learning?
Maybe. With seven other tabs open and the TV on in the background.
Enter borderless security awareness
Borderless security awareness is the only reasonable reaction to the permanently altered world.
It’s not just about securing remote people.
COVID-19 torched some time-honoured borders.
The physical separation between homes and offices. The assumed protection of in-situ office networks. The hope-filled comfort blanket of extensive security policies.
The border between personal and professional lives. And the border curtailing our expectations.
All are gone. And we need to adapt.
Borderless security awareness is our next move.
Borderless security awareness is about ditching a delusional blueprint.
It’s about downgrading enforced e-learning.
It’s about stepping beyond fake phishing.
Borderless security awareness is about supporting and assisting people at the right time and wherever they are.
It’s security awareness. For a world without borders.
The principles of borderless
At the heart of borderless thinking are six core principles:
- Engage with people at the right time and in the right place. We must help people when they need help – not on our own arbitrary schedule.
- Treat people like adults. We must build security into people’s lives in a people-centric way.
- Go beyond training and education. Training and education alone do not work. People need support and assistance too.
- Focus on security behaviours. What people do matters more than what people know.
- Focus on resilience rather than absolute security. Security isn’t binary. We must watch and adjust our resilience as desired.
- Measure. Use data and metrics to determine impact. Only then can you manage and reduce your cyber risk.
Borderless security awareness is an approach. It’s a mindset.
It guides how you view and address human cyber risk as it relates to security awareness, behaviour and culture.
Borderless security awareness examples
CybSafe’s Assist helps people on-demand, no matter where they are.
Let’s say they click a suspicious link.
Assist guides them. It tells them what to do next. It’s welcome advice that suffocates resulting cyber risk.
CybSafe’s Protect is another example.
With Protect, people get interactive “checklists” that help them build their security armour. Think fitness apps, or digital games.
People set security goals. – like securing their smartphone. Or security professionals set it for them. People work towards the goal in their own time, building their resilience as they go.
The above have almost nothing to do with the existing security awareness blueprint.
No posters; no desk-drops; no tick-box e-learning.
And they work. We have the data and metrics to prove it.
Changing security roles
COVID-19 has changed the world. In doing so, it’s changed the security awareness blueprint.
It’s also changed the role of security professionals.
We’re still here to manage cyber risk. But how that’s done has changed.
We need a new approach to security awareness. The new approach needs to be tailor-made for today’s world. And that means it needs to be borderless.
Traditional security awareness is dead.
Long live borderless security awareness.
Take a look for yourself how you can make a huge difference to your Cyber Security posture by empowering your workforce : CLICK HERE
Credit @cybsafe
Which is the right NetAlly tool for me?
Which NetAlly Tool is Right for Me?

Often, as specialist providers of network monitoring and test equipment and working with leading manufacturers in this space including NetAlly we often get asked the question “What is the right tool for me?” or “what would be the best tool for my engineers?”
Within NetAlly’s portfolio is a complete range of solutions, designed specifically to help everybody from a field technician or network technician through to 3rd line engineer whether they are looking in to designing, installing, maintaining, troubleshooting or capacity planning for both wired and 802.11 wireless networks. Often, tool selection can simply come down to budget – however getting to grips with understanding exactly what you need to achieve with the product will pay dividends back during its lifetime and will ensure that you have the right tool for the right job whilst achieving the best return on investment and keeping the financial controllers happy.
The purpose of this document is to provide a brief summary into the purpose of some of the most popular tools which we provide here at Iris Networks, the types of customers who have typically purchased them and some examples of how they have been used. Whilst we understand that as networks become more and more borderless, we have decided to keep the wireless software (AirMagnet) range separate and will detail those products as a separate consideration.
Network Installer/Implementation
Although the name is very specific, we have used this title to describe an engineer who might be responsible for installing network devices, new switches, desktops, phones or access points. Whilst there may be an element of onsite troubleshooting. For this particular role, there is a need to be able to understand connectivity, where you are plugging in to, is it on the right switch port, is the remote switch configuration correct, is it advertising the correct speed, what VLAN is configured, are my PoE levels correct for the purpose. Another consideration might also be documentation required to sign off a job upon completion so the ability to save docs and report centrally.
If you are looking for a handy tool that can give you answers to all of the above then the LinkRunner AT is a great choice.

The NetAlly LinkRunner AT
The NetAlly LinkRunner AT comes in 2 flavours, the 1000 which is 1Gb copper RJ45 and the 2000 which is copper RJ45 and fibre SFP. The 2000 model also has TruPower PoE which inserts a resistance to solicit for PoE, and has the ability to save more reports. The LinkRunner AT enables technicians to be able to plug in to a port and understand what configuration is coming out of the port. So, which switch am I connected to and on which port, which VLAN, what PoE, is DHCP configured so that I can obtain an IP address and can I communicate out to the internet.
Core Capabilities : Cable Length , wiremap, Location, PoE
Using the NetAlly LinkRunner AT you can make light work of a potentially messy job with the ability to quickly and efficiently locating cable runs with toning (digital and analogue IntelliTone modes), switch port advertisement/light blinking and remote cable identifiers. I cast my mind back to a job a number of years ago when a client moved in to a serviced office where over time the port labels on the patch panel had faded away. Using the LinkRunner G2 with the wiremap identifiers which come in the kit enables me to plug the LinkRunner in to one end and the wiremap in to the other until I found the ports I needed to re-label.
From there, we configured VoIP VLAN on the switch and once patched in and PoE was enabled for those ports, we were able to check and verify everything was correct for the phone rollout to be seamless.
On the LinkRunner AT there is an inbuilt patch cable test using the onboard wiremap port which checks pin-to-pin connection, or installed wiring for length, shorts or open or split pairs.
Alternatively, you can do this using the wiremap adaptors which are conveniently numbered for identification.


Going up a level, the LinkRunner AT enables you to see the switch model, slot and port by using LLDP, CDP and EDP to give nearest switch information including:
Switch name and model
– IP address
– Chassis, slot, and port
– VLAN IDs
– Duplex and speed (actual and advertised)
– Signal Strength
– Connection (MDI or MDI/X)
– PoE voltage and power (actual and test limit)
– Graphical representation of power on pairs
– 1 Gig link on copper with PoE on port 30
– 1 Gig link on fiber on port 6

An important thing to consider is that there is no option to test wireless on the NetAlly LinkRunner AT.
You can purchase the LinkRunner AT via our eShop here:
NetAlly LinkRunner G2 Smart Tester
If you find yourself needing all of these features, and often finding yourself having to connect in to systems or applications to make network configuration changes, or are installing IoT devices or facilities requiring 802.3bt 90W then the NetAlly LinkRunner G2 may be a smart option given the flexibility afforded to it by being the first field tester able to validate loaded PoE 802.3bt 90W across all 4 pairs. Its also operating an Android OS which makes it very versatile by enabling you to load your own apps on top, such as ticketing apps, technical setup files, collaboration apps, iPerf, WLAN controller Apps and much, much more.


The LinkRunner G2 has similar inbuilt cable testing and link testing as the LinkRunner AT models, however with the addition on the enhanced testing for 90W 802.3bt across all four pairs, and with the flexibility of the inbuild Android OS it makes for a very versatile and capable tester, ideal for engineers for example who are having to check connections to building management systems, and IoT devices that are using PoE to power them. Whilst you can run an Edimax USB wifi adaptor, and download apps to look at wireless connectivity – its important to note that this should not be treated as a specific wireless tester, in those requirements we would highly recommend the NetAlly AirCheck
A good visual representation of how the Android OS gives a high degree of flexibility and customisation is represented in the image below, which highlights how installing your own applications on to the device extends its capabilities much further than cable testing.

You can purchase the NetAlly LinkRunner G2 via our eShop here:
Network Technician, Wireless Network Engineer, Wireless Network Installer etc
NetAlly AirCheck G2 Wireless Tester

The NetAlly AirCheck G2 has become the go to tester for wireless professionals all over the world, who are looking to install, maintain, troubleshoot and secure wireless 802.11 a/b/g/n/ac/ax networks.
If you are responsible for deploying Access Points and connecting them to the network, and then responsible for making sure that the wireless network is performing at its best then this could be the tool for you.
What makes this tool so popular, is a combination of its portability, speed, breadth of visibility, and ease of use. The AirCheck G2 even has a wired port on the side so that you can test the backhaul connectivity to the switch to ensure the correct configs are in place at a switch port level and that the right PoE levels are reaching the AP to power it.
From there, the AirCheck G2 gives clear information relating to the statistics of the network itself and the air quality – including Networks, Channels, AP’s, clients and interferers which are present including devices such as microwave, cameras, jammers etc. The AirCheck G2 is also compatible with the iPerf Test Accessory enabling you to test the performance of traffic traversing the wireless (and wired) networks using the industry standard iPerf. You might also want to take a read of our other blog post specific to Using AirCheck G2 to maintain great Wi-Fi here (https://irisnetworks.co.uk/2018/12/10/using-aircheck-g2-to-maintain-great-wi-fi/)


Should you be in a role where you need all of the features of a portable tool that can help with not only what is mentioned above in the aforementioned platforms, but with the ability to go deeper in to the network, discover network devices and categorise them, to be able to capture network packets at and connect at speeds of up to 10G then you should be considering the NetAlly Etherscope nXG
Network Engineer, L3 Network Engineer, Senior Engineer, Network Manager etc
Etherscope nXG ; Portable Network Expert

The Etherscope nXG is designed to be a fully featured, all-in-one hand-held portable network tester that enables 2nd and 3rd line technicians the ability to do more, quicker with fewer tools. The Etherscope nXG uses custom built hardware and onboard testing. This combined with its Android OS it’s one of the most flexible, fully featured products on the market.
We often ask our customers “if you were despatched to a site to fix generic IT issues and could only take one tool, what would it be?” This would be that tool. Everything from deploying devices, testing the performance of networked devices and network paths, understanding the path devices are taking to communicate with each other, testing QoS, testing 10G, capturing packets at up to 10G , checking documentation and trouble tickets, making configuration to networked devices, troubleshooting wireless and trending wireless performance over time to help with troublesome intermittent issues. It’s all possible with the Etherscope nXG
Stats at a glance:
Native 4×4 Wi-Fi (802.11 a/b/g/n/ac wave 2)
10/100/1000 Mbps to 2.5/5/10G
90W PoE loaded verification
Problem detection includes duplicate IP, congested switch ports, oversubscribed Wi-Fi channels/SSID’s, security issues such as unknown switches and Aps with open auth and unencrypted.
Path Analysis to show switch/router path to connected devices
4 stream load testing of IP traffic via Ethernet port at line rate 10G testing for packet loss, jitter, delay.
Execute multiple AutoTest profiles to shorten test times verifying multiple VLANs and Wi-Fi SSID’s.
Packet capture on wired and wireless to PCAP file.
You can purchase the NetAlly Etherscope nXG on our eShop here:
Collaboration & Documentation.
An extra plus point is that ALL of the above tools integrate with Link-Live which is a complimentary cloud service. The Link-Live cloud service enables collaboration and centralised report keeping across all tools. Link-Live is excellent for asset management, so you can see device serial numbers, where they are connected to etc and also enables users to attach photos or comments to reports quickly and easily.

Should you wish to learn more about these products, or to arrange demo’s or trials please contact us.