ThreatPoint Expertise

As cyber security experts we are pleased to see how cyber security issues have gained greater importance within most companies.

While this is a great change in the last few years, there is a long way to go. The cyber security landscape is evolving at a pace that demands high skill sets from a variety of backgrounds. Companies find that pace challenging and understandably so.


This is where ThreatPoint can help. With experts in the areas of Identity, security and fraud we can provide assistance at all stages of a cyber security program.
From the smallest to the largest, all companies have to take the challenges of cyber security seriously.

ThreatPoint provide the solutions and experience to protect organisations of all sizes.


Please feel free to investigate our email, device and IP reputation services They can be placed into your existing web sites and services or used in isolation as part of an investigation process.


We also provide mitigation and remediation advice if your services have either suffered from or are suffering continued unsolicited brute force and ddos attacks.

WordPress Secure Hosting

WordPress is one of the most popular CMS platforms is use today powering 34% of all websites. Organisations of all sizes have come to rely on the easy to use interface, large theme and plugin support and general ability to create great looking websites.
One of the issues that comes with this popularity is the target WordPress sites become for continued and persistent attacks from human and non human traffic.
Added to this popularity is the fact that the majority of WordPress site administrators are not security experts and nor should they be. They should be focusing on their sites, which are often the lifeblood of the business.
The ThreatPoint security team provide secure WordPress hosting to take care of all the security aspects of your site, so you can focus on your business. Best practice approaches are taken alongside the wishes of the customer to provide the most secure and performant web site.

https://threatpoint.co.uk/tech-talk/f/secure-hosting-for-wordpress

Security Validation Services

Many cybersecurity solutions are now available as API calls. Integrate best of breed, device, phone, email and document verification services into your apps and web pages.
Contact us for free trial access to API products.

Threat Intelligence

Pinpoint threat at source, react and remove the risk. Real time threat intelligence allows us to detect and react to:- anonymised sources, hacking attempts, ip addresses associated with malicious behaviour, anomalous behaviour and geo patterns that determine risk.

WordPress Risk Assessment and Attack Remediation

As WordPress becomes more and more popular, attacks against sites are growing. We provide secure WordPress hosting services as well as security assessments of WordPress sites. The assessment includes:

  • A report detailing if your site is vulnerable – and why
  • Provide a plan to remediate the issues
  • Recommendations to provide on going security
  • Which security plugins to use and why
  • A recovery plan if your site has been compromised

Risk Based Authentication

Cloud based authentication service to offer dynamic risk and context aware authentication. Computer security, cybersecurity and proactive checks to stop hacking and malicious attempts at source.

Single Sign On

Single Sign On solutions and toolkits to support SAML, WSFed, WSTrust, OIDC and OAUTH2.0. Remove password sprawl, increase security and improve the user experience

Automated Pen Testing

SAAS pen testing capabilities allowing for automation and replaying of pen testing campaigns. Reporting automation included. Red Team, Blue Team. Hacking methodologies to enable you to think like a hacker and protect your organisation.

Orchestration Engine

Centralise point solutions into one Orchestration engine. Offering the ability to plug in existing security service via API integration, while maintaining policy centrally. Define overall risk policies based on service integration. Improve your Cybersecurity posture