OUR GOAL
globally, small businesses account for the majority of employment & GDP yet remain the most vulnerable to cyber compromises through a lack of resources. Some geographic regions suffer the same resource limitations. We strive to create cyber security courses for delivery to those who will benefit the most, via our free online learning platform
Our demonstrable knowledge & expertise across multiple cyber domains includes enterprise-grade cyber threat quantification & security appliance covert management patents extending for over 20 years
Company Overview
365 Cyber is the cyber security course platform from UK company, Quantar Solutions Limited; a London-based cyber security, risk management, data privacy and IT audit company. Our initial cyber security activities commenced in 1998, with software developed to identify, assess and quantify cyber threats posed to private networks, as a result of our work with national government agencies, the military, banks, re/insurers, global automotive bands and air traffic control organisations.
Our Patented Technology
365 Cyber utilises the multi-patented cyber risk management and quantification software product suite, CyCalc ®, from Quantar Solutions for its’ teaching programmes.
CyCalc Suite is composes of 3 modules; Network Operational Risk Manager (n-ORM); Predictive Analytics Engine (PAE), and Internet Protocol Threat Assessment Programme (IPTAP).
However, unless there is a customised programme requiring the use of Predictive Analytics Engine (PAE), we only use two of the components. This is because PAE is for risk managers used to complex stochastic modelling of data.
By contrast, Network Operational Risk Manager (n-ORM) was designed for use across all levels of an organisation, from non-technical personnel, to enterprise risk and compliance officers.
IP TAP is a system that acquires actual threat data from inbound network traffic for an individual organisation. This is used within our cyber risk management programme to enable course participants to work in a hands-on manner with the type of actual threats posed to an organization. We use this data in several ways to create experiential learning that cannot be replicated by others, due to our intellectual property protection.