Welcome to Glock Enterprises

We provide consulting services for organisations that want to get the best out of digital transformation, but want to do it their way.

Got an idea for a disruptive new service or want to set up something simpler like a blog, a community, or a shop?  We're the right people to ask.

We're also healthily paranoid about cyber security so you don't have to be. We chant the mantra "Data protection by design and by default", lifted straight from the GDPR (and if you don't know what that is you definitely should talk to us).

If you already have your apps then we can help identify and mitigate the risks that go with being online.

We've teamed up with some of the most innovative information security companies to bring you tools to make your life easier and more secure. Check out our Partners section for more details.

Finally. Were you expecting some fancy website with lots of product stuff? We do that for our clients but we keep things simple wherever possible. So there's not much to see here. What we really want you to do is start a conversation...

What we do

Data Protection HealthCheck

Concerned about the GDPR? Looking for a Data Protection Officer? Want validation that your security controls are robust enough? Our Data Protection HealthCheck service is aimed at organisations that want to embed security into their business, whether validating existing or developing new applications and processes. Typical engagements: Produce a Privacy Impact Assessment (DPIA) to support GDPR requirements; Review and harden a healthcare application; Develop and launch a secure method of capturing memories...

Detect and stop breaches

Breaches are inevitable but you want to know when a breach occurs, and stop access to sensitive data. We implement and manage cyber deception platforms to detect, investigate, and contain attackers.

Protect personal data

When sending documents around or outside your organisation you need to ensure that personal information is protected. Anonymization is the process of either encrypting or removing personally identifiable information from data sets so that the people whom the data describe, remain anonymous. Isolating and protecting your sensitive data is the foundation for proper governance, data security and control.

Threat Modelling

Whether developing new applications or reviewing the risks associated with your IT real estate, your organisation needs a way to identify, predict and define threats across the entire attack surface so you can take appropriate security decisions and minimise overall risk. Even better, you want to draw on the best practise that the industry has to offer. We provide a threat modelling service that automates a lot of the modelling process and adapts as you change and develop your application set.
See all our services

Start a Conversation


Our Partners