Skip to main content

SES Blog

13 November, 2018

How Do You Ensure Your Business Continuity In 2019?

In this day and age, the continuity of your business is consistently at risk from factors outside of your control.
06 November, 2018

Independent Testing Makes Your Applications More Secure

From marketing automation to finance or internal communications, organisations are using internal web applications every day that are critical to their business’s operation.
22 October, 2018

“I Wouldn’t Know How To Use The Code If It Was Released”

The majority of organisations are heavily reliant on 3rd party software owners to develop and maintain their business critical applications and business process tools.
16 October, 2018

Start With The Basics: The SES Guide To Good Cyber Hygiene

Cyber Hygiene relates to the practices and precautions organisations need to take in order to protect their devices and infrastructure, maintain system health and improve their online security.
05 October, 2018

Simplify SaaS Escrow With SFTP Depositing

Using applications delivered through a Software as a Service (SaaS) model is becoming an increasingly popular way to deliver critical applications. SaaS Applications reduce the need for users to invest in and support their own infrastructure.
25 September, 2018

Protect Your Critical Applications With Software Escrow

All businesses use at least one critical application in their organisation which is essential to their daily operation, examples include: CRM, financial software, stock control and logistics software and your company’s website.
19 September, 2018

The Importance Of A Multi Layered Security Approach

Following on from last week’s mailer where we discussed the various phishing attacks which exist and how your organisation can defend against them, this article discusses the advantages of a multi layered approach to secure your organisation against phishing threats.
11 September, 2018

Do You Know Your Smishing From Your Whaling? A Guide To Phishing Attacks

Phishing is a type of social engineering attack used to steal individual’s sensitive data such as login credentials and credit card data. Attackers masquerade as trusted entities and dupe their victims into opening malicious links which can lead to the target revealing sensitive information or malware being installed on their devices.
30 August, 2018

SES Expands Our Team With Two New Apprentices

As SES grows, choosing to recruit apprentices for various roles within the business provides us with the opportunity to identify the best potential talent and provide them with the skills, knowledge and experience to fit the skills gaps in our organisation.
30 August, 2018

Transfer Of IP: The Clause That Everyone Overlooks

It is widely known that Software Escrow protects you against the trigger events such as supplier failure and enables you to retain access to your application and continue to use it until a time when a suitable replacement can be procured.
30 August, 2018

Are Your Clients Aware Of The Protection Available To Them?

The Master Multi Licensee Agreement SES have created is designed to allow you to offer Software Escrow protection to all of your clients, regardless of the application or version that they are using and without having to pay additional setup fees.
14 August, 2018

Mergers and Acquisitions: How Do You Protect Your Investment? Part 2

Following on from last week’s article where we discussed the topic of Mergers and Acquisitions (M&As), retaining IP, key developer knowledge and how Software Escrow can help with the M&A process, we began thinking about the Cyber Security risks involved with these transactions.

Contact us

If you would like further information, discuss your requirements, get a free no obligation quotation or just a friendly chat on how we could possibly help please fill in the details below and one of our team will get back to you as soon as possible.
Tick the box to receive regular updates and industry insights