SHARE YOUR INFORMATION SECURELY

Balance your information exchange requirements and operational constraints to find the right solution.

FIND OUT MORE

A BEST PRACTICE TECHNICAL ARCHITECTURE

Find out how our Secure Information eXchange Architecture (SIXA) has been used in solutions by defence, government and critical national infrastructure organisations.

FIND OUT MORE

HOW PAC-MAN SHOWS THE IMPORTANCE OF SECURE CODING

Find out how PAC-MAN shows the importance of secure coding in our blog post.

FIND OUT MORE

NIAS 2016

We are delighted to announce that we will be exhibiting and presenting at NATO’s Cyber Security Symposium, NIAS16.

FIND OUT MORE

SECURE INFORMATION EXCHANGE SPECIALISTS

Helping organisations get information in to and out of secure networks

Defence, government and critical national infrastructure organisations around the globe have relied on our secure information exchange solutions for more than twenty-five years.

Crossing trust or security domain boundaries can be a problem for organisations but our solutions can meet your requirements to securely allow users to exchange emails and files; provide control of media streams and devices; or access the Internet and cloud technologies.

The accreditation of the solutions is facilitated by following best practice cyber security guidance from national technical authorities at all stages of the solution’s development.


“A demonstration of Nexor’s commitment to, and strong affiliation with Defence and the Royal Signals in particular.” Spokesperson for Royal Signals, British Army

“We are particularly pleased that the Nexor solution gives us access to information from other networks in near real-time” Spokesperson for FCO Services, UK Government Agency

“We achieved our primary objective of finding a proof of concept architecture that was technologically feasible and simple to implement.” Spokesperson for a European Police Force

%

Large organisations attacked by an unauthorised outsider in the last year
(UK Information Security Breaches Survey 2015)

%

Growth in new mobile malware samples compared to previous year
(McAfee Quarterly Report 2015)

%

Percentage of distributed denial-of-service (DDoS) attacks that use multiple vectors
(ENISA Threat Landscape Report 2015)

%

Average start point for breach costs for large organisations doubles to £1.46m over last year
(UK Information Security Breaches Survey 2015)

Be the first to know about developments in secure information exchange
Share This