Case Studies

Nexor have a range of case studies covering our extensive history in product and service delivery. 

Case Studies

To help you understand the different options for exchanging information securely across domains or networks here is a selection of the trusted solutions we have delivered for our clients.

Due to the sensitive nature of these projects we are not able to disclose the details of the organisations in question within the public domain. If you want to find out more about any of these case studies, please get in touch directly, and we may be able to provide further details.

Case Study

A European Organisation

Researching Secure Boot in Linux

When your trusted experts don’t have the answer, you need someone with the understanding to do the research and the expertise to develop and demonstrate the solution.

Read more
Case Study

A UK Government Agency

Network Monitoring

Monitoring activity in a network is critical to maintain the availability of systems and reduce the likelihood of an attack affecting business operations. Where an organisation has multiple networks, monitoring becomes more difficult and less manageable.

Read more
Case Study

A UK Government Agency

Making Your Data Tamper-Proof

Sometimes keeping information safe means more than making sure you find it when you need it. You also need to be sure no-one has access to it – no tampering – especially if you may need it as evidence in the future.

Read more
Case Study

The Defence Science and Technology Laboratory (DSTL)

Making Communications & Information Systems (CIS) More Flexible & Responsive

The UK security operating environment is becoming increasingly complex with multiple, rapidly-forming coalitions of organisations with differing security classifications. Within this arena, there will always be the need for critical data sharing between key players in real time, with high assurance information transfer between security domains.

Read more
Case Study

A Military Organisation

Keeping Sensitive Military Information Safe

In a military force, the management of information and the security of data transfer are both of paramount importance. Networks have to be kept updated and safe from external threat. A variety of information has to pass between internal networks of differing security classifications.

Read more
Case Study

A UK Government Agency

Importing Patches to a Secure Network

Often you need to transfer patches or system updates from one network to another that have different levels of security. In order to maintain the confidentiality of the downstream server you need to be able to control the flow of data in a secure manner.

Read more
Case Study

A European Navy

Guarding Military Messages

No matter how good your policies and protocols are, human error can mean a message is accidentally sent somewhere (and seen by someone) inappropriate. When you need to ensure your policies are followed, you need an email guard.

Read more
Case Study

A Nexor Case Study

Developing an Email Guard for NATO

NATO needed an email guard that met their specific requirements, with the ability to manage the variations in its members’ systems. Nexor had the expertise to create one: Nexor Sentinel.

Read more