We’re very excited to announce that Enclave has been selected to join the NCSC for Startups programme.
We’ll be working with NCSC, Plexal and industry partners across the UK to develop solutions to the UK’s biggest cybersecurity challenges.
NCSC for Startups is the successor to the NCSC Cyber Accelerator. It’s a government programme bringing together innovative startups with NCSC technical expertise.
Enclave CEO, David Notley explained, “We are proud to be recognised as cyber innovators. As a leader in Zero Trust Overlay Networks, Enclave will be working in partnership with Deloitte, CyNam, Hub8, and QA to solve some of the UK’s most important cyber challenges.
“We are looking forward to shaping technical solutions and working in collaboration with some of the brightest minds in our industry.”
Marc Barry, CTO of Enclave said, “We’re thrilled that NCSC and their partners have selected Enclave to be part of the programme and look forward to drawing on their world-class expertise to further develop and refine our cutting-edge technology.
“We’re all proud and humbled to be partnering with such a distinguished organisation working hard to ensure the UK is the safest place to live and do business online.”
Please sign up to our newsletter to keep in touch, build your Enclave and be part of the journey.
Enclave Networks are one of just five companies globally working on Zero Trust Overlay Networks which create secure private networks which are invisible to the public internet, and are be layered on top of existing network infrastructure meaning less time consuming and error prone network administration.
Right now, there are millions of private systems openly discoverable on the public internet for anyone, anywhere to access and potentially breach. Enclave cloaks private systems so they are invisible. It’s secure by default. Unless trust standards have been validated, they effectively don’t exist in the public domain, making them much harder to find, target and ultimately attack.
Enclave effortlessly creates Zero Trust Overlay Networks to ensure private connectivity can be established instantly and managed according to automated policy requirements. We remove the need to make changes to the underlying, core network. Firewall rules are no longer needed for remote access. Open ports can be closed and ACLs can be removed. There are no VPN servers and no need to configure IP addresses, routers, subnets, switches, NAT and secret keys. The network becomes effortlessly scalable and a secure enabler of organisation imperatives.