Transform your cyber security capability.

Start your journey today.

Hi, we're Asontu!

A cyber security consultancy firm looking to do things differently. 

We are a small firm that started with an ambition to support organisations in building their own security capabilities, rather than perpetually relying on external services. 

We are here to be your partners in transformation by helping you understand the evolving cyber threat landscape and develop the best processes and tools to face it.

Strategy and Advisory

Assess your current capability against the industry and receive advice on governance, risk and compliance, cyber threats, and regulatory updates.

Supplier Risk Management

A simplified approach to assist businesses in managing their supplier security risk.

Security Technologies

Support in operating, maintaining, and uplifting new technology platforms to suit your business and security requirements.

Security Assurance

Ensure that your security designs go through a detailed security review process to identify potential risks and vulnerabilities.

Ransomware Readiness Pack

A descriptive paragraph that tells clients how good you are and proves that you are the best choice that they’ve made.

Our Services

Strategy and Advisory

On-demand access to our experienced cyber security advice.

All organisations face the security challenges that arise due to constantly evolving threats, new projects, changing regulations, and endless business requirements.

Asontu is here to support you through these challenges and ease the workload involved with keeping your organisation secure. Drawing on our years of experience dealing with various clients, projects, industries and problems, we can provide the best advice to work for your business, strategy, and objectives.

We can provide cyber security advice across diverse issues and activities at a time and method that suits you.

Strategy Guidance
Governance, Risk, & Compliance Review
Supplier Selection
Cyber Threat Updates
Regulatory Recommendations
Two people sitting side-by-side at a desk working on their computers.
Professionals gathered around a table having na meeting. One person is holding a calendar to present information to the rest of the team.
Your suppliers may be your largest cyber threat!

51% of organisations have suffered a data breach as a result of a third party.

Supplier Risk Management

Asontu’s comprehensive approach to managing supplier security risk provides a robust model of protection against threats introduced by your suppliers.

We have a deep understanding of supplier risk processes and have designed, managed, and delivered enterprise-scale supplier assessment processes at multinational

We can provide enablers such as frameworks, processes, questionnaires, and templates to rapidly identify and assess your supplier risk landscape. Our services can be leveraged on-demand or as an end-to-end managed service – providing
flexibility as your requirements change.

Supplier Security Risk Management Framework
Supplier Security Assessment
Supplier Monitoring

Security Technologies

Use of new security technology platforms creates overhead that makes it difficult to extract value from your investment. Our experience across various platforms and technologies can help you to build effective security controls. We can support you in operating, maintaining, and uplifting these platforms to suit your business and security requirements.

Security Solution Implementation
Vendor Comparison
Next Generation Security Technology
Image showing one hand on a laptop while the other holds a smartphone.
Image of a futuristic looking server room in a data center

Security Assurance

As you design and implement new technology platforms within your business, you must identify potential risks that they may introduce. Our security assurance capability will ensure that your solution goes through a detailed security review process to identify security issues and vulnerabilities, and support you in remediating them before you go-live.

Solution Security Design & Architecture Review
Penetration Testing
Vulnerability Assessments

Who We Are

We’re dedicated to supporting you throughout all stages of your cyber security journey.

Photo of Jason Akkari

Jason Akkari

Passionate about developing transformative cyber solutions using a risk-based approach.

Photo of Lochie Chok

Lochie Chok

Passionate about simplifying complex cyber problems to drive intuitive outcomes.

Get in Touch

We’d love to help you transform your cyber capabilities.
Please reach out to us below and we’ll get back to you as soon as we can.

Leave a message

Give us a call