Partners

At Dev/Null, we base our approach on a combination of people, processes, and technology. We offer flexible solutions to support our customer’s requirements, identifying and working in partnership with some of the world’s leading vendors and the most innovative security tools.
Our solutions combine the advanced engineering, consultative problem solving and skilled management required in both technology-specific areas and broader, more complex security environments. Through our strategic vendor relationships we are able to maximise the value of your cybersecurity investment ensuring we work together to deliver world-class security solutions, expertise and tangible outcomes to you, our customers.

Splunk
Splunk brings the visibility every organisation wishes it had before something went wrong. Its ability to ingest and correlate data from practically anywhere lets us get straight to the events that matter, not drown in the noise. For incident response and ongoing security operations, it gives our clients the confidence that nothing significant is slipping past unnoticed, and that decisions are driven by evidence, not assumption.
Cisco
Cisco’s security stack gives us proper end-to-end coverage without fuss, pulling network, cloud and identity controls into one coherent line of defence. Their firewalls, secure access platform and threat intel backbone make it easier for us to harden a client’s estate in a way that scales, rather than stacking multiple siloed products.
Tenable
Tenable excels at chipping away the unknowns in an organisation’s attack surface. Its continuous vulnerability intelligence lets us pinpoint the issues attackers would go after first - the low hanging fruit, long before a patch-cycle debate slows things down. The platform’s clarity helps our clients stop guessing about risk and instead fix the right things in a risk-based order, which is half the battle in modern security.
Check Point
Check Point gives us dependable, quietly effective protection across network, endpoint and cloud, with threat prevention baked in rather than tacked on. Their architecture allows us to reduce complexity while still enforcing strong, consistent policies across varied environments.
IBM / Red Hat
IBM’s security portfolio, paired with Red Hat’s open, container-first approach, gives us a solid foundation for clients moving toward hybrid or private cloud without compromising control. Their threat detection, automation, and identity platforms help untangle environments that have sprawled over the years. Building on Red Hat’s open technologies, we can design security that feels consistent regardless of where workloads land, rather than bolted on as an afterthought.