Leeds, UK
2015
CEOs across the manufacturing sector remain optimistic about the potential of digital transformation to boost productivity, efficiency, and competitiveness. Yes - manufacturers face a double bind - innovate fast (and potentially feel pain) or risk falling behind; but every step forward expands the attack surface. This sits alongside a stark reality: the manufacturing sector now suffers 26% of all cyberattacks, making it one of the most targeted industries globally. However, the most significant emerging threat is not always the one that leaders expect.
Secure Access Service Edge (SASE) is quickly becoming a top priority for business leaders, particularly those with remote teams, cloud-focused plans, and growing security challenges, as they recognize the benefits of bringing networking and security into a single, flexible, cloud-based solution. In fact, the global SASE market is projected to reach $10.89 billion in 2026, up from $9.27 billion in 2025.
For many years, cybersecurity conversations in the oil and gas sector have centered on familiar themes, including the divide between IT and OT, the limitations of legacy tooling, the growing pressure of regulation, and the long-standing question of how to modernize an industry built on infrastructure measured in decades rather than release cycles. But these discussions are changing, becoming more grounded in operational reality as the industry's appetite for convergence between identity, cloud, and OT grows stronger than at any point in recent memory.
  |  By David Morimanno, Field CTO NA
In October, the UK put a spotlight on cyber resilience with the release of the NCSC's 2025 Annual Review. CEO Richard Horne warned that failing to prepare for cyberattacks risks a company's future. The urgency behind this statement is backed by data: the NCSC handled 204 major cyber incidents between September 2024 and 2025, and 43% of UK businesses reported a breach in the past year.
  |  By David Morimanno, Field CTO NA
In October, the UK put a spotlight on cyber resilience with the release of the NCSC's 2025 Annual Review. CEO Richard Horne warned that failing to prepare for cyberattacks risks a company's future. The urgency behind this statement is backed by data: the NCSC handled 204 major cyber incidents between September 2024 and 2025, and 43% of UK businesses reported a breach in the past year.
  |  By Xalient
New global research from Xalient reveals that SASE investment is vital for enterprise security, but approximately 53% of organizations are still in the early implementation stages. Although 80% of respondents are concerned about cybersecurity threats, breach or fear of breach is the least influential factor in choosing a SASE solution.
  |  By Brian Ramsey, Vice President Americas
Over the past five years, the enterprise technology landscape has undergone a significant shift. Global disruptions, hybrid work models, and an increasingly complex threat environment have driven organizations to invest heavily in digital infrastructure. Some analysts have even dubbed this era "the biggest surge in technology investment in history."
As Forrester expects the cost of cybercrime to reach $12 trillion by the end of 2025, enterprises are gearing up and investing heavily in cybersecurity. Yet, despite rising budgets, security leaders' confidence in detecting and recovering from incidents is declining. A key culprit is security tool sprawl, which quietly erodes visibility, speed, and trust in operations.
Starting January 2026, Provision 29 of the UK Corporate Governance Code will require boards to report annually on the continuous effectiveness of their internal controls, including cybersecurity, or risk a substantial fine. In terms of reporting, Provision 29 marks a shift from "Do we have controls?" to "Can we prove they work?"
  |  By Brian Ramsey, VP Americas - Sales
The digital enterprise is no longer primarily made up of individuals' identities. According to Gartner, over 60% of all identities in a typical organization are non-human. These Non-Human Identities (NHIs) are digital identities assigned to software, services, applications, containers, or devices that require access to systems and data. Unlike human identities, NHIs operate autonomously, at scale, and often with high privilege. This makes them essential for modern automation and uniquely vulnerable to misuse.
  |  By Xalient
In this episode of Xalient Talks, we sit down with Rob Ainscough from Silverfort to talk about the identity discovery challenge, exploring the hidden identities and blind spots that often go unnoticed. We dive into why blind spots remain a problem, how machine identities are reshaping the threat landscape, and why the industry is still playing catch up when it comes to protecting every account. Rob and Jos share insights from the field, lessons learned, and practical steps to move from discovery to protection.
  |  By Xalient
CyberArk & Xalient's top thought leaders provide insights & strategies for tackling the non-human takeover. The rise of non-human identities is reshaping cybersecurity. Join Mike Rohlfs and David (DJ) Morimanno as they share actionable strategies to protect your enterprise. Key Takeaways: Why non-human identities are the next big security challenge Proven strategies for identity threat detection and response Remediation techniques Making your business secure Free tools.
  |  By Xalient
Agentic AI: The Next Evolution in Cybersecurity Welcome to a groundbreaking episode of the Silverfort AI podcast, where we explore the future of cybersecurity powered by Agentic AI. This isn’t just another tech talk — it’s a front-row seat to the next wave of intelligent defence.
  |  By Xalient
In this short webinar clip, presented by David Cox, VP Identity Services at Xalient - Mike Shishman, VP of Alliances and Partners, Sean Harris, MSP Sales at SailPoint, discuss the changes we've seen in role managed services an play in helping organizations build, support, and mature their Identity Security programs. Topics include: How the MSP market has matured (it's not just ticketing) The things you should know (but they don't tell you) How to get the most out of a MSP Client examples (SailPoint MSP and beyond)
  |  By Xalient
In this episode, Dave Cox, VP of Identity Services and Ryan Cluff, Director - IGA Practice at Xalient, explore the critical integration between SailPoint and ITSM tools, with a special focus on ServiceNow. Learn how organizations transition from using ITSM tools for basic identity functions to full-featured Identity Governance (IG) with SailPoint—and why it's essential for scaling, compliance, and automation.
  |  By Xalient
Join Xalient experts Dave Cox, VP of Identity Services, Ryan Cluff, Director - IGA Practice and Kevin Bender, Senior Manager - IGA Practice, as they dive into the challenges of role-based access control (RBAC) and how to effectively use SailPoint’s AI Access Modeling to build, refine, and govern role models at scale. Learn how organizations can avoid stale role definitions and adopt sustainable, data-driven approaches.
  |  By Xalient
In this video, Dave Cox, VP of Identity Services and Ryan Cluff, Director, IGA Practice at Xalient, dive into how organizations are using SailPoint's Non-Employee Resource Management (NERM) module to better manage contractors and vendors. We also explore how managed services in the identity space are evolving, especially with platforms like SailPoint.
  |  By Xalient
Dave McGrail and Jaye Tillson cut through the noise on the biggest shifts in security right now. From Black Hat insights to Palo Alto’s CyberArk acquisition, they discuss what it all means for SASE, Zero Trust and the growing importance of identity. Plus, why VPN replacement is more than just a tech swap — and how choosing the right partner makes or breaks SASE transformation.
  |  By Xalient
Secure Service Edge (SSE) promises a transformative approach to network security—but many organizations struggle to translate the hype into real-world success. In this 60-minute session, industry leaders Martin Mascarenhas and Dave McGrail from Xalient join Jaye Tillson from HPE Aruba to unpack the realities of SSE deployment. This discussion explores: Presenters: Martin Mascarenhas, EMEA Vendor Partner Director at Xalient; Dave McGrail, Head of Business Consultancy at Xalien, Jaye Tillson, Field CTO at HPE Aruba.
  |  By Xalient
As manufacturing environments become more interconnected and identity-driven, securing the industrial identity fabric is critical to operational resilience and cyber defense. In this 30-minute session, we explore why identity is now the new perimeter—especially in complex, hybrid OT/IT manufacturing ecosystems.

We are an award-winning, IT consulting and managed services business, specializing in modern, software-defined networking, security and communications technologies. Our mission is to help our clients thrive in a cloud-centric world. We deliver innovative solutions and services tailored to meet the specific needs of each organization we work with.

Digital transformation means that users, devices, apps and data can be anywhere, leaving a traditional perimeter-based approach to network security no longer fit for purpose. That’s why it’s time for a Zero Trust approach to achieve secure, efficient connectivity for your cloud-first strategy.

Our software-defined technologies, managed services and innovation provide the foundation for secure network transformation. We’re passionate about what we do and the results we achieve for our customers – making them more agile in an ever-changing digital world.

Specialists. Innovative. Proud.