October 2025 Industry Insights

October 2025 Industry Insights

Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on our latest Webinar discussing Smarter Network Management, Emerging Cybersecurity Threats and Challenges, Unifying the SOC and the NOC, and much more.

KedronUK

Smarter Network Management – Migrating from Legacy NMS to StableNet®. (Webinar recording)
Is your current network management platform holding you back? Catch up on our latest webinar and discover how StableNet® unifies network & service management with automation, cost transparency, and proven migration support.

Download here.

Keysight Technologies

What the EU Cyber Resilience Act Means for Digital Product Makers. (Blog Post)
The EU Cyber Resilience Act (CRA) is set to become a defining regulation for all manufacturers and developers of digital products that touch the EU market. It introduces strict requirements for cybersecurity practices, risk management, and compliance procedures, affecting a wide range of stakeholders from software developers to hardware vendors. This article unpacks what the CRA is, who it affects, and how to get ready.

Find out more here.

Infosim

NCCM Vulnerability and End-of-Life with StableNet®. (Whitepaper)
StableNet‘s automated network and service management solution offers a highly effective approach to simplifying Network Configuration and Change Management (NCCM) by providing robust, automated inventory and discovery capabilities. The platform solution ensures that network visibility is comprehensive and current through customizable, regularly scheduled discovery jobs that automatically identify and document hardware details, interconnections, and dynamic Parameters like routing protocols and neighbourhood views. Beyond discovery, StableNet®‘s NCCM solution integrates automated backup and restore, policy compliance checks, and change Management processes into a cohesive, streamlined framework.

Download the whitepaper here.

SenseOn

6 Best Insider Threat Detection Tools. (Blog Post)
Sometimes the most dangerous security threats come from inside the firewall. A small minority of employees and other trusted individuals will compromise their organisations, whether by accident or design. Motivations for insider threats include:

  • Political or ideological reasons.
  • Profit and financial gain
  • Revenge after an incident or lack of recognition
  • Sabotaging other individuals within a workspace
  • Attempting to advance their careers
  • Negligence (for example, clicking on a phishing email).

Today, insider threats are common and can be devastating. Many organisations notice an insider threat has occurred long after the fact, such as in the event of intellectual property theft or when sensitive information is leaked online.

Read more here.

Rapid7

Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond. (Blog Post)
The global threat landscape is undergoing an unprecedented transformation. Organisations are facing dizzying levels of complexity, driven by rapid technological innovation, the widespread adoption of artificial intelligence, and the expected disruptive effects of quantum computing. At the same time, shifting geopolitical dynamics, the rise of sophisticated cybercriminal networks, and the introduction of new regulatory frameworks are fundamentally reshaping how the private and public sectors must approach security.

Against this backdrop, this blog post examines the cyber threats expected to emerge within the next 3 to 5 years. It explores the challenges posed by these constantly evolving risks, analysing the technical aspects of cyber threats as well as the strategic, regulatory, and human factors that define the modern security landscape. Most importantly, it provides actionable insights that organisations can utilise to strengthen their cyber resilience.

Read the full blog post here.

BullWall

2026 Ransomware Resilience Benchmark Report. (Report)
Based on input from hundreds of security leaders, our 2026 Ransomware Resilience Benchmark Report is designed to help executives, security leaders, and boards understand:

  • How your organisations ransomware defences compare to peers
  • Where critical resilience gaps still exist
  • How requently organisations are being hit by ransomware
  • How the impact extends far beyond IT to operations, revenue, and reputations
  • The practical steps required to move from misplaced confidence to proven ransomware resilience

Download the report here.

ExtraHop

Unifying the SOC and the NOC for Stronger Cyber Resilience. (Blog Post)
Traditionally, Security Operations Centres (SOCs) and Network Operations Centres (NOCs) have operated as distinct entities, each with a specialised focus. SOCs are focused on protecting the organisation from cybersecurity threats, while NOCs are responsible for ensuring the continuous availability and performance of the organisation’s IT infrastructure.

Both the NOC and SOC exist to support the business. Their shared mission is to minimise disruptions and ensure that the organisation can continue its operations effectively and securely. Downtime, whether due to a network outage or a cyberattack, directly impacts productivity, revenue, and reputation. Without strong collaboration and unified tools, these intertwined issues can lead to delayed responses, increased damage, and a fundamentally incomplete understanding of the risk landscape.

Find out more here.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

Merry Christmas from KedronUK!

Merry Christmas from KedronUK!

First of all, Merry Christmas from all of us at KedronUK! It’s that time of year where, as a company, we like to reflect on the past year, and share what KedronUK has been working on, our view of what we’ve seen in the market over the last 12 months, and what some of our plans are for the next 12 months.

Welcoming New Faces to the KedronUK Family
This year, our team has expanded more than ever with the addition of five talented individuals who have seamlessly become integral parts of our sales team. Join us in welcoming:

  • Maisie Cornwall – Business Development Assistant.
  • Umer Khan – Account Executive 
  • Joshua Phillipus – Internal Sales Executive.
  • Thabo Molibola – Internal Sales Executive. 
  • Wendy Mahashe – Business Development Assistant. 

Their expertise and enthusiasm have undoubtedly contributed to the success of our projects and the overall positive vibe within our work environment. 

We’ve also seen a number of role changes in the past year with: 

  1. Phil Simms being promoted to Sales Manager.
  2. Jeegar Shah being promoted to Technical Support & Delivery Team Leader.
  3. Emma Fox changing roles from Sales to Assistant Project Manager. 

Meeting More Customers in Multiple Industries at Events throughout the Year
This year we’ve enjoyed attending and exhibiting at more events than ever before with a particular highlight being exhibiting in partnership with Infosim at Connected Britain at London Excel. This demonstrated our integrated approach to Network Management and CMDB

We also hosted more #NoSalesPitch events at unique venues across the country, where we focussed on hot topics for Cyber Security and IT Operations and create an ideal peer to peer networking environment around fun activities.

Our Key Partners & New Technologies
Last year we saw a number of change in this area, due to changes of ownership of some of our partners, and also because of new questions being asked by our customers.

In 2024 we’ve looked to stabilise that portfolio and really hone down on those technologies, and make sure we continue to keep our focus on the area visibility across NOC and SOC. 

We have made sure that we don’t dilute our skill set and maintain our ability to not only provide disruptive technologies, but also that we are able to deliver and support them to the high standards our customers expect. 

Keys Partnerships remain with: Infosim, Keysight, Rapid7, ExtraHop, BullWall, Opsramp, Logpoint, Thales, SolarWinds, Allegro Packets, and Instana

And despite the above emphasis, we did welcome new partnerships with:

FNT Software – Delivers tools to plan, document, and manage network resources across hybrid environments.

 UXM – Digital Experience Monitoring for any application

The Market
We found the market to be cautious this year with greater scrutiny on decisions, even with trusted providers and technology. We believe this to be related to pressure on budgets and economic uncertainty driven by political events. Although that sounds challenging, we actually found the reality and result of this validation that the technology we provide and the way in which we deliver is what our customers need and want. 

Customers tell us that they are short on resource, and the areas in which we work are critical to their organisations success. They need to be able to do more with less and ensure that the projects they commission in these areas are successful and delivered on time. 

All of this plays into Kedron’s strengths, and although some decisions we sometimes delayed due to the scrutiny, we still were successful in wining those key projects and strengthened existing customer relationships. 

We have also commissioned a new Customer Experience initiative where we have automated the process of receiving customer customer feedback in a structured way to make sure we are listening to our customers and acting on suggestion they provide. This has already provided excellent insight. 

Looking Forward to 2025
We have some very exciting projects commencing across all business lines in 2025 and will be growing our team again as a result. 

In the coming weeks and months you will see increased emphasis on our Managed Solution via our own Totuus Brand and Technology, where we look to address our customers challengers via providing the right technology as a service, where they still maintain the control and flexibility that we know large and secure organisations need. 

We will be running and attending even more events and looking to meet in person even more of you. 

And finally, we will look to be winning more projects to support our growth and to continue winning them the right way; by putting forward the best technology forwards delivered by the best people, our team and then standing by the results we promise.

And Finally… 

We’d like to thank our Customers and Partners for their support over the last 12 months, we hope you all have some great time off with your loved ones and we look forward to seeing you all in 2025. 

Merry Christmas, and a very Happy New Year, from all of us at KedronUK!

 

 

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

Streamlining Efficiency Part Two: A Dive into our Latest Automation Project

Streamlining Efficiency Part Two: A Dive into our Latest Automation Project

In Part One, we discussed how many organisations are hesitant to disrupt existing technical workflows, even though they may now be extremely inefficient. However, this mindset can be a barrier to progress and innovation, potentially costing time and money.

While certain processes may appear functional on the surface, they may still harbour inefficiencies or limitations that could be addressed through automation. By challenging the status quo and being open to change, organisations can uncover hidden opportunities for improvement and unlock new levels of efficiency and effectiveness.

In this second part of our mini blog post series, we will explore how even seemingly “unbroken” processes can benefit from automation, demonstrating the value of a proactive approach to innovation, as highlighted by a recent automation project with a manufacturing company in an industry dating back to the 19th century.

An open-minded, collaborative approach is essential for successful automation projects, especially in network management. By focusing on objective evaluations of workflows and processes, stakeholders can identify areas for improvement and implement solutions effectively. This approach was exemplified in a recent automation project carried out by KedronUK for a manufacturing company, where a clear focus on process evaluation led to significant improvements.

In the first part of this series, we outlined the project’s focus, highlighting three main elements:

1. Mitigating Ticket Proliferation in IT Service Management
2. Workflow Automation for Manual Tasks
3. Efficient Ticket Generation for the NG Firewall Platform

Let’s dive into the second focus area:

Workflow Automation for Manual Tasks

Many of us perform tasks regularly that we know could be more efficient, but the old saying comes to mind; “I don’t have time to stop to get on my bike,” or in other words, “I’m so busy with the task at hand, that I don’t have time to stop and improve the process.” Double, or even triple entry, is a common example of this inefficiency.

I was talking with a new potential customer today, who manages a network supporting over 30,000 employees. When asked if they find themselves double-entering data between their CMDB and the NMS platform, they responded as expected: “Integration would be great, but we just don’t have that level of automation, and we don’t seem to be able to find the time to implement it.”
Our existing manufacturing company customer faced a similar situation. They used one system for ordering, another for CMDB, another for discovery and management, and another for ITSM, with users manually entering information at each layer. Additionally, vital information often wasn’t migrated between systems due to the manual workload. Such data would be extremely useful in the event of an incident or service assessment.

While this scenario can be politically sensitive, the benefits of a consistent, up-to-date flow of data from source to end-point, without the bottleneck of manual entry, are clear.

The first step was to identify what data was needed, where was it needed, and what was the entry point for that data. The goal was for an alarm produced by the NSM platform to generate a ticket in the ITSM platform, automatically, with all the required details to triage the ticket, such as:

• Hostname
• IP Address
• Serial Number of all FRU components
• Services affected
• Service Status
• Device Criticality
• Asset Value
• End of Life Status
• Site Information
• Rack and U location
• Site access details
• Service Contract Status
• Support Contact Numbers
• SLA information
• Root cause Alert detail (what’s wrong)

As can be deduced from the list, the source of each data point was spread across several different platforms.

The second step was to identify the unique identifier between platforms to link the data sets. For example, the unique identifier between the ordering platform and the CMDB was the device serial number, and between the CMDB and the IPAM system, it was the hostname.

Using TOTUUS®, a data framework solution with capabilities such as CMDB and ETL, we configured several data connector APIs. The customer CMDB was configured to send new or updated device information to TOTUUS®. A listening (PUSH) connector (DCx) was configured in TOTUUS® to receive this data, ensuring secure communication with tokenised URLs.

Upon receiving data from the customer CMDB, the PUSH DCx matched the data internally with a unique identifier, updated the local CMDB, and executed secondary DCx’s to connect to other platforms for additional data augmentation.
StableNet® (NMS platform) by InfoSim, was configured to discover additional asset information regularly against the TOTUUS® CMDB. Another TOTUUS® DCx was configured to extract relevant information from StableNet®, after asset discovery, such as device end-of-life details and configuration policy status.

Finally, a TOTUUS® DB Object was configured, allowing the customer CMDB to pull detailed information of interest back to maintain up to date information.

With all required data in one place, an alarm script in StableNet® was configured to augment alarm details and send the necessary information to the ITSM platform, automatically creating an ITSM ticket, with the required level of detail.

This engagement resulted in data being entered once, at its point of origin, and automatically collected and passed to secondary systems, augmented en-route, and collated at its destination. This reduced errors, data bottlenecks, and time spent understanding required information during incidents, significantly reducing MTTR.

In the final segment of this blog series, we’ll continue exploring facets of network management automation, with efficient ticket generation for the NG Firewall Platform.

If you would like to discuss an Automation or Consolidation project, please contact phil.swainson@kedronuk.com.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

Streamlining Efficiency Part Two: A Dive into our Latest Automation Project

Streamlining Efficiency: A Dive into our Latest Automation Project

The age-old adage “if it ain’t broke, don’t fix it” often serves as a deterrent to embracing automation. Many organisations are hesitant to disrupt existing technical workflows, especially if they’ve proven effective, if not efficient, over time. However, this mindset can also be a barrier to progress and innovation, and in some cases, costing time and therefore money.

While certain processes may appear functional on the surface, they may still harbour inefficiencies or limitations that could be addressed through automation. By challenging the status quo and being open to change, organisations can uncover hidden opportunities for improvement and unlock new levels of efficiency and effectiveness.

This blog post will explore how even seemingly “unbroken” processes can benefit from automation, demonstrating the value of taking a proactive approach to innovation, as highlighted by a recent automation project with a manufacturing company in an industry that dates back to the 19th Century.

“By focusing on objective evaluations of workflows and processes, stakeholders can identify areas for improvement and implement solutions effectively”.

An open-minded, collaborative approach is essential for successful automation projects, especially in network management. By focusing on objective evaluations of workflows and processes, stakeholders can identify areas for improvement and implement solutions effectively. This approach was exemplified in a recent manufacturing company’s successful automation project caried out by KedronUK, where a clear focus on process evaluation led to significant improvements.

Initially, ten workflows were identified for evaluation.

The goal was to:

• Identifying the stakeholders involved in each workflow.
• Thoroughly understand the current workflows.
• Quantify the time and effort involved in each workflow.
• Assess the feasibility of automation of each workflow.

Each of the ten workflows were assessed and categorised for feasibility, efficiency benefit and cost verses benefit. It was found that the initial ten workflows fell into the following three main categories:

1. Mitigating Ticket Proliferation in IT Service Management:
There was a need to address the issue of an excessive number of tickets being generated in the IT Service Management Platform. Streamlining and refining the ticketing process would be pivotal in enhancing overall operational effectiveness.

The Network Operation Centre (NOC) team, where finding it very difficult to stay on top of the 10,000 plus tickets being generated through existing integrations.

2. Worlkflow Automation for manual Tasks:
An automation opportunity was identified within manual workflows to eliminate redundancy associated with repetitive tasks. This included expediting the onboarding of new devices and the cessation process for existing devices. By automating these procedures, the aim was to enhance efficiency, reduce errors, and accelerate the overall pace of operations.

3. Efficient Ticket Generation for the NG Firewall Platform:
Automating the process of ticket generation for the Next Generation Firewall platform, with threat intelligence, to ensure a swift and accurate response to detected threats and assessments. This would involve integrating automation solutions that expedite the identification, logging, and resolution of issues on the platform, ultimately contributing to a more responsive and agile operational environment.

Lets look at these in turn:

Mitigating Ticket Proliferation in IT Service Management
Three tiers, or components were involved in raising ITSM tickets for the organisation, which within themselves already had a degree of automation implemented. The results however had become unmanageable, with approximately 10,000 tickets per month being raised for the 24×7 NOC team to triage and close. This equated to roughly 14 tickets per hour around the clock.

Upon investigation, it was discovered that a significant portion of these tickets were duplicates or repetitions of similar events, leading to a staggering 70% increase in ticket volume. The existing automation had become inadequate, exacerbating the issue rather than resolving it.

The first tier, the Network Management tool, had root cause calculation capabilities but was configured to forward all alarms, without root cause, to the second tier—a Network Management tool with integrations to the third tier, the ITSM platform. While this setup seemed promising in theory, it proved ineffective in practice, as evidenced by the overwhelming volume of tickets inundating the NOC team.

The immediate and pressing question arose: Why wasn’t a tool equipped with root cause analysis capabilities being fully leveraged? The answer, though somewhat surprising, revealed that the second-tier solution possessed the capability to filter—not correlate—for alarms tagged with a root cause from the first tier. Furthermore, the business had decided to only address root cause incidents of specific types via the proactive team in the ITSM, with the remainder managed by the Business as Usual (BAU) Team through reports. Consequently, this criterion was also added to the filter.

This setup meant that, regardless of the configurations in tier one, tier two would only forward what it was configured to, resulting in the decision to send everything from tier one to tier two.

We recommended reversing this logic, making the more capable tier one tool the one with the intelligence to determine what to send after calculating root cause. This approach would leave tier two with the straightforward task of merely forwarding what it receives. Additionally, this approach simplifies future configuration changes, as there is only one tool to configure.

This change resulted in a 33% reduction in the number of alarms sent to tier two, all of which matched the proactive team’s criteria. However, the number of ITSM tickets remained roughly the same.

In delving into the root cause of the ticket surge, we examined a month’s worth of ticket data. Our analysis revealed a trend: a substantial number of tickets were being closed by the proactive team, marked as acceptable within business utilisation thresholds. Moreover, we observed a proliferation of seemingly duplicate incidents, where multiple tickets were processed and closed by the team, referring to existing open tickets.

The investigation yielded two significant recommendations. Firstly, we proposed fine-tuning the tier one management platform to trigger alarms based on business utilization thresholds, which notably curtailed the number of utilization related ITSM tickets.

Secondly, we investigated the issue of apparent ticket duplication for identical incidents. We uncovered a limitation within the tier two platform—its ticket-raising process lacked an update mechanism. When a condition resolved to its KPI, an “OK” notification was issued from tier one to tier two. Tier two would then locally close the incident without updating the ITSM. This oversight led to recurrent breaches generating new tickets. The oversight was blamed on the business requirement for all tickets to be closed manually.

A solution was needed to update open tickets with both the “OK” notification and recurrent breaches. However, we hit dead ends with the tier two solutions capabilities and with the ITSM platform team due to a reluctance to alter logic, therefore, we redirected our focus to tier one. Leveraging its capability to directly interface with the ITSM tier bypassing tier two, we achieved the required ticket creation and update process.

Overall, monthly tickets saw a remarkable 77% reduction, plummeting from 10,000 to 2,300. This significant improvement allows the team to allocate more resources to incident resolution rather than ticket deduplication. Furthermore, the business is now evaluating the business case for the tier two solution, with potential cost reductions on the horizon.

As can be seen, the insights gained from our analysis led to recommendations aimed at optimising processes and enhancing productivity. In the upcoming segments of this blog series, we’ll continue our dive into additional facets of network management automation with a look at Workflow Automation for Manual Tasks followed by Efficient Ticket Generation for the NG Firewall Platform.

If you would like to discuss an Automation or Consolidation project, please contact phil.swainson@kedronuk.com.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

KedronUK Has Come of Age!

KedronUK Has Come of Age!

Kedron UK has reached the grand old age of 21 and will be celebrating this milestone with the team at the Henley Royal Regatta in July! We find it hard to believe we are marking over two decades of success in the ever-evolving IT industry, so we wanted to take a look back and share with our customers where it started, what has changed and where we think we will be going next!

Starting out as a provider of network management tools in 2003, Kedron UK quickly expanded its services to include application performance and end-to-end service visibility.

As the industry continued to shift and evolve, so did we.

On Prem – Cloud – Hybrid
One of the most significant technology trends has been the shift towards cloud computing and virtualisation. As more businesses have moved their data and applications to the cloud, traditional IT management and monitoring tools faced challenges. However, we found it was important not jump into cloud monitoring specific tools only, as users still accessed services within their own networks and as we deal with predominately large and secure customers, often critical / sensitive applications and data would remain on premise. We needed to ensure we provided the best possible solutions for Hybrid environments using as few monitoring tools as possible.

We Entered the Cyber Security Market
Finally, the growing importance of cybersecurity has also impacted IT operation management and monitoring. With the increasing number of cyber threats and attacks, businesses need to be able to monitor their networks and systems for potential breaches and respond quickly when a threat is detected.

This has led to the development of new security-focused tools and platforms that are integrated with IT management and monitoring systems to provide end-to-end visibility and protection.

This is why, in 2017, KedronUK expanded its services to include cybersecurity. This move reflected the growing focus on cybersecurity threats in the industry and the need for businesses to protect their networks and data from malicious actors. We also ensured we stayed close to what we are we good at which is fundamentally getting our customers the right kind of visibility from the complex environments. By providing technologies like Network Detection and Response, Threat intelligence, SIEM, and SOAR we have been able to broaden on product portfolio, whilst ensuring we stay true to our quality design and delivery process.

Machine Learning and AI
Currently topical with our customer base is obviously the rise of artificial intelligence (AI) and machine learning (ML).

With the increasing amount of data generated by IT infrastructure, AI and ML have become useful tools for analysing and interpreting data to identify potential issues and optimise performance.

In many ways this is only just begun, but we have found again the importance of a pragmatic and balanced approach. From our works so far reviewing capabilities and their implications for the system we provide that as important as this technology is, it should not be seen as the magic answer to all challenges. In fact, the best outcomes seem to come when it this tech is layered on top of already functional and mature monitoring platforms.

Whats Next?
Here we have a look at a couple of areas where we think will be busy next, Phil Swainson our Head of technology plans to review each of these areas in more detail in a series of future posts celebrating our big birthday. Each edition will come with a special offer so keep your eye out!

  • Unification of SOC and NOC – Maybe because of our background and development we have seen within our own portfolio, or because of the increased expectation of shared data via APIs and open standards we see that there will an increased awareness that multiple technology teams have very similar technologies running in parallels. More and more there are vendor solutions that cover multiple domains offering opportunity for cost saving and technical efficiencies. An example here would perhaps be Network Detection and Response and Network Performance Management, both solutions collecting network traffic from Taps, Packet brokers or SPAN ports for analysis.

 

  • CMDB Comeback – Sometimes CMDB is a dirty word, many have tried to build and maintain an accurate solution that meets individual business operational, and compliance needs but many organisations we speak to are still left frustrated. For this reason, we have seen vendors move away from the term and start using other terms to describe similar functionality or narrow their focus into security and other niche’s, you could argue AIOPs is one of those to some extent. We think the concept is still correct and we just need better tools and process to achieve a reliable way of getting to the end goal that stakeholders can then learnt to trust. We think this is one area where AI and ML is extremely interesting and can complement but also assure best practice and process. However again we think AI on its own won’t solve the total problem. We’ve got some interesting ideas about what will so watch out for Phil’s upcoming blog post.

 

  • IoT/OT and IT Convergence – Like or hate it these worlds are coming together and end to end views of performance and security are critical, bridging the gap between these two technology areas and cultures is surely a challenge that needs addressing with a unified approach.

We’d love to know what you think, both about how things have changes in the areas of performance and security visibility and what you think will be next!

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

Merry Christmas from KedronUK!

Merry Christmas from all of us at KedronUK!

As the holiday season fast approaches, we at KedronUK are thrilled to reflect on the incredible journey we’ve had throughout the year. It’s been a year of growth, new partnerships, and exciting milestones that have shaped our company’s narrative. Throughout this blog, we reminisce on the past year, and share some key highlights from our 2023.

Welcoming New Faces to the KedronUK Family
This year, our team has expanded with the addition of three talented individuals who have seamlessly become integral parts of our sales and technical teams. Join us in welcoming:

  • Max Raine – Business Development Assistant.
  • Sean Thompson – Systems Support Engineer.
  • Peter Costello – Account Executive.

Their expertise and enthusiasm have undoubtedly contributed to the success of our projects and the overall positive vibe within our work environment. We’re also looking forward to welcoming 3 new starters in the new year!

Forging Stronger Partnerships
In our commitment to delivering top-notch solutions, we are proud to announce new and exciting partnerships formed over the past year. Over the course of 2023, we have partnered with some valued vendors, such as, Forescout Technologies, Wib, Allegro Packets, Heimdal and BullWall. These collaborations with cutting-edge vendors have allowed us to enhance our service offerings and better address the evolving needs of our clients. 

Unforgettable Events Around the Globe
In 2023, we went beyond borders, hosting two company events in the heart of London and attending exciting partner events in Dubai and Germany. These experiences provided us with valuable insights, fostered new connections, and reinforced our commitment to being a global player in the IT industry. 

Celebrating 20 Years of Innovation
March marked a significant milestone for KedronUK as we celebrated our 20th anniversary. Two decades of innovation, dedication, and client satisfaction have shaped us into the company we are today. We extend our heartfelt gratitude to our clients, partners, and the incredible team that has been instrumental in our success. 

Looking Forward to the Future
As we bid farewell to 2023, we are excited about the possibilities that lie ahead. The coming year promises more innovation, continued growth, and the opportunity to strengthen existing relationships while forging new ones. We remain committed to delivering excellence in IT operations, security operations and service management. 

From all of us at KedronUK, we extend warm wishes for a joyful holiday season and a prosperous New Year. Thank you for being part of our journey, and we look forward to creating more success stories together in 2024. 

Merry Christmas!

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.