The Data Security industry is changing rapidly, and as fast as new encryption technologies emerge then new methods to crack them follow on. GEN as a business prides itself in offering the most secure voice and data services available with high level mitigation technologies. Our point to point and point to multipoint layered encryption solutions ensures that your data reaches its destination securely and intact. Our secure voice services ensure that your conversation remains secure and with relatime 'secure channel' indications you know this on every call you make. When it comes to secure access to private secure systems, GEN's SAS service ensures multi-layered encryption and access control for over the internet connectivity or advanced off-net Dial-up / Satellite connectivity for those special cases that demand absolute secrecy.  

  • Penetration and vulnerability scanning

    At GEN we have a proactive approach to network and service security and run continuous scans and penetration tests on our in-house and customers services. We use machine level scanning technology from Beyond Trust together with application specific scanners and testers for services like HTTP, Joomla, Wordpress, etc. 

    We have a good mix of automated scanning and manual penetration to ensure that our customer's services are secure. 

    If you have an interest in Penetration Testing your network or services then contact us today for a free trial. 


  • Cyber Security, Network Security, Protection and Counter-Espionage

    When considering how to fully protect your network the options are many and varied but the goals are the same, to keep the public internet out and your data and documents in. 

    Protect the network from outside reach

    Many companies these days are making the decision that having public inward access to resources whether that be a mail server or otherwise is simply not worth the risk especially when pretty much everything can be mirrored to an oursourced platform that is 'someone else's problem', but even when you outsource there are still risks especially when files and data are mirrored to local storage. Having very tight controls on what is mirrored and when is of the upmost importance to ensure both the integrity and security of the intranet.

    Protect the network from internal compromise

    Its a common belief that firewalls are only used to seperate the intranet from the internet at the network border, but in fact this is far from the truth and in any intranet there should be segmentation and firewalls to limit the risk of an internal compromise. A good example would be a network virus that due to the failure of your primary network security controls managed to end up on a workstation, without segmentation that network aware virus now has the entire company available to it along with the undoubtably expensive remediation. Segment your intranet and filter the data between segments to ensure that any risk is localised and identified quickly. Deploy proactive monitoring of both workstations and servers can also be very important to highlight 'unusual' behaviour and target your security staff. Use smart switching to generate alerts for unknown MAC addresses, or ports that come up or go down, unusual traffic levels and so on.  

    Protect the network from social engineering threats. 

    One of the many techniques used today to breach company networks is social engineering, the sending of an email to an employee that appears to come from that employees boss with an attachment (or if you've already covered that avenue then a link and instructions), or a delivery guy delivering something to your network that you weren't expecting, a printer service guy infecting printers with malware, the read the meters guy and the list goes on. Employees aren't stupid but they will make mistakes and are by far the largest risk in any security infrastructure. In order to cover all of the avenues of attack you need to cover all the avenues of return by ensuring that internet access is limited and filtered, as is email. USB ports should always be disabled and with heavy segmentation and endpoint monitoring your starting to make it really hard to penetrate the network. 

    Protect the network from data leakage

    The term 'data leakage' is the new way of saying data theft but it means the same. Having your data stolen is not rare, its as commonplace as spam and yet in 9 out of 10 cases the employer is completely unaware. Why? well because of multiple failures in network security strategy allows for data leakage to not only occur without challenge, but for there to be little or no evidence left behind. In fact the first most companies know about data theft is when it appears in the public domain and that's way too late. Preventing data leakage is more than just firewalls and segments, its about real risk assessment, strategies and processes. Our Managed Storage Options service which is widely used by corporates for data and document storage employs extensive logging of every file access, read, write, copy, and so on all tied back to IP & User but that's just an example and there's much more to the it than just logging, you need to be proactive in establishing the security framework and reactive in responding to potential threats quickly and effectively.  

    If your network security needs a review or some advice, or if you'd like to outsource your network security to us then contact us today for a free assessment. 

  • GEN Security Decryption & Password Recovery

    GEN offers a wide range of security decryption services and are able to currently decrypt and/or remove passwords from the following file types: 



    Adobe Acrobat


    Symantec ACT! 2.0 - 2000


    ACT! by Sage 2005 - 2009


    Android Backup 4.4 or earlier


    Android Image 4.4 or earlier


    Apple Disk Image

    DMG, DD

    Apple iCloud Token


    Apple iTunes Backup / iOS 4.x - 9.x


    BestCrypt 6.0 - 8.0


    FileMaker Pro 3.0 - 14.0

    FP3 / FP5 / FP7 / FMP12

    Google Chrome Website


    ICQ 2000 - 2003, 99a, Lite

    DAT / FB



    Lotus 1-2-3 1.1+

    WK!, WK1, WK4, WRC, WR1, WR9, 123

    Lotus Notes 4.0 - 8.0


    Lotus Organizer 1.0 - 6.0

    ORG / OR2 / OR3 / OR4 / OR5 /OR6

    Lotus Word Pro 96 - 99


    LUKS Disk Image

    DD, IMG, BIN, E01

    Mac OS / FileVault2

    DMG, DD, IMG, BIN, E01

    Mac OS X Keychain


    Mac OS X User / Hash


    Mac OS X 10.8 - 10.10 User / Hash


    Mozilla Firefox Website


    MS Access 2.0 / 95 / 97 / 2000 / 2002 / 2003 / 2007 / 2010 / 2013

    MDB / ACCDB / MDA / MDW 

    MS Backup


    MS Excel 4.0 / 5.0 / 95 / 97 / 2000 / 2002 / 2003 / 2007 / 2010 / 2013


    MS Pocket Excel


    MS Excel VBA


    MS Internet Explorer Website


    MS Internet Explorer Webform


    MS Internet Explorer Content Advisor


    MS Mail


    MS Money 99 or earlier / 2000 / 2001 / 2002 / 2003 / 2004 / 2005 / 2007


    MS OneDrive


    MS OneNote 2003 / 2007 / 2010 / 2013


    MS Outlook 2000 / 2003 / 2007 / 2010 / 2013 Email Accounts


    MS Outlook 2000 / 2003 / 2007 / 2010 / 2013 Form Template


    MS Outlook 2000 / 2003 / 2007 / 2010 / 2013 Personal Storage


    MS Outlook Express Accounts


    MS Outlook Express Identities


    MS PowerPoint 2002 / 2003 / 2007 / 2010 / 2013


    MS Project 95 / 98 / 2000 / 2002 / 2003


    MS SQL SERVER 2000 / 2005 / 2008


    MS Windows NT User / Secure Boot Option


    MS Windows 2000 User / Secure Boot Option


    MS Windows 2000 Server User / Secure Boot Option


    MS Windows 2000 Server Active Directory Administrator


    MS Windows XP User / Secure Boot Option


    MS Windows 2003 Server User / Secure Boot Option


    MS Windows 2003 Server Active Directory Administrator


    MS Windows 2003 SBS User / Secure Boot Option


    MS Windows 2003 SBS Active Directory Administrator


    MS Windows Vista User / Secure Boot Option


    MS Windows Vista / BitLocker

    DD, IMG, BIN, VHD, E01

    MS Windows 2008 Server User / Secure Boot Option


    MS Windows 2008 Server Active Directory Administrator


    MS Windows 2008 Server / BitLocker

    DD, IMG, BIN, VHD, E01

    MS Windows 7 User / Secure Boot Option


    MS Windows 7 / BitLocker

    DD, IMG, BIN, VHD, E01

    MS Windows 2012 Server User / Secure Boot Option


    MS Windows 2012 Server Active Directory Administrator


    MS Windows 2012 Server / BitLocker

    DD, IMG, BIN, VHD, E01

    MS Windows 8 - 8.1 User / Secure Boot Option


    MS Windows 8 - 8.1 / BitLocker

    DD, IMG, BIN, VHD, E01

    MS Windows 10 User / Secure Boot Option


    MS Windows 10 / BitLocker

    DD, IMG, BIN, VHD, E01

    MS Windows Domain Administrator


    MS Windows Live ID Account


    MS Windows NTLM/LANMAN Hash


    MS Windows Phone


    MS Windows User / UPEK


    MS Word 1.0 / 2.0 / 3.0 / 4.0 / 5.0 / 6.0 / 95 / 97 / 2000 / 2002 / 2003 / 2007 / 2010 / 2013


    MYOB earlier than 2004 / 2004 / 2005 / 2006 / 2007 / 2008 / 2009 / 2010

    PLS / PRM / DAT / MYO

    Network Connection


    Norton Backup




    Paradox Database


    Peachtree 2002 - 2006 / 2007 / 2008 / 2010 / 2013


    PGP Desktop 9.x - 10.x Zip


    PGP Desktop 9.x - 10.x Private Keyring


    PGP Desktop 9.x - 10.x Virtual Disk


    PGP Desktop 9.x - 10.x Self-Decrypting Archive



    DD, IMG, BIN, E01

    GnuPG Private Keyring


    Quattro Pro 5 - 6 / 7 -8 / 9 - 12 / X3 / X4

    QPW, WB1, WB2, WB3

    QuickBooks 3.x - 4.x / 5 / 6 - 8 / 99 / 2000 - 2014

    QBW, QBA

    QuickBooks for Mac 2013 / 2014

    QB2013 / QB2014

    QuickBooks Backup


    Quicken 95 / 6.0 / 98 / 99 / 2000 - 2014


    RAR 2.0 Archive


    RAR 2.9 - 4.x (AES Encryption) Archive


    RAR 5.x Archive


    Remote Desktop Connection


    Safari 5.0 - 5.1 Website


    Schedule+ 1.0 / 7.x

    CAL / SCD

    TrueCrypt Non-System Partition/Volume 5.0 or later

    DD, IMG, BIN, TC, E01

    TrueCrypt System Partition/Volume 5.0 or later

    DD, IMG, BIN, TC, E01

    TrueCrypt Whole Disk 5.0 or later

    DD, IMG, BIN, TC, E01

    TrueCrypt Hidden Partition 6.0 or later

    DD, IMG, BIN, TC, E01

    TrueCrypt Hidden OS 6.0 or later

    DD, IMG, BIN, TC, E01

    Unix OS User Hash


    WordPerfect 5.x / 6.0 / 6.1 / 7 - 12 / X3 / X4


    WinZip 8.0 or earlier


    Yandex Browser Website


    Zip Archive


    7-Zip Archive



    This is by no means an exhaustive list and there are new decryption strategies added regularly as we encounter them. If you have a file, disk, system or device that is protected by password and/or key then we can unlock it. The time and resources required depend largely on the protection mechanism and we can advise of these at point of order. 


  • GEN Security Auditing

    Even the most basic connectivity implementation can have holes in it, from switching/routing firmware flaws to inadvertently enabled VPN protocols or badly configured firewall rules and that's what Network Security Auditing is all about, an impartial double check of the security measures you've already implemented. During the audit we will attempt direct and indirect exploitation of your systems to reveal any possible issues with the network fabric, then we'll turn to what is by far the largest risk to security, the staff. Giving staff access to ONLY what they require to do their job has been the default position on network security since the 70's but its so often the case in smaller companies that staff have access to way more than they need, sometimes even administrative privileges! Below is a very simple overview of the audit process: 

    • Analyse network security from the public internet - check for vulnerabilities and exploits. 
    • Analyse network security from the LAN (or WAN) - check for vulnerabilities, exploits, and sample the data stream for unknown or suspicious packets. 
    • Analyse the LAN for RAT (Remote Access Tools) that have been willingly or unknowingly installed and have open connections to the internet. 
    • Run a full security scan of storage and fabrics. Ensure that corporate data is secured in such a way that would make its compromise very hard. 
    • Analyse user permissions, reach and effect. Look at password strengths, two factor authentication, and of course post-it notes with passwords on them stuck to the front of PC's. 
    • Analyse cloud based services for security and resilience. 
    • Analyse anti-virus and IDS systems for effectiveness. 
    • Analyse Wifi Networks, connectivity and compromises. 
    • Analyse laptops, tablets, and other remote solutions which may or may not have an impact on network security. 
    • Analyse Staffing risks, single point of failures, and high risk individuals. 

    And then we write a full and detailed report of our findings with recommendations at each stage. Once all the issues have been resolved we'll re-audit again to confirm. Security Auditing is priced sensibly on a day rate basis, and one day is often sufficient for small businesses with one connection. Larger organisations may take several days or more but we will be able to provide an estimation prior to commencing any work.

    If you think your business would benefit from a Security Audit then contact us today for more information! 


  • GEN Business Security Services (BSS) - TrendMicro AntiVirus Protection

    Better than the competition

    GEN Business Security Services are based on the legendary Trend Micro Business Security portfolio which achieved the highest overall score from for all participating vendors on corporate endpoint security.

    We provide this best in industry AV solution with our added backup and support services so your never left on your own to deal with an outbreak. In a fully managed scenario we monitor your endpoints, take proactive and reactive actions to ensure your protected and in the event of an outbreak or infection we're here to help clean and recovery as needed. No other AV provider offers such a comprehensive cover-all service.

    For the past three years, more businesses worldwide have trusted Trend Micro for content security than any other provider.

    GEN Business Security protects business users and assets from data loss & viruses helping prevent any disruption to your day to day business. Powered by the Trend Micro Smart Protection Network GEN Business Security:

    • Stops threats in the cloud “ before they can reach your network and devices.
    • Filters URLs blocks access to inappropriate and non business websites on a per user basis.
    • Protects PC, MAC, Servers, IOS & Android Devices, Point of sale devices & USB drives.
    • Prevents business data from being shared via USB drives and with added protection to prevent data being shared via email messages.
    • Safeguards against phishing as well as social engineering attacks through URL and Behaviour monitoring.
    • Provides you with a comprehensive managed solution monitored 24/7 by our Networks Operation Centre.

    GEN Business Security Services is cloud based hosted security system. You do not need to incur the cost of deploying and managing a server locally. 

    The security software is updated automatically. You do not need to schedule any resources or additional budget for this purpose.

    Installing GEN BSS Services could not be simpler: Request an installer via the helpdesk and then follow the steps to install on the devices you need to protect both in the office and on the go.

    Weekly/Monthly reporting is provided for license management and behaviour monitoring.

    Optional Remote Manager Console to allow self-management, or fully managed. 

    With service plans beginning at as little as £1 per month this is not only the most comprehensive and trusted solution but also the most affordable.

    Contact us today for a quotation!


  • GEN SAS - Remote Access with Enterprise Class Protection

    SAS or Secure Access Service is a comprehensive and highly secure remote access technology by Juniper Networks through which you can access your corporate systems and services from anywhere with an internet connection. This is achieved via an encrypted tunnel through which the GEN SAS gateway brokers the connection to your corporate network to provide a select group of services. An example would be; an SME with a thin client CRM system operating on a local web server. They don't want to expose that web server to the internet for obvious reasons, so they select SAS as a solution to enable teleworkers to login to their CRM from iPad, iPhone and any computer connected to the internet.

    GEN SAS via the Pulse Client provides not only high security point to point encryption with local presence, but a range of endpoint protection services as well for Laptops, desktops, tablets, and Mobile devices such as Phones. 

    GEN SAS can remotely provide secure access to files and storage, RDP and VNC sessions to protected servers and application gateways, Virtual Desktops and sessions via VDI to Citrix, VMWare, Virtual meetings and much much more. 

    GEN SAS uses high level authentication such as Secure ID, SAML 2.0, PKI plus IAM integration with LDAP/AD all seamlessly supported in the backend. 

    GEN SAS has granular access auditing including Per-user, per-resource, and per-event level configuration for security as well as capacity planning and a fully featured IDS system to ensure the safety of your corporate LAN/WAN. 


    So, if your looking for a high security remote access solution and don't want to spend around £16k setting up your own security gateways then Contact us today for a quote!

Like most documents to come out of the EU, the full document is vast and unwieldy so here's a summary of the key points. In the coming months there will no doubt be an ever increased gaggle of companies promising to make you compliant for s


From Functional Design Specifications right through to Final Production Development and deployment of Software Systems. Developers skilled in PHP, ASP, VB, C#, C++ and others. Our Database Designers and Administrators are experts in MariaDB


People deserve the right to a better process.

Those are the words of Jim McGovern, representative for Massachusetts and member of the House of Representatives Committee on Rules, when, after 8:00

We are HP Partners and as such can supply the full range of Hewlett Package hardware and software. We are specialists in HP Netservers from generation 2 awards. We can offer outsourced supply and support for the full range of HP DL/ML and B