about

Our Team. Our Mission

about

Our Team. Our Mission

Our Story

Our logo depicts Gjallahorn, the great horn of Heimdall, the ever-vigilant sentry to the gods in Norse mythology. We chose the Gjallahorn to represent Secure Measure, as it aptly symbolises our own core values of alertness, steadfastness, and protection.

Our philosophy is to leverage the best technology and practices to guard the safety and privacy of our clients.

Our Story

Our logo depicts Gjallahorn, the great horn of Heimdall, the ever-vigilant sentry to the gods in Norse mythology. We chose the Gjallahorn to represent Secure Measure, as it aptly symbolises our own core values of alertness, steadfastness, and protection.

Our philosophy is to leverage the best technology and practices to guard the safety and privacy of our clients.

Our Mission

We care about the safety of organisations, their people, their customers and the wider community; and we work with like-minded managers who take seriously their obligation to secure their own data and that of associates, personnel and customers.

We believe that technology is a force-multiplier when correctly applied, but we know only too well how it can become a liability, particularly when risks are not adequately understood and monitored.

Your own IT resources are pulled in many directions, and while security and privacy are important parts of their remit, they can’t be everywhere all the time, and they can’t be specialists in everything.

Working with you, we’ll provide your organisation with a clear roadmap to optimise our processes and architecture to better protect your business and data from deliberate and inadvertent threats.

To find out how to better secure your business and avoid frustrating downtimes, connect with us today.

Our Mission

We care about the safety of organisations, their people, their customers and the wider community; and we work with like-minded managers who take seriously their obligation to secure their own data and that of associates, personnel and customers.

We believe that technology is a force-multiplier when correctly applied, but we know only too well how it can become a liability, particularly when risks are not adequately understood and monitored.

Your own IT resources are pulled in many directions, and while security and privacy are important parts of their remit, they can’t be everywhere all the time, and they can’t be specialists in everything.

Working with you, we’ll provide your organisation with a clear roadmap to optimise our processes and architecture to better protect your business and data from deliberate and inadvertent threats.

To find out how to better secure your business and avoid frustrating downtimes, connect with us today.

Our Team

Our three Founders have uniquely complementary skillsets upon which Secure Measure was built.

With more than 55 years combined experience, together with some of the best talent in the global cybersecurity market, Secure Measure is rarely out of its depth.

Martin McGregor

Co-Founder & CEO

Martin has twenty years of experience as an innovator at the leading edge of technology. A deep technical understanding of the security and privacy implications of storing sensitive customer information allows him to help guard against the security vulnerabilities and risks any modern organisation might face.

Through his customer-centric approach, Martin helps businesses innovate to improve their performance and security.

Jose Schenardie

Co-Founder & CIO

Jose has dedicated the last fifteen years to providing award-winning creative technology solutions to business problems and is deeply involved in a myriad of specialist domains within the tech community.

A talented professional merging enterprise architecture and security expertise, Jose specialises in transforming complex security and compliance frameworks into business-driven solutions which are and simple to manage for Secure Measure’s customers.

Jason Fairburn

Co-Founder & COO

Jason helps organisations meet both security and business requirements from a pragmatic, ground-up approach. By examining the fundamental building blocks of an organisation’s technical ecosystem, Jason creates elegant solutions designed to improve processes, policies, and procedures and meet compliance standards like PCI-DSS and ISO27k.

Working with Jason and Secure Measure means effective management of your data security risks using practical and supportable solutions.

Our Team

Our three Founders have uniquely complementary skillsets upon which Secure Measure was built.

With more than 55 years combined experience, together with some of the best talent in the global cybersecurity market, Secure Measure is rarely out of its depth.

Martin McGregor

Co-Founder & CEO

Martin has twenty years of experience as an innovator at the leading edge of technology. A deep technical understanding of the security and privacy implications of storing sensitive customer information allows him to help guard against the security vulnerabilities and risks any modern organisation might face.

Through his customer-centric approach, Martin helps businesses innovate to improve their performance and security.

Jose Schenardie

Co-Founder & CIO

Jose has dedicated the last fifteen years to providing award-winning creative technology solutions to business problems and is deeply involved in a myriad of specialist domains within the tech community.

A talented professional merging enterprise architecture and security expertise, Jose specialises in transforming complex security and compliance frameworks into business-driven solutions which are and simple to manage for Secure Measure’s customers.

Jason Fairburn

Co-Founder & COO

Jason helps organisations meet both security and business requirements from a pragmatic, ground-up approach. By examining the fundamental building blocks of an organisation’s technical ecosystem, Jason creates elegant solutions designed to improve processes, policies, and procedures and meet compliance standards like PCI-DSS and ISO27k.

Working with Jason and Secure Measure means effective management of your data security risks using practical and supportable solutions.

Our Approach

We provide a transparent and totally custom roadmap for your security evolution, specific to your business needs and risk profile – no more and no less.

Before making any recommendations or implementing any solutions, we need to understand your business. The discovery frameworks we’ve developed unearth a complete picture of your existing systems, business processes, and operating environments. By analysing this information, we provide you with prescriptive, evidence-based recommendations for managing your technology risks and ensuring the privacy and security of data.

By working collaboratively with your IT team during our discovery process, your people have total clarity and full confidence in the processes and rationale that leads to the implementation of your new security solutions.

Once we have a precise view of your security and risks, we provide a fully costed and scheduled solutions proposal, including a detailed risk assessment of your organisation and our recommended path to remediation.

We work with your IT team to tailor delivery of agreed solutions in a phased and seamless manner without interruption to business workflows. We guarantee your people are fully adept in the operation and maintenance of your new systems, and we’ll be there offering ongoing support for as long as you need us.

Our Approach

We provide a transparent and totally custom roadmap for your security evolution, specific to your business needs and risk profile – no more and no less.

Before making any recommendations or implementing any solutions, we need to understand your business. The discovery frameworks we’ve developed unearth a complete picture of your existing systems, business processes, and operating environments. By analysing this information, we provide you with prescriptive, evidence-based recommendations for managing your technology risks and ensuring the privacy and security of data.

By working collaboratively with your IT team during our discovery process, your people have total clarity and full confidence in the processes and rationale that leads to the implementation of your new security solutions.

Once we have a precise view of your security and risks, we provide a fully costed and scheduled solutions proposal, including a detailed risk assessment of your organisation and our recommended path to remediation.

We work with your IT team to tailor delivery of agreed solutions in a phased and seamless manner without interruption to business workflows. We guarantee your people are fully adept in the operation and maintenance of your new systems, and we’ll be there offering ongoing support for as long as you need us.

Our Partner Network

We work with some amazing partners to bring the best security solutions to the market.

Our Partner Network

We work with some amazing partners to bring the best security solutions to the market.

Improve Your Security

Grab an overview of our Solutions and see how we can help:

DOWNLOAD

Improve Your Security

Grab an overview of our Solutions and see how we can help:

DOWNLOAD

Our Values

Our Values are at the core of every part of our operations. Each is integral to how we do business, and how we each carry ourselves.

Privacy isn’t just our business; it’s the primary motivation upon which Secure Measure was founded. It’s the reason we love our work, and it’s what gives meaning to what we do. Defending the principles and virtues of privacy is vital for a free, thriving, and harmonious society – the value of which cannot be overstated. Partnering with people who are taking meaningful steps towards protecting the privacy of each individual that interacts with their organisation is why we get up each morning.

Secure Measure works to industry standards and benchmarks to ensure everything we do is measurable, auditable, and justified. Although those frameworks provide guidance, nothing can replace experience. Secure Measure’s founders are veterans of the Information Technology industry, and this experience is not only demonstrable in our work, but by reliably having your organisations back time and time again. We aim for greatness in everything we do, so you can be great at everything you do. We are committed to fundamentally helping the organisations with whom we partner.

Information Technology is the tool of our trade. Every product and service we provide is streamlined by the automation of manual processes and tooling. Our competitive advantage is providing your organisation maximum value from data security investments, ultimately resulting in new revenue opportunities for your organisation long term. We achieve this by developing mature capabilities your organisation can adopt today, leveraging our experience in providing holistic, strategic and profit generating technologies that effectively address risks to your overall success.

From the boardroom to the wider community, every organisation is made up of people with a story. Data Security is about protecting those people from the implications of cybercrime. That’s why we focus on partnering with people for healthy, productive, and long-term professional relationships. It’s taken decades to build up a network of people we trust and respect, so we know when we work together for our customers, our people first cultures are aligned.

Everything we do we do in a way our customers can track in real value terms. We never want our customers to have a vague sense of value. We want to support them in their organisations, so they can justify to their stakeholders why their investments in security and privacy are paying off. We consistently prove that in this day and age, implementing sound security and privacy principles within any organisation that depends on and holds sensitive data, will make that organisation more effective that their competitors. Often that isn’t intuitive to our clients, so it’s important that we demonstrate this with data.

Our business is as advertised; we help organisations address privacy and data security; simple as that. All of our products and services serve that purpose alone, and so it’s important that we operate in a way that keeps us in business. Accordingly, Secure Measure does not and will never profit from any of our client data or analytics being sold to any third party under any circumstances. That means full transparency as to how we operate and why we’re in business. Our contracts are simple and clear. We make organisations better members of their communities by helping them protect their customers, partners and the broader community’s privacy interests.

Our Values

Our Values are at the core of every part of our operations. Each is integral to how we do business, and how we each carry ourselves.

Privacy isn’t just our business; it’s the primary motivation upon which Secure Measure was founded. It’s the reason we love our work, and it’s what gives meaning to what we do. Defending the principles and virtues of privacy is vital for a free, thriving, and harmonious society – the value of which cannot be overstated. Partnering with people who are taking meaningful steps towards protecting the privacy of each individual that interacts with their organisation is why we get up each morning.

Secure Measure works to industry standards and benchmarks to ensure everything we do is measurable, auditable, and justified. Although those frameworks provide guidance, nothing can replace experience. Secure Measure’s founders are veterans of the Information Technology industry, and this experience is not only demonstrable in our work, but by reliably having your organisations back time and time again. We aim for greatness in everything we do, so you can be great at everything you do. We are committed to fundamentally helping the organisations with whom we partner.

Information Technology is the tool of our trade. Every product and service we provide is streamlined by the automation of manual processes and tooling. Our competitive advantage is providing your organisation maximum value from data security investments, ultimately resulting in new revenue opportunities for your organisation long term. We achieve this by developing mature capabilities your organisation can adopt today, leveraging our experience in providing holistic, strategic and profit generating technologies that effectively address risks to your overall success.

From the boardroom to the wider community, every organisation is made up of people with a story. Data Security is about protecting those people from the implications of cybercrime. That’s why we focus on partnering with people for healthy, productive, and long-term professional relationships. It’s taken decades to build up a network of people we trust and respect, so we know when we work together for our customers, our people first cultures are aligned.

Everything we do we do in a way our customers can track in real value terms. We never want our customers to have a vague sense of value. We want to support them in their organisations, so they can justify to their stakeholders why their investments in security and privacy are paying off. We consistently prove that in this day and age, implementing sound security and privacy principles within any organisation that depends on and holds sensitive data, will make that organisation more effective that their competitors. Often that isn’t intuitive to our clients, so it’s important that we demonstrate this with data.

Our business is as advertised; we help organisations address privacy and data security; simple as that. All of our products and services serve that purpose alone, and so it’s important that we operate in a way that keeps us in business. Accordingly, Secure Measure does not and will never profit from any of our client data or analytics being sold to any third party under any circumstances. That means full transparency as to how we operate and why we’re in business. Our contracts are simple and clear. We make organisations better members of their communities by helping them protect their customers, partners and the broader community’s privacy interests.

Frequently Asked Questions

We’re happy to talk through any questions you may have, and to help get you get the answers you need faster, here are some of the more common ones.

We can give you an indicative cost of the initial risk assessment process based on your answers to a detailed questionnaire. However, because there are so many variables, we can only cost the implementation of recommended solutions once we have completed the discovery process, analysed your risk profile and agreed a way forward with you. However, be assured that we will not incur costs on your behalf without your say-so and we will only recommend and implement solutions fitted to your needs. You won’t be over-sold if you come to us.

Typically, we go through the detailed discovery process before committing to timelines for solution implementation. The time needed to undertake the discovery and risk assessment process, will depend on the complexity of your business and when you can provide us with full access to your systems. Typically, this process can be completed in weeks, not months. As soon as we have gathered and analysed all the evidence on your specific business and security situation, we can start improving your security from day one.

All we need from you during our initial discovery conversations and gap analysis, is transparency and access to your business systems. We always recommend that your key IT staff be involved in this process, in order to feel ownership towards and a vested interest in the final implemented solutions. However, this need not be a time-consuming exercise for your business, and staff can be involved as little or as much as you choose. Throughout the discovery process, we will be uncovering the underlying nature of your security needs and suggesting possible paths towards remediation.

We go about our work without interruption to your business operations and workflows, throughout all stages of our security analysis and implementations. We know how important it is to maintain productivity – indeed that is what many of our solutions are aimed at.

You have our guarantee that we will treat all your business information with absolute confidence. None of our people would have progressed to this stage in their careers without a commitment to client confidentiality. In addition, we always propose signing a mutual confidentiality agreement, which helps to instil confidence – particularly in your legal and governance department! The testimonials from our customers are further proof of our expertise and honesty. In addition, we are fully transparent and communicative throughout our relations with our clients – after all, this is all about partnering with you to secure and improve your business for the long term.

You’ll be benefiting from improved security almost immediately, because we’ll be discussing remediation measures with your team, even throughout the discovery process. Secure Measure will augment your own internal capabilities and bring proven specialists to the table. We’ll help you implement the appropriate mechanisms to reduce your risk profile, and evolve these to deal with future challenges. We do this without interrupting your business operations and without trying to sell you superfluous boxes or services. Your IT staff will be freed from firefighting security problems, to concentrate on value-adding to the business, and all your employees will benefit from greater application uptime. Overall, we believe you will gain a competitive advantage through increased productivity and innovation, improved market rankings and a confident employee culture.

If you have any more questions, we’d love to hear from you. Connect with us and begin your process of improvement.

CONNECT

Frequently Asked Questions

We’re happy to talk through any questions you may have, and to help get you get the answers you need faster, here are some of the more common ones.

We can give you an indicative cost of the initial risk assessment process based on your answers to a detailed questionnaire. However, because there are so many variables, we can only cost the implementation of recommended solutions once we have completed the discovery process, analysed your risk profile and agreed a way forward with you. However, be assured that we will not incur costs on your behalf without your say-so and we will only recommend and implement solutions fitted to your needs. You won’t be over-sold if you come to us.

Typically, we go through the detailed discovery process before committing to timelines for solution implementation. The time needed to undertake the discovery and risk assessment process, will depend on the complexity of your business and when you can provide us with full access to your systems. Typically, this process can be completed in weeks, not months. As soon as we have gathered and analysed all the evidence on your specific business and security situation, we can start improving your security from day one.

All we need from you during our initial discovery conversations and gap analysis, is transparency and access to your business systems. We always recommend that your key IT staff be involved in this process, in order to feel ownership towards and a vested interest in the final implemented solutions. However, this need not be a time-consuming exercise for your business, and staff can be involved as little or as much as you choose. Throughout the discovery process, we will be uncovering the underlying nature of your security needs and suggesting possible paths towards remediation.

We go about our work without interruption to your business operations and workflows, throughout all stages of our security analysis and implementations. We know how important it is to maintain productivity – indeed that is what many of our solutions are aimed at.

You have our guarantee that we will treat all your business information with absolute confidence. None of our people would have progressed to this stage in their careers without a commitment to client confidentiality. In addition, we always propose signing a mutual confidentiality agreement, which helps to instil confidence – particularly in your legal and governance department! The testimonials from our customers are further proof of our expertise and honesty. In addition, we are fully transparent and communicative throughout our relations with our clients – after all, this is all about partnering with you to secure and improve your business for the long term.

You’ll be benefiting from improved security almost immediately, because we’ll be discussing remediation measures with your team, even throughout the discovery process. Secure Measure will augment your own internal capabilities and bring proven specialists to the table. We’ll help you implement the appropriate mechanisms to reduce your risk profile, and evolve these to deal with future challenges. We do this without interrupting your business operations and without trying to sell you superfluous boxes or services. Your IT staff will be freed from firefighting security problems, to concentrate on value-adding to the business, and all your employees will benefit from greater application uptime. Overall, we believe you will gain a competitive advantage through increased productivity and innovation, improved market rankings and a confident employee culture.

If you have any more questions, we’d love to hear from you. Connect with us and begin your process of improvement.

CONNECT

Join us for Alerts & Updates

(We do not share your data, and only use it for its intended purpose)

Join us for Alerts & Updates

(We do not share your data, and only use it for its intended purpose)