World Map


Foregenix are global specialists
in digital forensics and information security

From our headquarters in the United Kingdom and offices in North America, Germany, South Africa and Latin America, we offer a global service delivery capability serving clients in all corners of the world

Download the Guide to Incident Response Planning Plan while you still have time.
Access our experience to prepare for rapid response and incident containment.



Built on a solid reputation of trust and reliability, Foregenix are forerunners in information security; simplifying the compliance process and ensuring payment environments are secure.


Learn More

Digital Forensics & Incident Response

✔ Forensic Investigations
✔ PFI & PFI Lites
✔ Incident Response Planning
Learn More

Penetration Testing

✔ Network Penetration Testing
✔ Mobile App Testing
✔ Application Penetration Testing
Learn More

Baked-In Security

After investigating some of the biggest breaches in the world, we have developed a range of cyber security solutions. Simple, effective and low maintenance, our security solutions "Bake Security In" to our clients' businesses - taking care of the dangers of cyber security, so you can get on with your day to day.

Website Security: FGX-Web

✔ 360° Website Protection
✔ Specialist Website Security Support
✔ FGX-Web Protect and Managed Services options
Learn More

POS Security: FGX-Store

✔ Serengeti 
✔ FScout Data Discovery
✔ Managed Firewall 
Learn More

Has your business been hacked?

If you suspect that your systems have been compromised in any way,
or if you'd like us to perform an urgent audit,
please call us immediately:

Or email us via:

Foregenix Recent Blogs

Encryption 102: 5 Methods of Encryption (Part 2)

Following on from Encryption 101, this post will focus on different methods of Encryption, when they're applicable and why they are important.  Why should I encrypt? If someone gets access to your sensitive data, you don't want them to see that data in clear text or in a usable format. You want them to see an encrypted mess like the following: EnCt2a44c4574a6ad10161e52415457d42af23f940ca9a44c4574a6ad10161e5241545M9wv1Mc5gAlgxUoCVh0y8zVUnDE4g9vIwEmS On the other hand, you want...Learn More