Princes Risborough, BUCKINGHAMSHIRE
Glock Enterprises is a collection of consultants and technology partners that provide tools and consulting expertise to help organisations develop new applications while identifying and managing cyber risk.
9 customer reviews
Victoria Manning
Excellent mornings training bye bye paper records
Reviewed on Facebook
Dan Travis
My clients use IConsult and find it very effective.
Reviewed on Facebook
Usman Awan
Awesome application for skin specialists. A modren way of managing your patients and their respective consultations.
Reviewed on Facebook
Simon Ravichandran
The features in the latest update of iconsult really show what this system is capable of. The slick new tool for face mapping has speeded up my consultation process and enhanced the patient interaction. I'm also impressed by the reports you can pull up that give me really useful insights and analytic into my product useage. Five stars!! More...
Reviewed on Facebook
Ed Porter
I have been using iconsult in my clinic for 6 months now & am very impressed by what it offers. Not only is it an interactive consultation tool but also a great way to document treatments, securely.
Reviewed on Facebook
Jorge Zafra
iConsult and it's sister version Lite, are a great tool for all aesthetic practitioners, forget about paper, now you can focus on your consultation & treatments!
Reviewed on Facebook
Elle Carey
We all at The London School of Facial Aesthetics use and highly recommend Iconsult. It's beautiful, easy to use, secure and helps to keep our notes simple and in order. I'll never go back to paper!
Reviewed on Facebook
Sarah Louise Barker
Amazing software started with it just this afternoon in my clinic, so easy to use, no messy paperwork or missed contact details! Document exact treatment areas and lot numbers and always have accurate client photography! Highly recommend to all my Aesthetic Colleagues! More...
Reviewed on Facebook
Nicci Maasdorp
I have been using iConsult in my practice for a few months now. I can honestly say that it has transformed the way I see the patient journey. Before, I was using a combination of paper notes, photographs and a dental patient management system. Now, I can communicate effectively with patients using the iConsult consultation tool and store all of my information in one place. More so, patients are impressed and surprised that they have access to their records, meaning they can review their treatment results and notes. Richard himself is engaging and full of useful advice to help you grow your business. I feel I am not just a user of a software platform but rather part of the iConsult community. More...
Reviewed on Facebook
What makes a great website?
Think about the websites you use most frequently, with joy not dread.
I'll bet they have a clear purpose, are easy to navigate, with a simple design.
What questions might you ask a client when starting a new project?
1. :Purpose - why this project rather than any other?
2. Legacy - do you have to build on something that's already there or is this a brand new project.
3. Protecting personal information - are you capturing and processing personally identifiable information. What controls do you have in place to protect that data?
4. Skills and resources - what do you need from us. What do you want to keep in-house?
What do you love most about your job?
The chance to produce something that has immediate impact.
What inspired you to start your own business?
I'd spent most of my career as a divisional director for global companies. It's great to have a lot more control over what I do
Why should our clients choose you?
We find clients that get the most out of working with us are those that are looking for advice on best practise throughout the development and implementation of a project. We have a lot of experience of developing services in challenging markets.
Find and Manage IT Assets
Somewhere along the line, asset management became very “unsexy” compared to all of the other things we do in cybersecurity, yet everything we do relies on knowing which assets are in our environments. We like to call asset management the Toyota Camry of cybersecurity: it’s not as sexy as some of the bleeding edge technologies out there, but understanding the relationship between assets and our security policies is a fundamental and basic need.
Data Leakage Detection
Your enterprise’s sensitive information is already outside your network, and outside of your control. Your data could be exposed across the various layers of the internet, from the Surface Web to the Dark Web, or across countless unsecured connected devices. You could spend countless hours finding and analysing what is 'out there', or you could use an automated platform that instantly alerts you to your data leaks and digital threats, providing all the actionable information you'll need for remediation.
Startup Support
You might recognise this problem... You're a startup and have a great idea and a young, passionate team but you need some experience on the board to help with decisions about technology, marketing, data protection...anything concerned with taking your great idea, turning it into a Minimum Viable Product (without falling foul of data protection regulations) and getting it to market. Why not 'rent-a-CTO/CMO/DPO'? We'll find experienced executives to work with you and accelerate your digital business. We're flexible enough to work for equity, though we usually work on a mix of equity and a retainer.
Data Protection Healthcheck
Concerned about the GDPR? Looking for a Data Protection Officer? Want validation that your security controls are robust enough? Our Data Protection HealthCheck service is aimed at organisations that want to embed security into their business, whether validating existing or developing new applications and processes. Typical engagements: Produce a Privacy Impact Assessment (DPIA) to support GDPR requirements; Review and harden a healthcare application; Develop and launch a secure method of capturing memories...
Detect and Stop Breaches
Breaches are inevitable but you want to know when a breach occurs, and stop access to sensitive data. We implement and manage cyber deception platforms to detect, investigate, and contain attackers.