Services Framework AI Security About Insights Subscribe
NIST CSF 2.0 Aligned  |  Kodi Limited

Securing Your Digital Future with Intelligence

Elite cybersecurity services across Identity, Data, Endpoint, Network, and Application domains — powered by AI-driven threat intelligence and NIST framework precision.

10+
Years Experience
500+
Clients Protected
99.8%
Threat Detection Rate
24/7
SOC Monitoring
NIST Cybersecurity Framework 2.0

Our Operational Foundation

Every engagement is structured around the NIST CSF — a proven, risk-based methodology trusted by governments and enterprises worldwide.

🛡️

NIST CSF 2.0 provides a flexible, repeatable framework to manage and reduce cybersecurity risk. Kodi Limited maps every service offering to one or more NIST functions, ensuring comprehensive, gap-free protection for your organisation.

Function 01

Govern

Establish and monitor your organisation's cybersecurity risk management strategy, expectations, and policy.

Function 02

Identify

Understand your assets, business context, and cybersecurity risks to prioritise protection efforts.

Function 03

Protect

Implement safeguards to ensure delivery of critical services and limit or contain the impact of an event.

Function 04

Detect

Develop and implement activities to identify the occurrence of a cybersecurity event in real time.

Function 05

Respond & Recover

Execute response plans, communicate with stakeholders, and restore capabilities after an incident.

Core Service Areas

Comprehensive Security Coverage

Five critical domains — fully covered. From zero-trust identity to AI-powered application defence.

🪪

Identity Security

Zero-trust identity architecture, privileged access management, MFA, and identity governance to ensure the right people access the right resources — nothing more.

Zero Trust PAM MFA / SSO IGA CIAM
🗄️

Data Security

Data classification, DLP, encryption at rest and in transit, rights management, and cloud data governance to protect your most valuable asset from exfiltration.

DLP Encryption DSPM IRM GDPR / ISO 27001
💻

Endpoint Security

EDR / XDR deployment, device hardening, patch management, and AI-powered behavioural analysis to stop threats before they escalate across your fleet.

EDR / XDR MDM Patch Mgmt BYOD Policy
🌐

Network Security

Next-gen firewall management, micro-segmentation, SASE architecture, secure SD-WAN, and 24/7 network traffic analysis with threat correlation.

NGFW SASE / SD-WAN IDS / IPS DNS Security
⚙️

Application Security

Secure SDLC, DAST / SAST, API security, WAF implementation, and DevSecOps integration to bake security into every line of code and every deployment.

DevSecOps SAST / DAST WAF API Security OWASP
🔎

Security Operations

Managed SOC, SIEM tuning, threat hunting, IR planning, and dark web monitoring — our analysts work around the clock so your team doesn't have to.

SOC-as-a-Service SIEM Threat Hunting SOAR
Artificial Intelligence in Cybersecurity

AI-Powered
Threat Defence

The threat landscape evolves at machine speed. So does our defence. We leverage cutting-edge AI across the entire security lifecycle.

🤖 Agentic AI SOC

AI agents autonomously triage, investigate, and respond to alerts — reducing MTTR by up to 85%.

🧠 LLM Threat Intel

Large language models synthesise global threat feeds into actionable intelligence briefings in real time.

📊 Behavioural Analytics

UEBA powered by deep-learning detects insider threats and anomalous patterns invisible to rule-based tools.

🛡️ AI Red Teaming

Adversarial AI simulates sophisticated attacks to expose vulnerabilities before real attackers do.

🔐 AI in Identity

Continuous authentication and risk-adaptive access using biometric and contextual AI signals.

⚠️ AI Risk Scoring

Dynamic risk scores for users, devices, and assets — prioritising response resources automatically.

🤖
🛡️
🔍
📡
🔐
🧠
Leadership
👩‍💼

Deepa Malviya

Founder & Director

A seasoned cybersecurity leader with over a decade of hands-on expertise protecting enterprise environments.

🏅 CISSP Certified Professional
🏅 CISM — Information Security Manager
🏅 CEH — Ethical Hacker
🏅 ISO 27001 Lead Implementer
📅 10+ Years in Cybersecurity

Defending Organisations at Every Layer

Deepa Malviya founded Kodi Limited with a clear mission: to make enterprise-grade cybersecurity accessible, intelligence-led, and genuinely transformative for organisations of every size.

With over 10 years of hands-on experience spanning financial services, healthcare, critical infrastructure, and technology sectors, Deepa has built a reputation as a trusted advisor who speaks both the language of the boardroom and the technical trenches of the SOC.

Her approach fuses rigorous NIST framework governance with the agility of AI-powered tooling — creating security programmes that are resilient today and adaptive for tomorrow's threat landscape, including the rapidly evolving challenges of AI-powered adversaries.

Featured speaker at Black Hat, RSA Conference, and InfoSecurity Europe. Advisory board member for the UK Cyber Security Council.

Identity & Access Management
Cloud Security Architecture
Zero Trust Implementation
AI / ML Threat Detection
Incident Response Leadership
GRC & Compliance
Security Awareness Training
Executive Risk Advisory
Intelligence Hub

Latest Security Insights

Exclusive research, threat intelligence, and AI security briefings. Approved subscribers get full access.

🤖
AI Security

Generative AI as an Attack Vector: What CISOs Need to Know in 2025

How threat actors are weaponising LLMs for phishing, deepfakes, and automated reconnaissance — and how to build defences.

Mar 2025 🔒 Subscribers Only
🪪
Identity Security

The End of Passwords: Passkeys, FIDO2, and the Road Ahead

A deep dive into passwordless authentication frameworks and the identity architecture required to support them at enterprise scale.

Feb 2025 🔒 Subscribers Only
Threat Intelligence

Ransomware-as-a-Service 3.0: How Affiliate Models Are Evolving

Our analysts track the latest RaaS ecosystem changes and what organisations must do to harden their ransomware resilience.

Jan 2025 🔒 Subscribers Only
🌐
Network Security

SASE Adoption in 2025: Lessons from 100 Enterprise Deployments

Real-world findings from our SASE implementation practice — common pitfalls, quick wins, and architectural best practices.

Dec 2024 🔒 Subscribers Only
🔐
Data Security

DSPM vs CASB: Choosing the Right Data Protection Approach for Cloud

A practical comparison of Data Security Posture Management and Cloud Access Security Broker capabilities for hybrid environments.

Nov 2024 🔒 Subscribers Only
🧠
AI & Zero Trust

Agentic AI in the SOC: A Practical Guide to Autonomous Threat Response

How security teams are deploying AI agents for triage, investigation, and containment — with governance guardrails included.

Oct 2024 🔒 Subscribers Only
Director Portal

Subscription Approvals

Review and manage access requests to the Kodi Limited Intelligence Network. This panel is only visible to the Director.

👩‍💼

Director: Deepa Malviya

You have 3 pending subscription requests awaiting review. Approved members gain access to the full Kodi Limited Intelligence Hub.

Name Email Organisation Status Actions