CST

CST are best positioned to remove the mystery of safeguarding a business from IT security threats. Our goal is to provide pragmatic advice, augment resource gaps, and be a trusted adviser.

We would be happy to discuss your requirements over the phone or meet with you at your office.

Get started

Cyber Essentials

CST provide the guidance and support required to certify against the standard for the UK Government’s Cyber Essentials Scheme.

Cyber Essentials Scheme

Cyber Essentials Scheme

The UK Government Cyber Essentials Scheme provides a set of five controls that organisations can implement to achieve a baseline of cyber security, against which they can achieve certification in order to prove their compliance. Addressing these five topics and controls eliminate up to 80% of typical Cyber threats.

Cyber Essentials Certification

CST is registered by the IASME to assess and certify against the Cyber Essentials Scheme. CST are also licensed to advise on achieving Cyber Essentials certification, as well as deliver Cyber Essentials PLUS and the IASME governance assessment and certification. We have a number of recommended Cyber Defence options below to support a business achieving this posture.

Cyber Essentials solutions recommended:

Cyber Essentials Scheme (UK Government)

The UK Government's Cyber Essentials Scheme provides a set of five controls that organisations can implement to achieve a baseline of cyber security, against which they can achieve certification in order to prove their compliance.

Cyber Essentials Scheme Webex Intro

We recognise that not everyone has the necessary resources to address the business-critical issue of cyber security. Join us for an informative 30 minute WebEx to introduce you to the Cyber Essentials Scheme.

Cyber Security FAQs

There are many scenarios regarding cyber threats that pose many questions as to the best defence, the best response, and best way to manage Cyber Security. CST specialise in Cyber Security, and can help answer these questions.

CyberV Cyber Resilience Assessment

Leveraging the Symantec CyberV service, CST conduct cyber resilience assessments which measures defences against 20 factors that best practices recommend. Cyber Security is gaining recognition as an important subject that needs addressing as a matter of priority.

HEAT Endpoint Security Device Control

HEAT Software (Lumension) Endpoint Security Device Control is an endpoint policy enforcement solution that stops security breaches before they can even start.

HEAT Security Configuration Management

HEAT Software (Lumension) Security Configuration Management provides out-of-the-box regulatory, standards-based assessment and industry best practices templates to ensure endpoints and applications are properly configured.

LogRhythm Log Management Assessment

LogRhythm and CST provide a customised report indicating your organisation's level of security intelligence capability in relation to managing today's threats.

Penetration Test & Security Assessment

One of the key steps to measure Operational Risk is the need to identify network vulnerabilities. Pen testing and security assessments are ideal tools to improve an organisation's security posture.

Symantec Endpoint Protection

Symantec Endpoint Protection multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.

Symantec Managed Cyber Security Services

Some of the biggest names in the film and gaming industry have recently made headline news because of a targeted cyber attack, Symantec Managed Cyber Security Services limits the costs of business disruption and data loss by reducing exposure to threats while delivering significant business advantages and lower overall costs.

Tenable Nessus and SecurityCenter (with Continuous View)

The Tenable solution provides vulnerability management by detecting and assessing all assets, vulnerabilities, and threats in your infrastructure.

Thycotic Secret Server

Thycotic Secret Server secures and manages privileged accounts. The type of accounts that if abused can have far reaching consequences; the kind of accounts that require specific management and extra controls.