CST provide the guidance and support required to certify against the standard for the UK Government’s Cyber Essentials Scheme.
The UK Government Cyber Essentials Scheme provides a set of five controls that organisations can implement to achieve a baseline of cyber security, against which they can achieve certification in order to prove their compliance. Addressing these five topics and controls eliminate up to 80% of typical Cyber threats.
CST is registered by the IASME to assess and certify against the Cyber Essentials Scheme. CST are also licensed to advise on achieving Cyber Essentials certification, as well as deliver Cyber Essentials PLUS and the IASME governance assessment and certification. We have a number of recommended Cyber Defence options below to support a business achieving this posture.
Cyber Essentials solutions recommended:
|Cyber Essentials Scheme (UK Government)|
The UK Government's Cyber Essentials Scheme provides a set of five controls that organisations can implement to achieve a baseline of cyber security, against which they can achieve certification in order to prove their compliance.
|Cyber Security FAQs|
There are many scenarios regarding cyber threats that pose many questions as to the best defence, the best response, and best way to manage Cyber Security. CST specialise in Cyber Security, and can help answer these questions.
|CyberV Cyber Resilience Assessment|
Leveraging the Symantec CyberV service, CST conduct cyber resilience assessments which measures defences against 20 factors that best practices recommend. Cyber Security is gaining recognition as an important subject that needs addressing as a matter of priority.
|HEAT Endpoint Security Device Control|
HEAT Software (Lumension) Endpoint Security Device Control is an endpoint policy enforcement solution that stops security breaches before they can even start.
|HEAT Security Configuration Management|
HEAT Software (Lumension) Security Configuration Management provides out-of-the-box regulatory, standards-based assessment and industry best practices templates to ensure endpoints and applications are properly configured.
|LogRhythm Log Management Assessment|
LogRhythm and CST provide a customised report indicating your organisation's level of security intelligence capability in relation to managing today's threats.
|Penetration Test & Security Assessment|
One of the key steps to measure Operational Risk is the need to identify network vulnerabilities. Pen testing and security assessments are ideal tools to improve an organisation's security posture.
|Symantec Endpoint Protection|
Symantec Endpoint Protection multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.
|Symantec Managed Cyber Security Services|
Some of the biggest names in the film and gaming industry have recently made headline news because of a targeted cyber attack, Symantec Managed Cyber Security Services limits the costs of business disruption and data loss by reducing exposure to threats while delivering significant business advantages and lower overall costs.
|Tenable Nessus and SecurityCenter (with Continuous View)|
The Tenable solution provides vulnerability management by detecting and assessing all assets, vulnerabilities, and threats in your infrastructure.
|Thycotic Secret Server|
Thycotic Secret Server secures and manages privileged accounts. The type of accounts that if abused can have far reaching consequences; the kind of accounts that require specific management and extra controls.