CST

CST are best positioned to remove the mystery of safeguarding a business from IT security threats. Our goal is to provide pragmatic advice, augment resource gaps, and be a trusted adviser.

We would be happy to discuss your requirements over the phone or meet with you at your office.

Get started

Understanding the components that equate and comprise risk, is the first step to a risk management programme. An organisation can not eliminate all risk, but instead have to accept a level appropriate to their own particular operating needs.

Recommended Solutions 1 - 13 of 13

Active Directory Health Check

An Active Directory Health Check from 8MAN is a painless way of detecting potential security breaches. Conduct a detailed analysis of your Active Directory and file server environment.

Clearswift Information Governance Server

Clearswift Information Governance Server has the ability to track hundreds of thousands of documents and monitor billions of communication transactions.

Cyber Essentials Scheme (UK Government)

The UK Government's Cyber Essentials Scheme provides a set of five controls that organisations can implement to achieve a baseline of cyber security, against which they can achieve certification in order to prove their compliance.

LogRhythm Log Management Assessment

LogRhythm and CST provide a customised report indicating your organisation's level of security intelligence capability in relation to managing today's threats.

NETconsent Compliance Suite Policy Management

NETconsent policy management and communications software delivers a pro-active and sustainable approach to handling the policy management lifecycle and other associated documentation.

Penetration Test & Security Assessment

One of the key steps to measure Operational Risk is the need to identify network vulnerabilities. Pen testing and security assessments are ideal tools to improve an organisation's security posture.

Qualys Cloud Platform Suite

Qualys' on demand approach to IT security and compliance enables organisations of all sizes to successfully achieve both vulnerability management and policy compliance initiatives cohesively, while reducing costs and streamlining operations.

Soliton MobiControl Mobile Device and Application Management

MobiControl is a comprehensive enterprise mobility solution for managing your entire fleet of mobile assets across all operating systems. The centralised, web-based management console provides total visibility and full control of your corporate, shared and personally owned mobile devices.

Splunk PCI Log Auditing & Compliance

Splunk is a versatile and comprehensive data analysis toolkit. By creating PCI specific searches, filters and reports, we have created a cost effective log collection and analysis tool that helps you meet all of the relevant PCI logging requirements including file integrity assessment.

Symantec Control Compliance Suite

Symantec Control Compliance Suite (CCS) delivers business-aware security and risk visibility so that customers are effectively able to align priorities across security, IT operations, and compliance.

Symantec Managed Cyber Security Services

Some of the biggest names in the film and gaming industry have recently made headline news because of a targeted cyber attack, Symantec Managed Cyber Security Services limits the costs of business disruption and data loss by reducing exposure to threats while delivering significant business advantages and lower overall costs.

Thycotic Privilege Manager for Windows

Thycotic Privilege Manager for Windows provides privileged account passwords for domain admin accounts, root accounts, and super-user accounts are the preferred targets for hackers these days.

Thycotic Secret Server

Thycotic Secret Server secures and manages privileged accounts. The type of accounts that if abused can have far reaching consequences; the kind of accounts that require specific management and extra controls.