It is accepted best practice for organisations to carry out annual manual penetration testing of internet-facing infrastructure and internal network systems. This can be driven by compliance requirements (PCI DSS, Code of Connection, FSA or Data Protection Act), customer/supplier stipulations, or an understanding of how security holes can translate into significant business risk.
Vulnerability Management (VM) and Response is the process of taking your current manual penetration testing program to the next level of readiness. Implementing a Vulnerability Management program within your enterprise is critical to a strong security posture, since your organisation could meet security requirements today and yet be compromised tomorrow.
Securing your organisation’s IT infrastructure and information assets is a resource-intensive task: performing automated scans to supplement your manual penetration testing program is an effective way to mitigate business risk from newly discovered security vulnerabilities.
CST provide options alongside training courses and support services to help mitigate risk. Our approach from identifying vulnerabilities to monitoring and enhancing your security solution in tandem with cohesive policy compliance, help to reduce costs and streamline operations.
Recommended Solutions 1 - 11 of 11
|Cyber Essentials Scheme (UK Government)|
The UK Government's Cyber Essentials Scheme provides a set of five controls that organisations can implement to achieve a baseline of cyber security, against which they can achieve certification in order to prove their compliance.
|Cyber Essentials Scheme Webex Intro|
We recognise that not everyone has the necessary resources to address the business-critical issue of cyber security. Join us for an informative 30 minute WebEx to introduce you to the Cyber Essentials Scheme.
|HEAT Security Configuration Management|
HEAT Software (Lumension) Security Configuration Management provides out-of-the-box regulatory, standards-based assessment and industry best practices templates to ensure endpoints and applications are properly configured.
|LogRhythm Log Management Assessment|
LogRhythm and CST provide a customised report indicating your organisation's level of security intelligence capability in relation to managing today's threats.
|Penetration Test & Security Assessment|
One of the key steps to measure Operational Risk is the need to identify network vulnerabilities. Pen testing and security assessments are ideal tools to improve an organisation's security posture.
|Qualys Cloud Platform Suite|
Qualys' on demand approach to IT security and compliance enables organisations of all sizes to successfully achieve both vulnerability management and policy compliance initiatives cohesively, while reducing costs and streamlining operations.
|Splunk PCI Log Auditing & Compliance|
Splunk is a versatile and comprehensive data analysis toolkit. By creating PCI specific searches, filters and reports, we have created a cost effective log collection and analysis tool that helps you meet all of the relevant PCI logging requirements including file integrity assessment.
|Symantec Data Centre Security|
Cyber threats continue to grow in magnitude, prevalence and complexity, hence relying on perimeter defence alone to safeguard high value servers or important data assets is a high risk strategy. Symantec Data Centre Security is designed to protect and control any and all actions that can be performed on your critical systems and data centres.
|Symantec DeepSight Alert Services|
Symantec DeepSight Alert Services provide early warning of potential security threats. Delivered via email, SMS, voice, fax, and a secure website, these alerts are designed to help your enterprise maintain business continuity and improve adherence to emerging security regulations.
|Tenable Nessus and SecurityCenter (with Continuous View)|
The Tenable solution provides vulnerability management by detecting and assessing all assets, vulnerabilities, and threats in your infrastructure.
|Thycotic Secret Server|
Thycotic Secret Server secures and manages privileged accounts. The type of accounts that if abused can have far reaching consequences; the kind of accounts that require specific management and extra controls.