CST

Call us on +44 (0)20 7621 7836 LinkedInTwitter

Call +44 (0)20 7621 7836 LinkedInTwitter

Cyber DefenceCyber Security and Defence

Last year was proof that no industry is safe from the possibility of a cyber attack. The key to a successful cyber defence strategy is preparation.

Cyber defence is the protection of your organisation’s environment (and ultimately data) from the security threats posed by you being connected to the Internet. CST addresses key questions such as:

How do I minimise internet threats gaining access to my environment?

In essence, how do we prevent the bad stuff getting in and more importantly, how do we prevent the bad stuff being successful in stealing our data. In addition, we ask:

When a breach occurs, how do I understand the what, when and how?

Specifically, how do we quickly and efficiently detect if a breach has broken through. By addressing these key areas of prevent and detect, you will not only reduce the chances of a breach occurring but also be perfectly positioned to act should the worst happen.

Cyber Defence solutions recommended:

Advanced Threat Protection (ATP) Webinar

Join us for an informative 60 minute WebEx and discover Symantec Advanced Threat Protection. SAP combines global telemetry, and cloud based analytics from one of the world's largest cyber intelligence networks (the largest non-state military) with local customer context across endpoints, networks and email, to uncover attacks that would otherwise evade detection.

Clearswift ARgon for Email

Clearswift ARgon for Email adds an extra layer of security to an organisation's information security system.

Clearswift Critical Information Protection Management Server & Agent

Clearswift Critical Information Protection Management Server & Agent supports device control, deep content inspection, remediation actions, encryption and comprehensive auditing.

Clearswift DLP For Beginners Guide

From physical security of printed information such as printed board papers and computer systems, through to blanket information encryption in various forms and then to content aware DLP, it can feel like a minefield.

Clearswift Information Governance Server

Clearswift Information Governance Server has the ability to track hundreds of thousands of documents and monitor billions of communication transactions.

Clearswift SECURE Email Gateway

Clearswift SECURE Email Gateway offers inbound threat protection, a multi-layer spam defence mechanism and deep content inspection control on size and types of attachments.

Clearswift SECURE Exchange Gateway

Clearswift SECURE Exchange Gateway safeguards against inappropriate content being internally communicated, supporting both organisational policy and compliance requirements.

Clearswift SECURE ICAP Gateway

Clearswift SECURE ICAP Gateway enables organisations to apply deep content inspection, adaptive redaction and data loss prevention technologies to existing web security architectures.

Clearswift SECURE Web Gateway

Clearswift SECURE Web Gateway offers a proactive policy controlled web gateway solution, with structured policies to categorise and define where, when and for how long users are able to surf for.

Cloud Security

Your on-premise data might be secure, but how does your Cloud security measure up? Implementing lock-down methods for both is key to ensure your data remains safe.

Cyber Essentials Scheme (UK Government)

The UK Government's Cyber Essentials Scheme provides a set of five controls that organisations can implement to achieve a baseline of cyber security, against which they can achieve certification in order to prove their compliance.

CyberV Cyber Resilience Assessment

Leveraging the Symantec CyberV service, CST conduct cyber resilience assessments which measures defences against 20 factors that best practices recommend. Cyber Security is gaining recognition as an important subject that needs addressing as a matter of priority.

HID ActivID AAA Server for Remote Access

ActivID AAA Server for Remote Access provides multi-factor authentication, authorisation and accounting (AAA) of remote users. It ensures organisations can trust user identities and grant appropriate access to remote networks and applications.

HID ActivID Credential Management System

The solution can issue an authentication credential that goes beyond perimeter security. A smart card or smart token can be used to secure access to individual workstations and servers within the firewall, as well as securing VPN and other remote access use cases.

IT Shadow Risk Assessment

Register for the shadow IT risk assessment by Symantec to analyse your Cloud security vulnerabilities. You can also request a 45 minute webinar to discover how Symantec DLP and CASB can safeguard your entire data estate - wherever itís stored.

Ivanti Application Control

Ivanti (Lumension) Application Control preserves the security of your environment while dramatically minimising the inherent risks of downloading or installing new applications.

Ivanti Configuration Management

Ivanti (Lumension) Security Configuration Management provides out-of-the-box regulatory, standards-based assessment and industry best practices templates to ensure endpoints and applications are properly configured.

LogRhythm Log Management Assessment

LogRhythm and CST provide a customised report indicating your organisation's level of security intelligence capability in relation to managing today's threats.

Penetration Test & Security Assessment

One of the key steps to measure Operational Risk is the need to identify network vulnerabilities. Pen testing and security assessments are ideal tools to improve an organisation's security posture.

Qualys Cloud Platform Suite

Qualys' on demand approach to IT security and compliance enables organisations of all sizes to successfully achieve both vulnerability management and policy compliance initiatives cohesively, while reducing costs and streamlining operations.

Splunk PCI Log Auditing & Compliance

Splunk is a versatile and comprehensive data analysis toolkit. By creating PCI specific searches, filters and reports, we have created a cost effective log collection and analysis tool that helps you meet all of the relevant PCI logging requirements including file integrity assessment.

Symantec Advanced Threat Protection

Symantec Advanced Threat Protection is a Detection and Response (EDR) solution designed to protect you against the type of threats where traditional security solutions or anti-malware scanning cannot.

Symantec Control Compliance Suite

Symantec Control Compliance Suite (CCS) delivers business-aware security and risk visibility so that customers are effectively able to align priorities across security, IT operations, and compliance.

Symantec Data Centre Security

Cyber threats continue to grow in magnitude, prevalence and complexity, hence relying on perimeter defence alone to safeguard high value servers or important data assets is a high risk strategy. Symantec Data Centre Security is designed to protect and control any and all actions that can be performed on your critical systems and data centres.

Symantec DeepSight Alert Services

Symantec DeepSight Alert Services provide early warning of potential security threats. Delivered via email, SMS, voice, fax, and a secure website, these alerts are designed to help your enterprise maintain business continuity and improve adherence to emerging security regulations.

Symantec Endpoint Protection

Symantec Endpoint Protection multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange combines Symantec antimalware technology with advanced heuristics to provide real-time email protection against viruses, spyware, phishing, and other malicious attacks while enforcing content filtering policies on Microsoft Exchange Server 2007, 2010, and 2013.

Symantec Managed Cyber Security Services

Some of the biggest names in the film and gaming industry have recently made headline news because of a targeted cyber attack, Symantec Managed Cyber Security Services limits the costs of business disruption and data loss by reducing exposure to threats while delivering significant business advantages and lower overall costs.

Symantec Protection Engine

Protection Engine for Network Attached Storage provides increased scanning performance and improved detection capabilities for protection against multi-blended threats.

Symantec Web Security Service (WSS)

Symantec WSS is a cloud delivered solution that safeguards your staff from Cyber risks when using the Internet. Allows user to access web resources and be protected from Cyber risks, as well as enforcing policies about how staff are permitted to access the Web.

Symantec Web Security.cloud & Email Security.cloud

CST provide Symantec Web and Email Security cloud protection which detect threats, control access and protect users anywhere, whilst safeguarding cloud-based email with threat and anti-spam protection for Office 365, Google Apps, and more.

Symantec.cloud Managed Services with Healthcheck

CST add value to our Symantec.cloud customers to ensure you receive the most from your Symantec.cloud investment. All new customers benefit from a service healthcheck - this to ensure your setup and features of the .cloud Services being utilised to their best ability.

Webroot Next Generation Endpoint Security

Webroot Next Generation Endpoint Security is a smarter approach where traditional security relies on outdated signatures and can't keep up with zero-day attacks.