CST

Call us on +44 (0)20 7621 7836 LinkedInTwitter

Call +44 (0)20 7621 7836 LinkedInTwitter

Cyber DefenceCyber Security and Defence

Last year was proof that no industry is safe from the possibility of a cyber attack. The key to a successful cyber defence strategy is preparation.

Cyber defence is the protection of your organisation’s environment (and ultimately data) from the security threats posed by you being connected to the Internet. CST addresses key questions such as:

How do I minimise internet threats gaining access to my environment?

In essence, how do we prevent the bad stuff getting in and more importantly, how do we prevent the bad stuff being successful in stealing our data. In addition, we ask:

When a breach occurs, how do I understand the what, when and how?

Specifically, how do we quickly and efficiently detect if a breach has broken through. By addressing these key areas of prevent and detect, you will not only reduce the chances of a breach occurring but also be perfectly positioned to act should the worst happen.

Cyber Defence solutions recommended:

Advanced Threat Protection (ATP) Webinar

Join us for an informative 60 minute WebEx and discover Symantec Advanced Threat Protection. SAP combines global telemetry, and cloud based analytics from one of the world's largest cyber intelligence networks (the largest non-state military) with local customer context across endpoints, networks and email, to uncover attacks that would otherwise evade detection.

Clearswift ARgon for Email

Clearswift ARgon for Email adds an extra layer of security to an organisation's information security system.

Clearswift Critical Information Protection Management Server & Agent

Clearswift Critical Information Protection Management Server & Agent supports device control, deep content inspection, remediation actions, encryption and comprehensive auditing.

Clearswift DLP For Beginners Guide

From physical security of printed information such as printed board papers and computer systems, through to blanket information encryption in various forms and then to content aware DLP, it can feel like a minefield.

Clearswift Information Governance Server

Clearswift Information Governance Server has the ability to track hundreds of thousands of documents and monitor billions of communication transactions.

Clearswift SECURE Email Gateway

Clearswift SECURE Email Gateway offers inbound threat protection, a multi-layer spam defence mechanism and deep content inspection control on size and types of attachments.

Clearswift SECURE Exchange Gateway

Clearswift SECURE Exchange Gateway safeguards against inappropriate content being internally communicated, supporting both organisational policy and compliance requirements.

Clearswift SECURE ICAP Gateway

Clearswift SECURE ICAP Gateway enables organisations to apply deep content inspection, adaptive redaction and data loss prevention technologies to existing web security architectures.

Clearswift SECURE Web Gateway

Clearswift SECURE Web Gateway offers a proactive policy controlled web gateway solution, with structured policies to categorise and define where, when and for how long users are able to surf for.

Cloud-Based Vulnerability Management

Join us for a 45 minute webinar to introduce this new cloud-based platform. With increasing threats and a constantly changing IT landscape, it's more challenging than ever to keep up with identifying vulnerabilities and, more importantly, fix them

Cyber Essentials Scheme (UK Government)

The UK Government's Cyber Essentials Scheme provides a set of five controls that organisations can implement to achieve a baseline of cyber security, against which they can achieve certification in order to prove their compliance.

Cyber Essentials Scheme Webex Intro

We recognise that not everyone has the necessary resources to address the business-critical issue of cyber security. Join us for an informative 30 minute WebEx to introduce you to the Cyber Essentials Scheme.

Cyber Security FAQs

There are many scenarios regarding cyber threats that pose many questions as to the best defence, the best response, and best way to manage Cyber Security. CST specialise in Cyber Security, and can help answer these questions.

Cyber Security Threats Explained

Watch a short 3 minute video on what CST has to say about cyber security threats and what we are seeing out in the industry today.

CyberV Cyber Resilience Assessment

Leveraging the Symantec CyberV service, CST conduct cyber resilience assessments which measures defences against 20 factors that best practices recommend. Cyber Security is gaining recognition as an important subject that needs addressing as a matter of priority.

HID ActivID AAA Server for Remote Access

ActivID AAA Server for Remote Access provides multi-factor authentication, authorisation and accounting (AAA) of remote users. It ensures organisations can trust user identities and grant appropriate access to remote networks and applications.

HID ActivID Credential Management System

The solution can issue an authentication credential that goes beyond perimeter security. A smart card or smart token can be used to secure access to individual workstations and servers within the firewall, as well as securing VPN and other remote access use cases.

Ivanti Application Control

Ivanti (Lumension) Application Control preserves the security of your environment while dramatically minimising the inherent risks of downloading or installing new applications.

Ivanti Configuration Management

Ivanti (Lumension) Security Configuration Management provides out-of-the-box regulatory, standards-based assessment and industry best practices templates to ensure endpoints and applications are properly configured.

LogRhythm Log Management Assessment

LogRhythm and CST provide a customised report indicating your organisation's level of security intelligence capability in relation to managing today's threats.

Penetration Test & Security Assessment

One of the key steps to measure Operational Risk is the need to identify network vulnerabilities. Pen testing and security assessments are ideal tools to improve an organisation's security posture.

Qualys Cloud Platform Suite

Qualys' on demand approach to IT security and compliance enables organisations of all sizes to successfully achieve both vulnerability management and policy compliance initiatives cohesively, while reducing costs and streamlining operations.

Security Information and Event Management

Are you 100% sure that you would know that your organisation had been breached, would you know if you were being attacked? Could you quickly understand how, when and where?

Splunk PCI Log Auditing & Compliance

Splunk is a versatile and comprehensive data analysis toolkit. By creating PCI specific searches, filters and reports, we have created a cost effective log collection and analysis tool that helps you meet all of the relevant PCI logging requirements including file integrity assessment.

Symantec Advanced Threat Protection

Symantec Advanced Threat Protection is a Detection and Response (EDR) solution designed to protect you against the type of threats where traditional security solutions or anti-malware scanning cannot.

Symantec Blue Coat Advanced Web & Cloud Security

Symantec Blue Coat Advanced Web & Cloud Security will protect you against web and network-based threats, enable cloud data protection, and give you flexible business policy control across enterprise and cloud, including web, social and mobile networks.

Symantec Control Compliance Suite

Symantec Control Compliance Suite (CCS) delivers business-aware security and risk visibility so that customers are effectively able to align priorities across security, IT operations, and compliance.

Symantec Data Centre Security

Cyber threats continue to grow in magnitude, prevalence and complexity, hence relying on perimeter defence alone to safeguard high value servers or important data assets is a high risk strategy. Symantec Data Centre Security is designed to protect and control any and all actions that can be performed on your critical systems and data centres.

Symantec DeepSight Alert Services

Symantec DeepSight Alert Services provide early warning of potential security threats. Delivered via email, SMS, voice, fax, and a secure website, these alerts are designed to help your enterprise maintain business continuity and improve adherence to emerging security regulations.

Symantec Endpoint Protection Webinar

Join us for an informative 60 minute WebEx to introduce the key features and technologies that make Symantec Endpoint Protection 14 a game changing approach to endpoint security.

Symantec Endpoint Protection

Symantec Endpoint Protection multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange combines Symantec antimalware technology with advanced heuristics to provide real-time email protection against viruses, spyware, phishing, and other malicious attacks while enforcing content filtering policies on Microsoft Exchange Server 2007, 2010, and 2013.

Symantec Managed Cyber Security Services

Some of the biggest names in the film and gaming industry have recently made headline news because of a targeted cyber attack, Symantec Managed Cyber Security Services limits the costs of business disruption and data loss by reducing exposure to threats while delivering significant business advantages and lower overall costs.

Symantec Protection Engine

Protection Engine for Network Attached Storage provides increased scanning performance and improved detection capabilities for protection against multi-blended threats.

Symantec Web Security.cloud & Email Security.cloud

CST provide Symantec Web and Email Security cloud protection which detect threats, control access and protect users anywhere, whilst safeguarding cloud-based email with threat and anti-spam protection for Office 365, Google Apps, and more.

Tenable Nessus and SecurityCenter (with Continuous View)

The Tenable solution provides vulnerability management by detecting and assessing all assets, vulnerabilities, and threats in your infrastructure.

Webroot Next Generation Endpoint Security

Webroot Next Generation Endpoint Security is a smarter approach where traditional security relies on outdated signatures and can't keep up with zero-day attacks.