CST provide the guidance and support required to certify against the standard for the UK Government’s Cyber Essentials Scheme.
CST was patient and always available to answer questions, no matter how big or small. The preliminary review of the questionnaire was key to helping us pass the assessment. CST was quick to respond to any queries, and turn around the application. We qualified within a week.
The UK Government Cyber Essentials Scheme provides a set of five controls that organisations can implement to achieve a baseline of cyber security, against which they can achieve certification in order to prove their compliance. Addressing these five topics and controls eliminate up to 80% of typical Cyber threats.
CST is registered by the IASME to assess and certify against the Cyber Essentials Scheme. CST are also licensed to advise on achieving Cyber Essentials certification, as well as deliver Cyber Essentials PLUS and the IASME governance assessment and certification. We have a number of recommended Cyber Defence options below to support a business achieving this posture.
Cyber Essentials solutions recommended:
|Cloud-Based Vulnerability Management Webinar|
Join us for a 45 minute webinar to introduce this new Tenable cloud-based platform. With increasing threats and a constantly changing IT landscape, it's more challenging than ever to keep up with identifying vulnerabilities and, more importantly, fix them
|Cyber Essentials Scheme (UK Government)|
The UK Government's Cyber Essentials Scheme provides a set of five controls that organisations can implement to achieve a baseline of cyber security, against which they can achieve certification in order to prove their compliance.
|Cyber Essentials Scheme Webinar|
We recognise that not everyone has the necessary resources to address the business-critical issue of cyber security. Join us for an informative 30 minute WebEx to introduce you to the Cyber Essentials Scheme.
|Cyber Security Awareness Training|
The course is designed for the typical staff member of any organisation to help them identify common cyber threats. Despite heavy investment in cyber defence solutions and technology, businesses are still suffering due to the increasing success of phishing attacks.
|Cyber Security FAQs|
There are many scenarios regarding cyber threats that pose many questions as to the best defence, the best response, and best way to manage Cyber Security. CST specialise in Cyber Security, and can help answer these questions.
|Cyber Security Threats Explained|
Watch a short 3 minute video on what CST has to say about cyber security threats and what we are seeing out in the industry today.
|Endpoint Management & Security Suite Webinar|
Join us for a 1 hour WebEx to discover how EMSS can work in your environment to offer 'Total Endpoint Security'
|Ivanti Configuration Management|
Ivanti (Lumension) Security Configuration Management provides out-of-the-box regulatory, standards-based assessment and industry best practices templates to ensure endpoints and applications are properly configured.
|Ivanti Endpoint Security Device Control|
Ivanti (Lumension) Endpoint Security Device Control is an endpoint policy enforcement solution that stops security breaches before they can even start.
|Ivanti Patch for Endpoint Manager Webinar|
Enable comprehensive patch management across your enterprise with Ivanti Patch for Endpoint Manager
|LogRhythm Log Management Assessment|
LogRhythm and CST provide a customised report indicating your organisation's level of security intelligence capability in relation to managing today's threats.
|Penetration Test & Security Assessment|
One of the key steps to measure Operational Risk is the need to identify network vulnerabilities. Pen testing and security assessments are ideal tools to improve an organisation's security posture.
|Security Information and Event Management Webinar|
Are you 100% sure that you would know that your organisation had been breached, would you know if you were being attacked? Could you quickly understand how, when and where?
|Symantec Advanced Threat Protection|
Symantec Advanced Threat Protection is a Detection and Response (EDR) solution designed to protect you against the type of threats where traditional security solutions or anti-malware scanning cannot.
|Symantec Endpoint Protection Webinar|
Join us for an informative 60 minute WebEx to introduce the key features and technologies that make Symantec Endpoint Protection 14 a game changing approach to endpoint security.
|Symantec Endpoint Protection|
Symantec Endpoint Protection multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.
|Symantec Managed Cyber Security Services|
Some of the biggest names in the film and gaming industry have recently made headline news because of a targeted cyber attack, Symantec Managed Cyber Security Services limits the costs of business disruption and data loss by reducing exposure to threats while delivering significant business advantages and lower overall costs.
|Thycotic Secret Server|
Thycotic Secret Server secures and manages privileged accounts. The type of accounts that if abused can have far reaching consequences; the kind of accounts that require specific management and extra controls.
|Webroot Next Generation Endpoint Security|
Webroot Next Generation Endpoint Security is a smarter approach where traditional security relies on outdated signatures and can't keep up with zero-day attacks.