CST Acquire Cellar Systems

Call us on +44 (0)20 7621 7836 LinkedInTwitter

Call +44 (0)20 7621 7836 LinkedInTwitter

Where as Cybe security threats and the associated media hype address the risk to the organisation from the outside, one of the often forgotten risks are those from within. The disgruntled member of staff, the temp, the contractor, or the accidental disclosure from a well-meaning user.

Some of the most costly data breaches have arisen due to direct insider knowledge and staff abusing privileges. It's not uncommon for the value of an organisations data to be higher than any physical asset. As perimeters dissolve with inter-connected systems, supply chain data sharing and third party access, there is a need to do more to keep data confidential.

Encryption and data loss prevention solutions aim to render the information unintelligible so should the device or asset be compromise the underlying information is protected.

Recommended Solutions 1 - 17 of 17

Clearswift ARgon for Email

Clearswift ARgon for Email adds an extra layer of security to an organisation's information security system.

Clearswift DLP For Beginners Guide

From physical security of printed information such as printed board papers and computer systems, through to blanket information encryption in various forms and then to content aware DLP, it can feel like a minefield.

Cloud Security

Your on-premise data might be secure, but how does your Cloud security measure up? Implementing lock-down methods for both is key to ensure your data remains safe.

Endpoint Management & Security Suite Webinar

Join us for a 1 hour WebEx to discover how EMSS can work in your environment to offer 'Total Endpoint Security'

IT Shadow Risk Assessment

Register for the shadow IT risk assessment by Symantec to analyse your Cloud security vulnerabilities. You can also request a 45 minute webinar to discover how Symantec DLP and CASB can safeguard your entire data estate - wherever itís stored.

Ivanti Endpoint Security Device Control

Ivanti (Lumension) Endpoint Security Device Control is an endpoint policy enforcement solution that stops security breaches before they can even start.

Ivanti Patch for Endpoint Manager Webinar

Enable comprehensive patch management across your enterprise with Ivanti Patch for Endpoint Manager

KnowBe4 Phishing Awareness Training

KnowBe4 enables your employees to make smarter security decisions and to spot phishing attacks with an extensive choice of training modules.

LogRhythm Log Management Assessment

LogRhythm and CST provide a customised report indicating your organisation's level of security intelligence capability in relation to managing today's threats.

Pulse Secure

Pulse Secure services increase productivity, offer flexibility in device usage and reinforce peace of mind that wherever their staff access company data, it is safe from a potential leak or breach.

Security Information and Event Management Webinar

Are you 100% sure that you would know that your organisation had been breached, would you know if you were being attacked? Could you quickly understand how, when and where?

Symantec Endpoint Encryption

Symantec Endpoint Encryption provides advanced encryption for desktops, laptops, and removable storage devices. It offers scalable, enterprise-wide security that prevents unauthorised access by using strong access control and powerful encryption.

Symantec Gateway Email Encryption

Symantec Gateway Email Encryption powered by PGP technology provides centrally managed email encryption to secure email communications regardless of whether or not recipients have their own email encryption software.

Symantec Secure Access Cloud

Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the Cloud.

Symantec Web Security Service (WSS)

Symantec WSS is a cloud delivered solution that safeguards your staff from Cyber risks when using the Internet. Allows user to access web resources and be protected from Cyber risks, as well as enforcing policies about how staff are permitted to access the Web.

Symantec Web Security Service Webinar

See the webinar demonstration for Symantec WSS. Allows user to access web resources and be protected from Cyber risks, as well as enforcing policies about how staff are permitted to access the Web.

Thycotic Secret Server

Thycotic Secret Server secures and manages privileged accounts. The type of accounts that if abused can have far reaching consequences; the kind of accounts that require specific management and extra controls.