Information Protection mitigates the risk of financial or reputational damage caused by the unauthorised disclosure of sensitive data wherever it lives – at the endpoint, on premise, or in the cloud.
The number of high profile data breaches hitting the news headlines is evidence that organisations are not effectively securing business critical data as it flows across their various communication channels from both internal and external threats.
Where as Cyber Defence addresses the importance of viewing a technology environment from an outside-in perspective. Whether its credit card numbers, blueprints, next month’s payroll details or the ingredients to your secret sauce, all of these can be sold on the black market.
Information Protection addresses the iimportance of viewing a technology environment from inside-out. Whether you have a malicious insider who is actively working against you, or (more likely) well-meaning insiders that simply don’t understand the impact of their actions – CST can help. We can ensure your business can both identify and control sensitive information, therefore reducing the likelihood of it getting in to the wrong hands.
Information Protection solutions recommended:
|Active Directory Health Check|
An Active Directory Health Check from 8MAN is a painless way of detecting potential security breaches. Conduct a detailed analysis of your Active Directory and file server environment.
|Clearswift Critical Information (Web & Email) Health Check|
CST in conjunction with Clearswift are offering a complimentary Health Check to help you understand the gaps in your information security system that put your organisation at risk of a data breach through a cyber-attack or 'leak' from within.
|Clearswift SECURE Email Gateway|
Clearswift SECURE Email Gateway offers inbound threat protection, a multi-layer spam defence mechanism and deep content inspection control on size and types of attachments.
|Clearswift SECURE Exchange Gateway|
Clearswift SECURE Exchange Gateway safeguards against inappropriate content being internally communicated, supporting both organisational policy and compliance requirements.
|Clearswift SECURE ICAP Gateway|
Clearswift SECURE ICAP Gateway enables organisations to apply deep content inspection, adaptive redaction and data loss prevention technologies to existing web security architectures.
|Clearswift SECURE Web Gateway|
Clearswift SECURE Web Gateway offers a proactive policy controlled web gateway solution, with structured policies to categorise and define where, when and for how long users are able to surf for.
|GDPR and Access Rights Management with 8MAN|
Discover how this 60 minute GDPR WebEx can help your organisation be more prepared for the upcoming changes in regulations.
|Ivanti Endpoint Security Device Control|
Ivanti (Lumension) Endpoint Security Device Control is an endpoint policy enforcement solution that stops security breaches before they can even start.
|LogRhythm Log Management Assessment|
LogRhythm and CST provide a customised report indicating your organisation's level of security intelligence capability in relation to managing today's threats.
|Soliton DME - Bring Your Own Mobile Device (BYOD)|
Soliton DME is a single App to enable secure mobile access to all the Enterprise IT systems the employees need to do their job.
|Soliton MobiControl Mobile Device and Application Management|
MobiControl is a comprehensive enterprise mobility solution for managing your entire fleet of mobile assets across all operating systems. The centralised, web-based management console provides total visibility and full control of your corporate, shared and personally owned mobile devices.
|Symantec Endpoint Encryption|
Symantec Endpoint Encryption provides advanced encryption for desktops, laptops, and removable storage devices. It offers scalable, enterprise-wide security that prevents unauthorised access by using strong access control and powerful encryption.
|Symantec Gateway Email Encryption|
Symantec Gateway Email Encryption powered by PGP technology provides centrally managed email encryption to secure email communications regardless of whether or not recipients have their own email encryption software.
|Thycotic Secret Server|
Thycotic Secret Server secures and manages privileged accounts. The type of accounts that if abused can have far reaching consequences; the kind of accounts that require specific management and extra controls.