Call us on +44 (0)20 7621 7836 LinkedInTwitter

Call +44 (0)20 7621 7836 LinkedInTwitter

Information ProtectionInformation Protection

Information Protection mitigates the risk of financial or reputational damage caused by the unauthorised disclosure of sensitive data wherever it lives – at the endpoint, on premise, or in the cloud.

The number of high profile data breaches hitting the news headlines is evidence that organisations are not effectively securing business critical data as it flows across their various communication channels from both internal and external threats.

Where as Cyber Defence addresses the importance of viewing a technology environment from an outside-in perspective. Whether its credit card numbers, blueprints, next month’s payroll details or the ingredients to your secret sauce, all of these can be sold on the black market.

Information Protection addresses the iimportance of viewing a technology environment from inside-out. Whether you have a malicious insider who is actively working against you, or (more likely) well-meaning insiders that simply don’t understand the impact of their actions – CST can help. We can ensure your business can both identify and control sensitive information, therefore reducing the likelihood of it getting in to the wrong hands.

Information Protection solutions recommended:

Access Rights Management

Join us for a 45 minute WebEx to discover the power of 8MAN. 8MAN addresses the fundamental flaws in the traditional approach to user-provisioning, access rights and permissions, effectively bridging the gap between IT and business units (data owners).

Active Directory Health Check

An Active Directory Health Check from 8MAN is a painless way of detecting potential security breaches. Conduct a detailed analysis of your Active Directory and file server environment.

Clearswift Critical Information (Web & Email) Health Check

CST in conjunction with Clearswift are offering a complimentary Health Check to help you understand the gaps in your information security system that put your organisation at risk of a data breach through a cyber-attack or 'leak' from within.

Clearswift SECURE Email Gateway

Clearswift SECURE Email Gateway offers inbound threat protection, a multi-layer spam defence mechanism and deep content inspection control on size and types of attachments.

Clearswift SECURE Exchange Gateway

Clearswift SECURE Exchange Gateway safeguards against inappropriate content being internally communicated, supporting both organisational policy and compliance requirements.

Clearswift SECURE ICAP Gateway

Clearswift SECURE ICAP Gateway enables organisations to apply deep content inspection, adaptive redaction and data loss prevention technologies to existing web security architectures.

Clearswift SECURE Web Gateway

Clearswift SECURE Web Gateway offers a proactive policy controlled web gateway solution, with structured policies to categorise and define where, when and for how long users are able to surf for.

Endpoint Management & Security Suite - IT Control Made Simple

Join us for a 1 hour WebEx to discover how EMSS can work in your environment to offer 'Total Endpoint Security'

GDPR and Access Rights Management with 8MAN

Discover how this 60 minute GDPR WebEx can help your organisation be more prepared for the upcoming changes in regulations.

Information Protection Webinar

Join us for a 45 minute WebEx to discover, secure and manage your critical information. Access to organisation's critical information has never been more prolific, with or without malicious intent; via the increased adoption of the internet, web tools and the automation of commercial operations via collaboration tools such as email, web, social media and IM.

Ivanti Endpoint Security Device Control

Ivanti (Lumension) Endpoint Security Device Control is an endpoint policy enforcement solution that stops security breaches before they can even start.

Ivanti Patch for Endpoint Manager

Enable comprehensive patch management across your enterprise with Ivanti Patch for Endpoint Manager

LogRhythm Log Management Assessment

LogRhythm and CST provide a customised report indicating your organisation's level of security intelligence capability in relation to managing today's threats.

Security Information and Event Management

Are you 100% sure that you would know that your organisation had been breached, would you know if you were being attacked? Could you quickly understand how, when and where?

Soliton DME - Bring Your Own Mobile Device (BYOD)

Soliton DME is a single App to enable secure mobile access to all the Enterprise IT systems the employees need to do their job.

Soliton MobiControl Mobile Device and Application Management

MobiControl is a comprehensive enterprise mobility solution for managing your entire fleet of mobile assets across all operating systems. The centralised, web-based management console provides total visibility and full control of your corporate, shared and personally owned mobile devices.

Symantec Endpoint Encryption

Symantec Endpoint Encryption provides advanced encryption for desktops, laptops, and removable storage devices. It offers scalable, enterprise-wide security that prevents unauthorised access by using strong access control and powerful encryption.

Symantec Gateway Email Encryption

Symantec Gateway Email Encryption powered by PGP technology provides centrally managed email encryption to secure email communications regardless of whether or not recipients have their own email encryption software.

Thycotic Secret Server

Thycotic Secret Server secures and manages privileged accounts. The type of accounts that if abused can have far reaching consequences; the kind of accounts that require specific management and extra controls.