Computer Security Technology Ltd

+44 (0)20 7621 7836 LinkedInTwitter

+44 (0)20 7621 7836 CSTL LinkedInCSTL Twitter


Symantec (aka Broadcom) provides solutions to help enterprises assure the security, availability, and integrity of their information.

We would be happy to discuss your requirements over the phone or meet with you at your office.

Get in touch


Server & Data Centre

Cyber threats continue to grow in magnitude, prevalence and complexity, hence relying on perimeter defence alone to safeguard high value servers or important data assets is a high risk strategy.

We highly recommend that these systems are protected with a level of defence designed to both defend against cyber-attacks (that can slip through the perimeter) and secure such systems against threats posed from within (such as rogue administrators, contractors, and staff ignorance).

Is your security reactive rather than pro-active?

Symantec Data Centre Security (SDCS) is designed to protect and control any and all actions that can be performed on your critical systems and data centres. These can include actions ranging from preventing the installation/modification/deletion of critical or high risk files sometimes referred to as FIM (File Integrity Monitoring), strict enforcement of access controls, privilege abuse, resource admission, hardening the OS, application sandboxing, and securing legacy OS’s way beyond the support of the vendor.

It doesn’t just rely or utilise attack or virus signatures, instead it applies a kernel level controller that wraps the operating system with a mechanism to prevent changes or modifications, and enforces a privilege access policy. Once configured it will not only ensure novel or complex cyber-attacks are thwarted. It will also prevent the server or system administrators from making an un-approved change either accidentally or maliciously, which ultimately prevents internal abuse and reduces risk.

Symantec Data Centre Security safeguards the data centre, high risk and high value systems beyond the security offered from traditional solutions. This ensures that systems are protected against todays and tomorrows threats, a few of the usage scenarios are listed below:

  • Extend the life of legacy systems and servers that are no longer supported by their respective vendors. We have customers who use XP and 2003 in production environments and mitigate the risk because they cannot be patched or supported security wise from the vendor with SDCS.
  • Protecting the ‘Jewels in the crown’ with SDCS to ensure that the most sensitive and highest value systems or data assets are secured against todays and tomorrows risks, and are safeguarded both form external cyber threats and internal abuse.
  • Augmenting existing security defences to ensure a complete and robust cyber and information security defence posture. A layered security strategy is a ‘best practise’ approach to ensure no single failure results in a cyber attack or a data leak.

Opinion & Resources

The solution provides a strong, robust and fully flexible security layer to any high risk or high value system with prevention rather than detection a better strategy for key systems that require complete defence with the lowest performance footprint. Nigel Lewis