Solutions

ECSC offers a wide range of solutions, each proven to offer real protection from cyber security related incidents. We understand the priority technologies that help prevent breaches, and more importantly, how to configure and manage them effectively.

We can help you purchase the right product to match your environment and skillset, assist you with installation and initial configuration, or provide a fully outsourced managed service to give you complete peace of mind.

Firewall Icon

Firewalls

Still the essential network gateway security device. However, only as effective as the configuration and management expertise applied to the device.

ECSC ensures appropriate rule-sets are in place, management interfaces are appropriately secured, firmware is updated promptly and logs effectively monitored.

What would you like?

IPS Icon

Intrusion Prevention Systems (IPS)

An effective Web Application Firewall (WAF), reverse proxy, is still the most effective method of intrusion prevention. This approach is most likely to block zero-day threats, especially when backed with ECSC's SOC and threat intelligence.

Using an IDS to try and achieve this invariably ends up being left in sniffing mode, or has irrelevant signatures enabled.

What would you like?

IDS Icon

Intrusion Detection Systems (IDS)

Strategically placed IDS deployments can play a vital role in breach detection and effective incident response.

Network-based IDS is generally more effective, as it can be made invisible to attackers and cannot be disabled in the way host-based can be.

What would you like?

Log Analysis Icon

Log Analysis / Security Information & Event Management (SIEM)

Secure collection of logs is vital in effective post-breach recovery and investigations. ECSC can help effectively collect and correlate a wide range of security logs.

In addition, systematic monitoring of SIEM systems, when combined with threat intelligence, can be an effective incident detection mechanism.

What would you like?

Anti-Virus Icon

Anti-Virus

Although relatively easy to evade, anti-virus is still a fundamental of any desktop and/or server deployment. Ideally, it should be placed in multiple layers, with different vendors supporting detection through email, and desktop environments.

ECSC can help you deploy your AV effectively, and ensure you have appropriate systems to keep your systems up-to-date and monitored effectively.

What would you like?

File Integrity Monitoring Icon

File Integrity Monitoring (FIM)

Although often restricted to PCI DSS environments, where it is a mandated requirement, FIM can be an efficient breach detection method.

FIM is particularly useful for online systems; however, it needs careful configuration, and ongoing management to ensure it remains effective.

What would you like?

Web Filtering Icon

Web Filtering

Much more than just a productivity policing tool, restrictions to users' browsing behaviour can block a wide range of user-targeted attack vectors.

ECSC can not only help you with your technology deployment, but also in developing and communicating appropriate user policies.

What would you like?

Vulnerability Scanning Icon

Vulnerability Scanning

Are you wasting time (and money) with penetration testing that only reports results that you could obtain with simple scanning?

Regular internal and external scanning, with appropriate remediation, can help you resolve the vast majority of security issues before annual penetration testing is carried out.

What would you like?

Email Filtering Icon

Email Filtering

Effective email spam and virus filtering is as important to security as it is in reducing the volume of your inbox.

Attackers often use email as the starting point of an attack, so this route needs policing.

What would you like?

Lan Switching Icon

LAN Switching/Routing

As part of a wider network security approach, ECSC can ensure that your switch and routing environments are appropriately hardened and security managed.

This can be part of the relatively strict requirements of PCI DSS, or more general network segmentation and security projects.

What would you like?

Cloud Access Security Broker Icon

Cloud Access Security Broker (CASB)

Many organisations are now finding that the use of public cloud services is quickly getting out of control. Users are placing confidential company information into uncontrolled environments.

A CASB solution helps you to discover the extent of this behaviour and bring it under control.

What would you like?

PCI Desktops Icon

PCI Desktops

Taking telephone payments, and processing them within a PC environment, creates many security challenges, and can be difficult to meet PCI DSS compliance.

ECSC LABS has managed solutions that help you retain the essential customer interactions, whilst creating a PCI DSS compliant environment.

What would you like?


Sign Up

Sign Up For the Latest News, Briefings & Announcements






ECSC Group plc

ECSC has over 15 years' experience in the design, implementation and management of IT security solutions.

Reg No. 3964848

VAT No. 746361914

Contact

28 Campus Road
Listerhills Science Park
Bradford
BD7 1HR
United Kingdom

+44 (0) 1274 736 223

info@ecsc.co.uk