ECSC offers a wide range of solutions, each proven to offer real protection from cyber security related incidents. We understand the priority technologies that help prevent breaches, and more importantly, how to configure and manage them effectively.

We can help you purchase the right product to match your environment and skillset, assist you with installation and initial configuration, or provide a fully outsourced managed service to give you complete peace of mind.

Firewall Icon


Still the essential network gateway security device. However, only as effective as the configuration and management expertise applied to the device.

ECSC ensures appropriate rule-sets are in place, management interfaces are appropriately secured, firmware is updated promptly and logs effectively monitored.

What would you like?

IPS Icon

Web Application Firewalls (WAF)

An effective Web Application Firewall (WAF), reverse proxy, is still the most effective method of intrusion prevention. This approach is most likely to block zero-day threats, especially when backed with ECSC's SOC and threat intelligence.

Using an IDS to try and achieve this invariably ends up being left in sniffing mode, or has irrelevant signatures enabled.

What would you like?

IDS Icon

Intrusion Detection Systems (IDS)

Strategically placed IDS deployments can play a vital role in breach detection and effective incident response.

Network-based IDS is generally more effective, as it can be made invisible to attackers and cannot be disabled in the way host-based can be.

What would you like?

Log Analysis Icon

Log Analysis / Security Information & Event Management (SIEM)

Secure collection of logs is vital in effective post-breach recovery and investigations. ECSC can help effectively collect and correlate a wide range of security logs.

In addition, systematic monitoring of SIEM systems, when combined with threat intelligence, can be an effective incident detection mechanism.

What would you like?

Log Analysis Icon


NEBULA allows you to develop an effective SIEM or SOAR solution in the cloud. Taking logs from both your traditional IT environments, remote workers and cloud systems, NEBULA gives you essential 24/7/365 detection, investigation and response capability.

What would you like?

File Integrity Monitoring Icon

File Integrity Monitoring (FIM)

Although often restricted to PCI DSS environments, where it is a mandated requirement, FIM can be an efficient breach detection method.

FIM is particularly useful for online systems; however, it needs careful configuration, and ongoing management to ensure it remains effective.

What would you like?

Vulnerability Scanning Icon

Vulnerability Scanning

Are you wasting time (and money) with penetration testing that only reports results that you could obtain with simple scanning?

Regular internal and external scanning, with appropriate remediation, can help you resolve the vast majority of security issues before annual penetration testing is carried out.

What would you like?

PCI Desktops Icon

PCI Desktops

Taking telephone payments, and processing them within a PC environment, creates many security challenges, and can be difficult to meet PCI DSS compliance.

ECSC Labs has managed solutions that help you retain the essential customer interactions, whilst creating a PCI DSS compliant environment.

What would you like?

Sign Up

Sign Up For the Latest News, Briefings & Announcements

To understand how ECSC Group plc may use your email address, please view our policy on Privacy and Cookies by clicking here

ECSC Group plc

ECSC has almost two decades' experience in the design, implementation and management of IT security solutions.

Reg No. 3964848

VAT No. 746361914


28 Campus Road
Listerhills Science Park
United Kingdom

+44 (0) 1274 736 223