ECSM: Industry-Defining Technology and Dashboard

The team at Cybx are looking to continually improve our offering to be able to provide our customers with the most up to date and comprehensive cyber security solutions for your business. We are excited to announce that we've partnered with ACP to deliver you the Enterprise Cyber Security Management® (ECSM) platform. With the demand for managed vulnerability scanning on the rise, we're pleased to bring this offering to our new and existing clients.

Engineered by Assured Cyber Protection (ACP) to build cyber immunity for your organisation, Enterprise Cyber Security Management, or ECSM®, seamlessly interweaves best-of-breed security technologies into a single platform.

The integration of these technologies provides a uniquely hard to penetrate protection that is exponentially more effective than a patchworked combination of applications that offer specific but limited cyber security.


Single Pane Displays Tell All

The ECSM dashboard features single pane views that can display your organisation’s entire cyber security profile with traffic signal simplicity.

The user-defined panes can be configured to provide top-down overviews for senior executives or increasingly detailed analyses for IT and other departments.

With traffic signal simplicity, the red-amber-green dashboard indicators display at a glance the strengths and weaknesses of your cyber risk protections.

Continuous, Real-Time Monitoring

The ECSM platform continuously monitors the strength of your organisation’s cyber protections across your entire network and flags existing vulnerabilities and imminent threats.

When problems are detected, ECSM automatically issues alerts and initiates immediate remedial actions to deter or mitigate the threat.

Up-to-the minute monitoring lets you respond quickly to an impending cyber attack, or prevent one from ever occurring.


ECSM Protections

The ECSM platform offers a range of protections that together build your enterprise’s cyber immunity. You can select any or all of these protections initially, depending on protections you already have in place. Whatever level of protection you choose, you can always add others over time to meet new cyber threats that arise.

The ECSM platform provides the following protections for your organisation, available on a bespoke/custom basis:

ACP All Device ProtectionProtects end points and connected devices throughout an expanding cyber perimeter
ACP Intrusion DetectionDeploys tripwires which send alerts when triggered
ACP Vulnerability ManagementFull machine asset inventory and user information. Continually checks for mis-configured, out-of-date, or no longer supported software and sends detailed alerts identifying problem
ACP Secure Group CommunicationsA totally encrypted system that ensures the fully private and secure transfer of sensitive digital information within a designated group
User Awareness SecurityProvides simulated phishing emails to identify susceptible users in need of cyber training
ACP Human Factors ApplicationsUsing our own methodology we can identify those employees most susceptible to cyber ploys such as phishing and spoofing through the use of human assessments and phishing simulations, with training provided for those employees that need it
ACP Cyber AssessmentsBased on internationally recognised standards such as Cyber Essentials, NIST and ISO 27001.  We go through these assessments highlighting key areas that organisations need to address


Stepped-Up Protections

The ECSM platform can seamlessly incorporate cyber security applications from other suppliers as well as new, more powerful cyber technologies as they become available.

With the ACP solution, your protection is never obsolete, and each enhancement continues to strengthen your cyber immunity.

About ACP

Assured Cyber Protection®, or ACP, is a solutions-driven technology company that delivers cyber security through defence-in-depth protections combined with cyber behaviour analytics. The ACP platform, ECSM, is emerging as a global standard for providing cyber immunity across businesses, supply chains, and government infrastructure, and as a benchmark for underwriting and pricing cyber insurance.

Get in touch to learn more