ECSM: Industry-Defining Technology and Dashboard
The team at Cybx are looking to continually improve our offering to be able to provide our customers with the most up to date and comprehensive cyber security solutions for your business. We are excited to announce that we've partnered with ACP to deliver you the Enterprise Cyber Security Management® (ECSM) platform. With the demand for managed vulnerability scanning on the rise, we're pleased to bring this offering to our new and existing clients.
Engineered by Assured Cyber Protection (ACP) to build cyber immunity for your organisation, Enterprise Cyber Security Management, or ECSM®, seamlessly interweaves best-of-breed security technologies into a single platform.
The integration of these technologies provides a uniquely hard to penetrate protection that is exponentially more effective than a patchworked combination of applications that offer specific but limited cyber security.
Single Pane Displays Tell All
The ECSM dashboard features single pane views that can display your organisation’s entire cyber security profile with traffic signal simplicity.
The user-defined panes can be configured to provide top-down overviews for senior executives or increasingly detailed analyses for IT and other departments.
With traffic signal simplicity, the red-amber-green dashboard indicators display at a glance the strengths and weaknesses of your cyber risk protections.
Continuous, Real-Time Monitoring
The ECSM platform continuously monitors the strength of your organisation’s cyber protections across your entire network and flags existing vulnerabilities and imminent threats.
When problems are detected, ECSM automatically issues alerts and initiates immediate remedial actions to deter or mitigate the threat.
Up-to-the minute monitoring lets you respond quickly to an impending cyber attack, or prevent one from ever occurring.
The ECSM platform offers a range of protections that together build your enterprise’s cyber immunity. You can select any or all of these protections initially, depending on protections you already have in place. Whatever level of protection you choose, you can always add others over time to meet new cyber threats that arise.
The ECSM platform provides the following protections for your organisation, available on a bespoke/custom basis:
|ACP All Device Protection||Protects end points and connected devices throughout an expanding cyber perimeter|
|ACP Intrusion Detection||Deploys tripwires which send alerts when triggered|
|ACP Vulnerability Management||Full machine asset inventory and user information. Continually checks for mis-configured, out-of-date, or no longer supported software and sends detailed alerts identifying problem|
|ACP Secure Group Communications||A totally encrypted system that ensures the fully private and secure transfer of sensitive digital information within a designated group|
|User Awareness Security||Provides simulated phishing emails to identify susceptible users in need of cyber training|
|ACP Human Factors Applications||Using our own methodology we can identify those employees most susceptible to cyber ploys such as phishing and spoofing through the use of human assessments and phishing simulations, with training provided for those employees that need it|
|ACP Cyber Assessments||Based on internationally recognised standards such as Cyber Essentials, NIST and ISO 27001. We go through these assessments highlighting key areas that organisations need to address|
The ECSM platform can seamlessly incorporate cyber security applications from other suppliers as well as new, more powerful cyber technologies as they become available.
With the ACP solution, your protection is never obsolete, and each enhancement continues to strengthen your cyber immunity.
Assured Cyber Protection®, or ACP, is a solutions-driven technology company that delivers cyber security through defence-in-depth protections combined with cyber behaviour analytics. The ACP platform, ECSM, is emerging as a global standard for providing cyber immunity across businesses, supply chains, and government infrastructure, and as a benchmark for underwriting and pricing cyber insurance.