The Essential Eight
The Essential Eight cyber threat mitigation strategies were developed by the Australian Cyber Security Centre and designed to reduce the risk of successful malicious attacks by over 85%. Whilst the strategies were created in Australia, the Essential Eight offers a simple, best-practice model that’s applicable in any market.
The Crayon Security portfolio comprises vendors that directly address the Essential Eight controls. Vendors were selected based on the effectiveness, ease-of-use and total cost of ownership of their Essential Eight aligned solutions.
Essential Eight Control | Vendor |
---|---|
Application Control |
|
Patch Operating Systems |
|
Patch Applications |
|
Configure Macros |
|
Restrict Admin Privileges |
|
Multifactor Authentication |
|
User Application Hardening |
|
Regular Backup |
|
Vulnerability Assessment and Remediation
Successful cyber security attacks often rely on the exploitation of vulnerabilities that lie within an organisation network. To reduce the risk of breach by malicious code attack or exploitation, it is vital organisations understand where their vulnerabilities are, and patch those applications in a timely and effective manner.
Crayon has several solutions that test for vulnerabilities, identify their criticality and remediate via patching of operating systems and/or applications.
End Point, Gateway and Cloud Protection
Today’s organisations are spread across multiple environments and platforms, with varying methods of connectivity and all requiring a heightened level of security.
Crayon cyber security solutions cover security at every level whether it be at the endpoints (work stations, servers, mobile devices), at the network edge such as email security gateways or firewalls, and security for cloud-based services such as Office 365 and Azure.
From anti-malware, encryption and access to Machine Learning analytics, Crayon’s cyber security solutions help you defend your customers, no matter where and how they work.
Data/Privilege Protection and Management
One fact remains constant in cyber defence. Data is the biggest target for cybercrime and credentials are the keys to accessing that data.
With the spread of data across multiple locations, on-premises and in the cloud, protecting sensitive data has never been more challenging.
Crayon’s cyber security portfolio covers some of the most robust solutions in Data Access governance, Privilege Access Management, File-level encryption, protecting structured and unstructured data and Active Directory Defence.
Cyber Threat Intelligence
Cyber Threat Intelligence (CTI) is an essential pillar of a mature cybersecurity strategy. When used and applied correctly, CTI can help security teams prepare for, and defend against, the evolving threat landscape. CTI gives organisations evidence-based, mature, and effective cybersecurity strategies.
CTI increases organisational ability to defend against current attacks and threats, and predict future attacks. The trick is to choose the right intelligence for your needs, and to make the sheer volume of intelligence actionable, whether it be reactive, proactive or futureproofing.
Cyber Security Awareness Training
The most comprehensive cybersecurity strategy can be nullified by human behaviour. Human Risk is often the most overlooked and unaccounted cyber threat but our vendor’s innovative and human focussed cyber security awareness programs help mitigate against the elusive human factor in cybersecurity. Our solution of cybersecurity awareness training portfolio is educational, informative and most importantly designed to make a difference in your cybersecurity strategy.
Anti-Ransomware and anti-malware
Ransomware is one of the leading cyber threats facing organisations across the globe. A ransomware attack can lead to severe disruption in business function and lead to a loss of consumer trust. At Crayon, we operate under the assumption that a breach might be imminent and have built up a portfolio of solutions to help focus on resilience in the event of a ransomware breach. We have selected key vendors who prevent and protect against ransomware and malware through comprehensive platforms that cover a multi-dimensional approach to security.
Managed EDR, XDR and SOC as a Service
Businesses are demanding more. High levels of protection and greater sophistication in more complex environments.
MSPs are under pressure to deliver services and solutions at an enterprise level, without the resources or budget to match.
Managed Endpoint Detection and Response (MEDR), Extended Detection and Response (MXDR) and Security Operation Centers as a Service (SOCaaS) bring enterprise-level defence to managed service providers without the burden of extra skilled staffing and the associated costs.
Talk to a Security Expert
Contact our Security experts to learn how Crayon’s portfolio of leading Security solutions can help to grow your business. Submit your details here and a member of our team will reach out to you.
Thank you for submitting your details! A member of our team will be in touch soon.