Computer Security Technology Ltd

+44 (0)20 7621 7836 LinkedInTwitter

+44 (0)20 7621 7836 CSTL LinkedInCSTL Twitter

Be secured by trusted products and solutions. CST are recognised and highly regarded by leading industry vendors, as well as representing niche security solution suppliers.

  • Checkred

    CheckRed

    CheckRed addresses securing Cloud Infrastructure and securing Cloud Applications, to prevent breaches and compliance failures.

    Review

  • Clearswift

    Clearswift

    Clearswift offers highly innovative content-aware solutions for email and web that meet information protection.

    Review

    Clearswift partner site.

  • Delinea

    Delinea

    Delinea deploy solutions to control and monitor privileged account credentials and identity access for administrators and end-users.

    Review

    Delinea partner site

  • Egress

    Egress

    Egress prevent misdirected emails and human activated security breaches.

    Review

  • Ivanti

    Ivanti

    Ivanti provide unified protection & control for all enterprise endpoints, applications and devices.

    Review

  • KnowB4

    KnowBe4

    KnowBe4 enables smarter security decisions and to spot phishing attacks with an extensive choice of training modules.

    Review

  • LogRhythm

    LogRhythm

    LogRhythm's incident & event management solution rationalises technologies and gives real-time network visibility, creating actionable security intelligence.

    Review

  • McAfee

    McAfee

    McAfee protects data and stop threats. On the device, in the cloud, and in between.

    Review

  • Microsoft Security

    Microsoft Security

    With the massive adoption of MS Azure and M365 in the UK, customers are typically underutilising the available security functions and policy options.


    Review

  • Mimecast

    Mimecast

    Mimecast email continuity services reduces recovery time without the expense, complexity, hardware or software.

    Review

  • Netwrix

    Netwrix

    Netwrix empowers information security over sensitive, business-critical data regardless of where it resides.

    Review

  • Splunk

    Pulse Secure

    Pulse Secure offer flexibility in device usage wherever their staff access company data, safe from a potential leak or breach.

    Review

  • Qualys

    Qualys

    Qualys offers on demand vulnerability management and policy compliance solutions delivered as a service.

    Review

  • SkyHigh

    SkyHigh Security

    SkyHigh Security provide gateway solutions to protect the Users and Business from web risks.

    Review

  • Splunk

    Splunk

    Splunk is a complete information mining and reporting system.

    Review

  • Symantec

    Symantec

    Symantec provides solutions to help enterprises assure the security, availability, and integrity of their information.

    Review

    Symantec partner site.

  • Webroot

    Webroot

    Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses around the globe.

    Review