Establish an incident response and disaster recovery capability. Test your incident management plans within your organisation and report criminal incidents to law enforcement agencies.
CSIRT Safeguards your current and future computer security. By monitoring and resolving security incidents that occur on the Janet Network, we can share intelligence and advice to help keep your own networks safe.
Janet Network resolver Advanced protection, with the performance and capacity to meet the needs of all Janet Network connected organisations.
Establish and implement a monitoring strategy and produce supporting policies. Analyse logs for unusual activity that could indicate an attack.
Splunk Allows you to optimise your organisational performance, identify threats, and provide real-time insights into your infrastructure and services by automating the collection, indexing and alerting of your machine data.
Managed SIEM Members have told us they want a SIEM to help with proactively managing cyber security threats. Managed SIEM meets this need and removes the difficulties education and research organisations often face when they want to implement, manage and maintain a SIEM solution.
Managing user privileges
Establish effective management processes and limit the number of privileged accounts. Monitor activity and audit logs.
Splunk Secure your users, check for inactive accounts and control access to your data and services with our Splunk Enterprise core licence packages.
Home and mobile working
Develop a mobile working policy and train staff to adhere to it. Apply secure baseline builds to all devices. Protect data in transit and at rest.
Information security policies training course Allows you to examine the origin of risks in behaviours, processes, physical, technical and environmental factors; and consider how policies can be used to mitigate and manage the risks.
Cyber Essentials A government-backed scheme that helps you identify the key risks associated with remote working and gives peace of mind that you’ve put essential security protections in place.
Removable media controls
Removable media provide a common route for the introduction of malware and the accidental or deliberate export of sensitive data. Establish policies and practices which prevent this from happening within your organisation.
Cyber Essentials Helps identify appropriate policies for granting access and patching third party-provided devices allowed to connect to your network, such as a member of staff’s personal mobile phone.
Monitor your network activity
View DDoS mitigation data and traffic on your Janet Network connection through our cyber security portal.
We are an approved supplier on the Crown Commercial Service dynamic purchasing system (DPS). This provides a simple and trusted way for public sector buyers and our members to procure Jisc cyber security services.