The CIS (Center for Internet Security) just awarded SecludIT, giving confidence in the ability to manage the risk of cyber threats.
The CIS provide 20 controls that organizations of any size and sector can use to reduce the risk of cyber threats to critical assets and increase their ability to detect and respond to threats.
The CIS Critical Security Controls (CIS Controls) are a concise, prioritized set of cyber practices created to stop today’s most pervasive and dangerous cyber attacks. The CIS Controls are developed, refined, and validated by a community of leading experts from around the world.
CIS reports that organizations that apply just the first 5 CIS Controls can reduce their risk of cyberattack by around 85 %.
The Top 5 CIS Controls are as follows:
- CSC 1: Inventory of Authorized and Unauthorized Devices.
- CSC 2: Inventory of Authorized and Unauthorized Software.
- CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers.
- CSC 4: Continuous Vulnerability Assessment and Remediation
- CSC 5: Controlled Use of Administrative Privileges.
The CIS partners with SecludIT because Elastic Detector can provide solutions to all of these top 5 checkpoints. Our solution Elastic Detector enables a comprehensive assessment and continuous security to the IT infrastructure.
Elastic Detector detects all the security threats, including vulnerabilities, unauthorized devices and software, administrative rights configuration.
Elastic Detector’s reports are customized to different roles: on the one hand the key risk indicators for the C-Suite so they can measure their risk level and on the other hand, a detailed list of security threats with remediation tips for the IT team.
We thank the CIS for the confidence and we give it our full support for the fight against cyber threats.