ePrivacy and GPDR Cookie Consent by Cookie Consent
Technical Services
Cyber Essentials Gap Analysis

Cyber Essentials is a UK government scheme introduced in 2014 to helps organisations of every size to guard against cyber attacks, and demonstrate their commitment to staying secure. If your customers are becoming CyberEssentials certified, or looking for your help, is your technology portfolio ready? Use our tool to review it against the requirements.

80%

of organisations believe the scheme helps mitigate risks

71%

agree that the scheme has strengthened taking cybersecurity seriously

33%

of contracts in the last year required Cyber Essentials certification

80%

fewer cyber insurance claims are made when Cyber Essentials is in place

Why is Cyber Essentials important?

For smaller organisations in particular, cybersecurity is a very challenging task - evolving threats, lack of in-house expertise and a complex technology landscape to navigate.

Cyber Essentials offers a simple path to ensuring they can meet the fundamentals. It's also increasingly listed as a requirement for suppliers, especially those working with public sector organisations like local councils, schools and the NHS.

It’s a great opportunity for you to help your customers examine those basic steps, and give them greater confidence in their cybersecurity posture. Follow the simple process below to review your portfolio against the key 5 criteria.

Let's check your cyber essentials Gap Analysis

Answer a few questions so we can determine what areas we can help support you with.

Firewalls

A network security firewall – this can be a dedicated appliance, or part of the UTM solution, and typically is located physically on the local network(s). Firewalls are one of the fundamental components of cybersecurity defences, so it’s essential to have them in your portfolio – especially for customers who may have legacy solutions in place.

Cyber Essentials requirements: Ensuring the network is protected at the gateway

Do you currently sell Firewalls?

Secure Configuration

It's essential that all network devices and systems are setup correctly, secure by default, and not able to be access by internal users or external suppliers/contractors/customers who don't have right permissions or authorisation. Dedicated secure configuration solutions classify the system, identify and remediate misconfigurations, and automate updates.

Cyber Essentials requirements: Ensure that computers and network devices are properly configured to reduce vulnerabilities and provide only the services required to fulfil their role

Endpoint Management

Ensures all network and user devices are setup correctly and security controls applied.

Do you currently sell Endpoint Management?

Technical Services

Cybersecurity services, to help provide expert advice and guidance on posture.

Do you currently sell Technical Services?

CASB

Cloud Application Security Broker (CASB) provides security controls and visibility into cloud apps.

Do you currently sell CASB?

Security Update Management

Patch Management is a key tool when automating and managing updates to software and hardware, and ensuring available patches and updates are deployed, and applying additional protection where one isn’t available (such as for legacy systems).

Cyber Essentials requirements: Ensure that devices and software are not vulnerable to known security issues for which fixes are available.

Do you currently sell Patch Management?

User Access Control

Users are frequently the targets for attacks, and yet often have too much access to systems and data that they don’t need. User Access Control can ensure a least privilege rule is applied, that their identity is verified, and the principle of Zero Trust ensures they only have access to what they need.

Cyber Essentials requirements: Ensure that user accounts are assigned to authorised individuals only and to provide access to only those applications, computers and networks the user needs to carry out their role

PAM

Manages user privileges and rights, to ensure they can only access resources and systems they need to.

Do you currently sell PAM?

MFA

Multi-Factor Authentication requires additional verification of a user's identity.

Do you currently sell MFA?

ZTNA

Zero Trust Network Access (ZTNA) ensures remote users can only access the apps and resources they need to, replacing legacy VPN.

Do you currently sell ZTNA?

Malware Protection

Malware is one of the biggest forms of cyber attack, and includes ransomware as well as forms that can steal data, credentials or control the device. Endpoint security can help protect against malware being installed or run, and endpoints can include servers, workstations, laptops or phones, as well as cloud infrastructure such as workloads and containers.

Cyber Essentials requirements: Keep software and devices up-to-date by applying security updates and patches promptly. This helps close known vulnerabilities that attackers could exploit.

Anti-Virus/Malware

Essential endpoint protection against malware and viruses.

Do you currently sell Anti-Virus/Malware?

Email Security

Provides protection and security for email gateways or applications.

Do you currently sell Email Security (SEG)?

Web Security

Protection for any users or devices accessing public web applications or services.

Do you currently sell Web Security (SWG)?

Cyber Essentials Certification

After your customer has reviewed the technology and processes they have in place, the final step is for them to get certified. It's a simple process that can be completed in as little as 24 hours, and is suitable for businesses of all sizes. All preparation can be in-house, with the one-off audit completed by a certified body.

Cyber Essentials requirements: Work with a certifying partner to provide evidence for the necessary controls and processes. Once reviewed, an Accredited Auditor will approve, or provide next steps for any failed checks.

Do you offer Cyber Essentials Certification?

Your cyber essentials summary

Here's a review of your portfolio, and where it maps against the Cyber Essentials requirements.

Where you're covered

Where you could improve

Let us help you complete your cyber essentials portfolio

Provide your details below and one of our Cyber Essentials experts will be in touch with you shortly.

-
2
3
4
5
6
7
Summary