skip to content
 
 

What is Cyber Essentials?

The UK government developed Cyber Essentials, a cybersecurity certification program, to aid organizations in safeguarding themselves against cyberthreats and demonstrating their dedication to cybersecurity. The compliance protects organizations by ensuring secure configuration, controlling user access, preventing malware, managing security updates, and using firewalls to block cyberthreats.

It applies to organizations of all sizes and sectors that aim to strengthen their cybersecurity measures and protect against common online threats

Related Content

Simplifying compliance management

  1. Collect, correlate, analyse, and archive logs from across the network and simplify log management with a unified view of log data.
  2. Analyse logs in real time, and automatically trigger alerts and notifications when critical events occur to detect and respond to security events promptly.
  3. Generate detailed and accurate compliance reports to demonstrate conformity to Cyber Essentials during audits and assessments.

Here's how EventLog Analyzer simplifies adherence to Cyber Essentials compliance

Privileged user monitoring

Privileged user monitoring

Monitor the activities performed by users with elevated access privileges. By tracking and auditing the actions performed by privileged users, you can detect and respond to misuse of privileged accounts, reduce the risk of data breaches, and provide evidence of compliance with various regulatory standards, including Cyber Essentials requirements for privileged user monitoring and access control.

Account lockout monitoring

>Account lockout monitoring

Monitor and capture account lockout events, which occur when a user's account is locked out after multiple failed login attempts. By tracking account lockouts and providing real-time alerts, EventLog Analyzer helps you to identify potential security threats like brute-force attacks, account compromise, denial of service (DoS), or unauthorized access attempts. This feature monitors user sessions and allows you to address account lockouts and helps you meet Section D.2 of Cyber Essentials requirements for account lockout and password policy management.

Vulnerability assessment and remediation

Vulnerability assessment and remediation

Identify and prioritise security vulnerabilities across your network with EventLog Analyzer's sophisticated vulnerability assessment capabilities. It can process log data from vulnerability scanners such as Nessus, Qualys, OpenVAS, and NMAP and deliver actionable reports to begin remediation efforts. The data from the vulnerability scanners can be fed into the correlation engine to discover complex attack patterns.

You can meet the Cyber Essentials patch management requirements of Section D.3 for vulnerability management and risk reduction. With EventLog Analyzer's comprehensive vulnerability assessment solution, organizations can reduce security risks and maintain a secure environment.

Incident response automation

Incident response automation

Streamline incident handling processes, reduce response times, and ensure consistent and effective incident response practices with the incident response automation feature. This feature allows you to facilitate swift and coordinated responses to security incidents. It can raise a ticket to the concerned security teams in real time for quick analysis and action. EventLog Analyzer helps organizations meet the Cyber Essentials requirements of Section D.4 for user access control by automating your first response to any security incident with predefined workflows and automated response actions triggered by preset criteria.

How does EventLog Analyzer meet Cyber Essentials requirements?

Cyber Essentials requirements Requirement description EventLog Analyzer reports
D.1 Boundary firewalls and internet gateways Organizations should protect every device in scope with a correctly configured firewall (or network device with firewall functionality).
  • Windows Firewall Threats
  • Network Device Logon Reports
  • Network Device Attack Reports
  • Network Device Configuration Reports
  • Network Device Security Reports
  • Network Device Rule Management Reports
  • VPC Activity
  • WAF Reports
D.2 Secure Configuration Proper configuration of computers and network devices should be carried out to minimize inherent vulnerabilities and ensure that only the services needed to carry out their designated tasks are available.
  • Policy Changes
  • Windows User Access
  • User Account Validation
  • User Account Changes
  • Computer Account Changes
  • User Group Changes
  • Unix User Access
  • Network Device Account Management Reports
D.3 Patch Managaement Maintain the latest security patches and updates on the software utilised on computers and network devices.
  • Windows System Events
  • Windows Services
  • Network Device Security Reports
  • Nessus Vulnerability Reports
D.4 User access control Authorized individuals should be the only ones assigned user accounts, especially those with special access privileges, like administrative accounts, and effective management should be implemented to prevent the misuse of such privileges.
  • Policy Changes
  • Windows User Access
  • User Account Validation
  • Unix User Access
  • AWS User Activity
  • AWS Failed/Unauthorized Activity
  • Oracle Account Changes
  • Network Device Logon Reports
D.5 Malware Protection The use of malware protection software is necessary to safeguard computers in an organization that are connected to the internet, and it is essential to implement strong malware protection measures on these devices.
  • Windows Software Updates
  • Anti-malware
  • Other Software
  • Windows Removable Disk Auditing
  • Windows Threat Detection from Antivirus
  • Windows Threat Detection
  • Windows Application Whitelisting

What else does EventLog Analyzer offer?

Log collection and consolidation  

Collect and consolidate log data from various sources, such as servers, applications, and network devices. This allows you to centralise your log data in a single platform, making it easier to search, analyse, and monitor logs for troubleshooting.

Threat intelligence  

Identify and respond to emerging threats instantly with threat intelligence feeds that provide real-time information about known malicious entities, IP addresses, domains, and indicators of compromise (IOCs).

Cloud infrastructure monitoring  

Monitor all AWS EC2 instances in real time, and detect suspicious activities with timely alerts, enhancing the network security of your system.

Log forensics and investigation  

Investigate security event with EventLog Analyzer's powerful search, log correlation, and log visualisation capabilities. It allows security teams to reconstruct incidents, trace activities, and identify the root cause of security breaches or system failures.

Frequently asked questions

Cyber Essentials compliance applies to organizations of all sizes and sectors that aim to strengthen their cybersecurity measures and protect against common online threats. The scheme applies to businesses, non-profit organizations, and government entities in the United Kingdom and beyond.

Cyber Essentials is not mandatory for businesses, but organizations that work with the UK government and organizations that bid for government contracts are required to be compliant with Cyber Essentials.

Establish Cyber Essentials compliance easily with EventLog Analyzer.

Get your free trial

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management