top of page
Search
McCormickCo

DSPT View - Coming Soon

Updated: Mar 20, 2023

The threat landscape of cyber security is evolving, four in ten organisation were impacted by a breach in 2020. We have always delivered no matter the time or day, the commitment needed or effort taken to help mature our customers.


Why the Data Security Protection Toolkit?


The Data Security and Protection Toolkit (DSPT) replaces the previous Information Governance toolkit from April 2018.

The Data Security and Protection Toolkit is an online self-assessment tool that enables organisations to measure and publish their performance against the National Data Guardian's (NDG) ten data security standards.

All organisations that have access to NHS patient data and systems must use this toolkit to provide assurance that they are practising good data security and that personal information is handled correctly.

Microsoft Defender for Endpoint allows us to get unfiltered access to the raw data inside your tenant.

Benefits of DSPT View:


  • Aligned to the Data Security and Protection Toolkit

  • Version 4.0, released on the 7th July 2021.

  • DSPT View: Near real time view of Data Security Protection Toolkit

  • The View: Organisation key performance risk scores

  • Alerts View: A timeline of all your Defender Alerts

  • Holistic View: Recommended security controls to strengthen your foundations.

  • Cyber View: Aligned to the NCSC for Cyber Essentials.

  • CareCert View: Aligned to the NHS Digital CareCerts

  • Common Vulnerabilities & Exposure View: All your asset's common vulnerabilities.

  • All Assets Vulnerabilities View – One single pane of glass view

  • Windows and Server Vulnerabilities View: Insight into your assets

  • MacOS Vulnerabilities View: Insight into your MAC estate

  • Linux Vulnerabilities View: Insight into your Linux estate

  • Secure Configuration Assessment (Critical Security Controls - CIS)

  • Secure Configuration View (Microsoft)

  • Secure Configuration Assessment (Security Technical Implementation Guides - STIG)

  • Information Asset View: Know your key Information Asset's weaknesses and vulnerabilities.

  • Software Inventory: Your installed software, end of support and end of lifecycles.

  • Advanced Threat Protection Health: Your agent health on your assets

  • Coming Soon:

  • Firewall View: Insight in to all inbound, outbound and application compliance

  • ASR View: Attack Surface Reduction controls to prevent common malware and malicious apps




Comments


bottom of page