ASL Group
Working in partnership with Cyber X
ASL Group
-
Working in partnership with Cyber X

Did you know that every business is a potential victim of a cyber attack?
We’re here to make sure it’s not you.

We provide bespoke cyber security solutions for all industries.
Simply click on ‘Free Assessment’ and together we can work out what’s right for you.

  • "Cyber security is something we have been looking into for some time, but it's a very difficult subject to get your head around. After we had met with Cyber X, we had a much clearer idea of what was required and, better still, Cyber X was able to recommend a security bundle to keep a company of our size protected.""
  • "As a growing company, we are not in the position to employ someone full time to look after the security of our IT systems. The Cyber X team have solved the problem and at a fraction of the cost."
  • "Cyber X provides a very comprehensive service. We are a very busy company and working with the CyberX team means we can concentrate on the what we know and do best, rather than spending hours worrying about how to reduce the risk of cyber security."
Pricing
Get the security your business needs, choose from one of our monthly subscription bundle packages;
Recommended

Essentials

1-20 users

Cyber security needn't be a daunting prospect for small business owners, the CyberX Essentials package is designed specifically for smaller organisations.

from £ 250

Monthly Subscription

Recommended

Advanced

upto 150 users

CyberX Advanced provides a robust suite of products and features to ensure your IT systems and users are regularly assessed for risks and vulnerabiulities.

from £ 550

Monthly Subscription

Recommended

Premium

Enterprise Class Monitoring

The CyberX Premium package contains additional components designed to deliver an increased level of information security and cyber security.

from £ 1375

Monthly Subscription

Click for more information.
  • Features
  • Number of users included
  • Vulnerability Assessment
  • Cyber Essentials
  • Asset Register
  • Risk Register
  • Security Policies
  • Awareness Communication
  • GDPR Tool Box
  • Cyber Incident Reporting
  • Phishing Campaign
  • E-Learning
  • Protective Monitoring
  • Essentials
  • 20 (max)
  • Advanced
  • 50
  • Premium
  • 50
Product Icon

Asset Register

Overview

A Cyber Asset Register is a comprehensive list of all IT assets owned by your company and which are of value to your organisation. The register should include details of their value and their location.

Business Benefits

  • Create, view & manage all your IT assets in one place.
  • Delivers improved change management of equipment & user assets
  • Link assets to security assessments for increased efficiency
Product Icon

Cyber Awareness Communication

Overview

Cyber Awareness Communication is simply keeping everybody associated with your company up to date with any developments within cyber security, so that they are in a better position to deal with any potential threats.

Business Benefits

  • Regular information source communicating cyber security principles
  • Monthly bulletins highlighting emerging risks and cyber crime
  • Distribute to key staff within your organisation
  • Raise awareness of cyber security issues regularly and consistently
Product Icon

E-Learning

Overview

Our e-learning service has been tailored to ensure that your workforce is cyber-aware. Making sure employees have a good understanding of cyber threats and the steps that can need to be taken to avoid a cyber security incident is vital. Training via e-learning can deliver the requisite knowledge to identify and understand the various risks presented by cyber-crime as well as ensuring your executive management understand the associated issues and responsibilities.

Business Benefits

  • Cost effective access from anywhere
  • Self-paced & can be re-run
  • Reduced time to course delivery
  • Ideal for mobile or distributed workforce
Product Icon

Cyber Essentials

Overview

Cyber Essentials is a government backed cyber security certification scheme which helps organisations to establish and maintain a good understanding of cyber security.

Business Benefits

  • Demonstrates your organisations commitment to cyber security
  • Achieves the recommended standard for supply chain bids & tenders
  • Identify & secure your business critical data
Product Icon

GDPR Tool Box

Overview

GDPR is the European Union’s General Data Protection Regulation. It will come into force on 25 May this year and has been introduced to give EU citizens more control over how their personal data is used.

Business Benefits

  • Single repository for GDPR related information
  • Assessment checklists highlight readiness and compliance progress
  • Provides recommendations for adoption of GDPR principles
Product Icon

Continuous Protective Monitoring

Overview

Continuous Protective Network Monitoring is an automated method used to evaluate your security posture and activity. It monitors networks in real time, searching out potential threats to your organisation.

Business Benefits

  • Simulated “real world hack” type testing
  • Appropriate test level for your IT infrastructure
  • Easily identifies vulnerabilities and exposure
  • Straightforward reports highlight risks and corrective measures
Product Icon

Vulnerability Assessment

Overview

A Vulnerability Assessment is a series of scheduled vulnerability and attack simulation assessments, designed to identify any security weaknesses which may be present in your network or communications infrastructure.

Business Benefits

  • Get scans started quickly with a simple setup process
  • Targets external infrastructure – informs you of your exposure as seen by would be attackers
  • Assessments can be scheduled for a time that suits you and your operations
  • Fully automated service vastly reduces management overhead of manual scans
Product Icon

Information Security Policies

Overview

Information Security Policies are a set of rules, outlined in a number of key policies, which all users within an organisation are requested to abide by, in order that all data, which is stored digitally, remains secure.

Business Benefits

  • Manage and maintain a single set of key information security policies
  • Easily distribute to departmental managers or your whole workforce
  • Monitor circulation and record which staff study policy content
Product Icon

Cyber Incident Reporting

Overview

In order to remain vigilant to potential cyber security threats, all events and incidents are logged in a cyber security report. These reports demonstrate any advancements in the threat aimed at your organisation, as well as the steps taken to mitigate the risk.

Business Benefits

  • Single point to record cyber incident event information
  • Management of incidents inline with ICO & GDPR
  • Provides incident audit trail and recording of root cause
Product Icon

Email Phishing Campaign

Overview

Email Phishing is an attempt by someone not associated with your company to obtain sensitive information, such as credit card details, by disguising malicious electronic communication as a trustworthy entity.

Business Benefits

  • Automated service requires minimal management
  • Test and educate your employees to identify phishing email attacks
  • Highlight vulnerable users and offer appropriate education measures
  • Increase overall cyber security awareness
Product Icon

Risk Register

Overview

A Cyber Risk Register should be used to document any potential threats to your organisation's IT infrastructure and network. Any entries should provide details of the potential threat, as well as the likelihood and impact associated with the threat.

Business Benefits

  • Single tool for managing identifiable risks to your business
  • Assign and record values against risk likelihood, owner and impact
  • Plan for risk occurrence and document mitigation approach
Product Icon

Penetration Testing

Overview

Crest approved systematic testing of your security controls to probe and establish your readiness and level of defence to direct attack. We will imitate and recreate attacks to check for potential weaknesses such as poor system configuration and known/unknown hardware or software vulnerabilities.

Business Benefits

  • Simulated “real world hack” type testing
  • Appropriate test level for your IT infrastructure
  • Easily identifies vulnerabilities and exposure
  • Straightforward reports highlight risks and corrective measures
Features
  • Product Icon

    Asset Register

    A Cyber Asset Register is a comprehensive list of all IT assets owned by your company and which are of value to your organisation. The register should include details of their value and their location.


    • Create, view & manage all your IT assets in one place.
    • Delivers improved change management of equipment & user assets
    • Link assets to security assessments for increased efficiency
  • Product Icon

    Cyber Awareness Communication

    Cyber Awareness Communication is simply keeping everybody associated with your company up to date with any developments within cyber security, so that they are in a better position to deal with any potential threats.


    • Regular information source communicating cyber security principles
    • Monthly bulletins highlighting emerging risks and cyber crime
    • Distribute to key staff within your organisation
    • Raise awareness of cyber security issues regularly and consistently
  • Product Icon

    E-Learning

    Our e-learning service has been tailored to ensure that your workforce is cyber-aware. Making sure employees have a good understanding of cyber threats and the steps that can need to be taken to avoid a cyber security incident is vital. Training via e-learning can deliver the requisite knowledge to identify and understand the various risks presented by cyber-crime as well as ensuring your executive management understand the associated issues and responsibilities.


    • Cost effective access from anywhere
    • Self-paced & can be re-run
    • Reduced time to course delivery
    • Ideal for mobile or distributed workforce
  • Product Icon

    Cyber Essentials

    Cyber Essentials is a government backed cyber security certification scheme which helps organisations to establish and maintain a good understanding of cyber security.


    • Demonstrates your organisations commitment to cyber security
    • Achieves the recommended standard for supply chain bids & tenders
    • Identify & secure your business critical data
  • Product Icon

    GDPR Tool Box

    GDPR is the European Union’s General Data Protection Regulation. It will come into force on 25 May this year and has been introduced to give EU citizens more control over how their personal data is used.


    • Single repository for GDPR related information
    • Assessment checklists highlight readiness and compliance progress
    • Provides recommendations for adoption of GDPR principles
  • Product Icon

    Continuous Protective Monitoring

    Continuous Protective Network Monitoring is an automated method used to evaluate your security posture and activity. It monitors networks in real time, searching out potential threats to your organisation.


    • Simulated “real world hack” type testing
    • Appropriate test level for your IT infrastructure
    • Easily identifies vulnerabilities and exposure
    • Straightforward reports highlight risks and corrective measures
  • Product Icon

    Vulnerability Assessment

    A Vulnerability Assessment is a series of scheduled vulnerability and attack simulation assessments, designed to identify any security weaknesses which may be present in your network or communications infrastructure.


    • Get scans started quickly with a simple setup process
    • Targets external infrastructure – informs you of your exposure as seen by would be attackers
    • Assessments can be scheduled for a time that suits you and your operations
    • Fully automated service vastly reduces management overhead of manual scans
  • Product Icon

    Information Security Policies

    Information Security Policies are a set of rules, outlined in a number of key policies, which all users within an organisation are requested to abide by, in order that all data, which is stored digitally, remains secure.


    • Manage and maintain a single set of key information security policies
    • Easily distribute to departmental managers or your whole workforce
    • Monitor circulation and record which staff study policy content
  • Product Icon

    Cyber Incident Reporting

    In order to remain vigilant to potential cyber security threats, all events and incidents are logged in a cyber security report. These reports demonstrate any advancements in the threat aimed at your organisation, as well as the steps taken to mitigate the risk.


    • Single point to record cyber incident event information
    • Management of incidents inline with ICO & GDPR
    • Provides incident audit trail and recording of root cause
  • Product Icon

    Email Phishing Campaign

    Email Phishing is an attempt by someone not associated with your company to obtain sensitive information, such as credit card details, by disguising malicious electronic communication as a trustworthy entity.


    • Automated service requires minimal management
    • Test and educate your employees to identify phishing email attacks
    • Highlight vulnerable users and offer appropriate education measures
    • Increase overall cyber security awareness
  • Product Icon

    Risk Register

    A Cyber Risk Register should be used to document any potential threats to your organisation's IT infrastructure and network. Any entries should provide details of the potential threat, as well as the likelihood and impact associated with the threat.


    • Single tool for managing identifiable risks to your business
    • Assign and record values against risk likelihood, owner and impact
    • Plan for risk occurrence and document mitigation approach
  • Product Icon

    Penetration Testing

    Crest approved systematic testing of your security controls to probe and establish your readiness and level of defence to direct attack. We will imitate and recreate attacks to check for potential weaknesses such as poor system configuration and known/unknown hardware or software vulnerabilities.


    • Simulated “real world hack” type testing
    • Appropriate test level for your IT infrastructure
    • Easily identifies vulnerabilities and exposure
    • Straightforward reports highlight risks and corrective measures

About Us

Cyber X is a privately held IT Security company dedicated to protecting critical data and employees within the modern business environment, our pioneering approach has produced an intuitive and feature rich cyber security platform and service that protects data and personnel in their daily activities.

Our aim is to provide peace of mind for our customers by delivering a comprehensive suite of products and services that protect their critical assets and data. We help our customers to mitigate risk, meet compliance requirements and reduce costs so they remain focussed on managing and growing their business.