Cyber security threat monitoring

Cyber security threat monitoring

Update: 2025-07-17
Share

Description

Join Steve Howard, head of product, and Darren Jones, cyber solutions consultant, for a deep dive into Jisc's Cyber security threat monitoring (CSTM) service.

Learn how CSTM helps organisations improve visibility across their infrastructure by consolidating key security data into a single, easy-to-use dashboard, all closely monitored by Jisc’s security analysts. 

We also explore how CSTM integrates with existing systems, from servers and firewalls to cloud platforms and EDR tools, and discuss the benefits of its UK-hosted, cloud-native platform. 

We also outline how detection rules are continually updated to keep pace with evolving threats, and give a glimpse into future enhancements, including integrations with Jisc’s wider SOC and new use cases to help members get even more value from their security data.

Learn more about CSTM on jisc.ac.uk

Explore our new Security operations centre service (SOC)

Join our cyber security community group today

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Cyber security threat monitoring

Cyber security threat monitoring