A global leader in providing technology enabled business solutions and services

  • CSC Cybersecurity, Delivering Cyberconfidence
  • Overview
    • Cybersecurity Services and IT Security Services

      We deliver Cyberconfidence™ on a global scale.

      5 Cybersecurity Predictions for 2013

      Trends in Cybersecurity: A Forecast for 2013. Sam Visner, VP and General Manager, Cybersecurity, shares five trends to watch this year. Read the full article here.

      Additional Links

      Cybersecurity Press Releases

      Contact CSC Cybersecurity

      Follow CSC Cyber: Twitter

      Nearly half of IT executives rated their IT security’s situational awareness as “fair” or worse. Join experts from CSC and CSO Magazine for a closer look at how organizations can protect their assets, survive a cyber attack and achieve cyberconfidence.

      Provides enterprises with a logical, easy to understand approach to looking at contemporary cybersecurity challenges, and our managed security services move far beyond traditional functions to help organizations deal with the most advanced challenges.

      Our cyber expertise is rooted in experience with some of our nation's most security-conscious organizations. Find out more about our capabilities, credentials and clients.

  • Cybersecurity Solutions
    • CSC clients perform business in cyberspace with Cyberconfidence™. CSC delivers a practical, comprehensive, and efficient approach to cybersecurity risk management that keeps pace with today’s dynamic risk landscape.

      Cybersecurity is the most important enterprise goal of this decade. We ensure our IT security solutions exceed industry security standards, helping clients transform risk into opportunity, and allowing them to engage in trusted transactions with customers, partners, supplies, and allies worldwide.

      CSC offers innovative information security programs for compliance management, IT infrastructure and application protection and disaster recovery. We apply the expert services of over 2,000 information security practitioners, industry best practices and best-of-breed tools. Our suite of IT security services is matched to your specific needs and balanced with the scope of value-at-risk.

      Extend the security of your business by enabling extensive visibility, increased compliance, rapid response and the ability to manage threats.

      CSC's Trusted Identity Enterprise Suite™ is an integrated approach which blends the latest technologies, systems, policies and business processes to deliver solutions that are secure and efficient and increase business value.

      CSC’s Business Continuity and Disaster Recovery consultancy evaluates current state and develops future state to ensure business resilience in the event of catastrophic disruption.

      Our Security Consultants help assess security programs, enterprise risk posture and enterprise risk strategy planning and development for our clients. We are focused on identifying and managing risk to protect and create value for our clients.

  • Success Stories
  • Insights
    • We aim to create and share knowledge that helps you address your business opportunities and challenges in security. This section contains thought-leadership pieces, white papers and other publications to help you respond to the emerging issues in cybersecurity.
      Sam Visner Ingenious Minds

      Meet Sam Visner, one of the Ingenious Minds behind our Cyber solutions.

      Mobility and portability have expanded the definition of security far beyond antivirus tools and a firewall to include BYOD security issues. Companies must adopt an integrated security model, one that combines intrusion defense, compliance, risk managemen

      When you’ve achieved Cyberconfidence™ risk doesn’t limit your business potential. Achieve Cyberconfidence with CSC’s Premise-Free Computing and learn how to accelerate your business by extending your enterprise.

      For compliance and security, CSC’s operational Security Operations Center (SOC) uses CSC’s strategic security stack, relies on the Enterprise Security Architecture (ESA), and achieves situational awareness.

  • Publications