Cyber security

Protecting UK education and research

Your trusted partner

The security threat landscape is always evolving, but so are we. As the sector’s trusted security partner and provider of the UK’s national research and education network (NREN), we make it our business to stay abreast of current challenges and share intelligence and expert advice with customers.

Join the cyber security community.

Accreditations

NCSC CIR Level 2 service provider logo
Cyber Essentials logo
CREST pen test and CSIR logos

Our products and services

Critical foundations

It is crucial to take advantage of the key security services included with your Janet connection.

Foundation DDoS mitigation
Protecting your Janet Network connection during normal business hours, with an on-call out-of-hours service.

Primary nameserver
Translate domain names to IP addresses securely.

Janet Network resolver
Block malicious domains with specialist threat intelligence.

Network time
Synchronise time for network precision and security.

Cyber threat intelligence
Proactive cyber threat intelligence for education and research.

Cyber security incident response team (CSIRT)
Safeguard your computer security with ongoing support from our dedicated team.

Increase resilience

As the security partner for UK education and research, we tailor our services to the needs of the sector.

DDoS foundation plus
Around the clock automated protection for your Janet Network connection, with enhanced network protection at key times of the year.

Critical services protection
Protect business critical services from DDoS attacks.

Managed firewall
Automatically detect and mitigate a range of threats.

Cyber security threat monitoring
Enabling you to monitor and respond to security anomalies through a single dashboard.

Provide assurance

Assessments, testing and certifications enable you to demonstrate your commitment to security as well as proactively identify and mitigate vulnerabilities.

Cyber Essentials
Gain and renew certification to help ensure vital precautions are in place.

Cyber security assessment
Evaluate, analyse and improve your cyber security.

Penetration testing
Evaluate and improve the security of your system and network by simulating real-world attacks.

IT Health Check
An NCSC-backed scheme comprising a series of controlled penetration tests and security control check.

Defend as one

Make full use of all the added-value services included as part of your secure Janet connection.

Take the next step in improving your organisation’s security posture

Customer stories

'It’s safe to say we would not have recovered as quickly or cope as well without the help of Jisc who were able to deploy resources and experience and skills pretty much immediately on site.'

Deputy chief executive, chief operating officer, E-ACT

Training

Opportunities to build your security awareness

Test your infrastructure, policies and procedures with a realistic simulated incident.

Have your Cyber Essentials and Cyber Essentials Plus questions answered.

Learn how to test a computer system, network or web application to find security vulnerabilities.

Useful resources

Gauging how the UK education and research sectors are dealing with the evolving threat of cyber attacks.

The impact of cyber security incidents on the UK's further and higher education and research sectors.

16 questions you need to ask to help you strengthen your position.

Matthew Cranfield, head of IT at Croydon College discusses their journey through Cyber Essentials certification.

An easy route to procurement

We are an approved supplier on the Crown Commercial Service dynamic purchasing system (DPS). This provides a simple and trusted way for public sector buyers and our members to procure Jisc cyber security services.

Jisc is now offering security and additional cloud services via the G-Cloud 13 procurement framework.

Find out more on the Crown Commercial Service website.

Crown commercial service supplier logo

Cyber security blog

From tips and tricks to topical insights, follow our blog for the latest in cyber security developments.

Visit our cyber security blog.