Our core vendor partners that develop innovative and effective IT security tools
BeyondTrust cyber security solutions deliver the visibility to reduce risks and the control to act against internal and external data breach threats.
Whether in the cloud or on-premises, Imperva delivers cyber security that protects all your data and applications.
Imprivata OneSign® offers single sign-on, authentication management, and virtual desktop roaming enabling fast, secure access to applications.
SecurEnvoy provide a solid and reliable innovative solution for two factor authentication that millions of users experience everyday that’s easy to use, manage and deploy.
Network and endpoint protection, centrally managed and communicating together. For stronger, simpler security.
LogRhythm’s security intelligence and analytics platform enables organizations to detect, prioritize and neutralize cyber threats that penetrate the perimeter or originate from within.
Regardless of content, database, or application—whether physical, virtual, or in the cloud—Vormetric Data Security enables conﬁdence, speed, and trust by encrypting the data that builds business.
SecuPi addresses all high-risk web and enterprise application security and regulatory requirements.
updates from our vendor partners, and the industry in general
LogRhythm 7.2 Boosts Effectiveness and Efficiency of Enterprise SOCs More powerful machine analytics, embedded security automation and orchestration, and enhanced performance at scale extend differentiation for company’s threat lifecycle management solution (November 2016) — LogRhythm, he Security Intelligence Company, today announced the release of LogRhythm 7.2, a major upgrade to its leading security[…]
(by Karen Scarfone) My colleague, Steve Piper, and I just finished writing a free ebook: The Definitive Guide to Security Intelligence and Analytics. In this comprehensive ebook, we cover how you can use security intelligence and analytics technologies to greatly improve detection and to stop threats before damage can be done. The ebook has three[…]
A brief demonstration on how to create a Asset Based and Vulnerability Based Smart Rule using BeyondInsight. source
Ransomware has the potential to cause massive disruption to an organization’s productivity. So it’s vital to understand how to build the best possible defense against it. The producers of ransomware aren’t just idly waiting for their bit of malware to hit its target. They work in professional teams, constantly updating and enhancing new variants of[…]
In 1993, I had the privilege of working with a brilliant engineer who developed and patented a technology called Above Real Time Training (ARTT). The concept was applied to military flight simulators to train pilots how to deal with high speed, stressful engagements, by making the simulators operate at speeds faster than real time. It[…]
The real perpetrator of the widespread Internet outage on Friday, October 21, 2016 is still not known but the weapon of choice was definitely IoT devices compromised with Mirai malware. The Distributed Denial of Service (DDoS) attack that started on the East coast of the US targeted DNS provider Dyn, and appears to have comprised[…]
Highly regulated industries have always led the way for best practices in accounting, information technology, and cyber security. Laws and regulations have mandated certain procedures to be followed and in order to gain a competitive advantage, shortcuts that are now regulated have been eliminated. This has leveled the playing field from money spent on data[…]
There was a time when two-factor authentication was a major undertaking. New servers had to be installed, security tokens had to be purchased, distributed and registered to their owners and then Support desks had to be created to handle queries from users and to service requests for replacements for lost tokens. But that was then[…]
BeyondTrust is pleased to announce that we have been named a Leader in The Forrester WaveTM: Privileged Identity Management, Q3 2016 report! We would like to share a complimentary copy of the report with you, so you can benefit from the trends, insight, and market and vendor analysis that Forrester offers in this important report.[…]
View AllBlogEducationNewsroom Morey Haber, July 27th, 2016 (Morey Haber – July 2016) BeyondTrust has been providing secure appliances since 2007 for their Retina vulnerability management solutions, and since 2012 for PowerBroker privileged access management solutions. BeyondTrust’s UVM appliances feature the BeyondInsight platform which unifies vulnerability management, privilege management, and threat analytics into a single pane[…]
Sophos Central has integrated many of the products a business needs to stay secure. However, we realize that many organizations have products from multiple vendors and leverage a SIEM (security information and event management) to try to make sense of all the security events produced by all those disparate products. With data flowing fast, IT[…]
Sure, no law has been broken. However, I’m sure WADA (and some other leading athletes world-wide – the list gets longer by the day) didn’t want to have this informationleaking out to public knowledge. And so we’ve come to learn about the above information as a result of a hack done by a group referred[…]
Key Focus Areas
Some of the core security challenges we help address
PRIVILEGED ACCESS MANAGEMENT
Tools to help attain a least privilege approach – where permissions are granted to those that need it, when they need it and only for the time required.
Enforce strong (multi-factor) user authentication to assets. Simplify the cost and complexity of network authentication management.
Advanced transparent encryption, powerful access controls, and centralized key management lets organizations encrypt everything efﬁciently, with minimal disruption.
Monitor and audit access to sensitive information across high-risk web and enterprise applications, apply UBA and a central privilege access policy to instantly dynamically mask or redact sensitive data in real-time with no code or DB changes.
Increase user productivity and reduced password management costs by enabling single sign-on (SSO) to all your enterprise applications.
Manage what does and doesn’t reach your users and applications through traffic filtering at the gateway or in the cloud. Including web, email, WAF and DDOS.
Large-scale, cross-platform, prioritised vulnerability assessment and remediation, with configuration compliance and compliance reporting available.
Intrusions happen, threats emerge – see them when they do and neutralize them fast. Knowing what to investigate after detection, and how to respond quickly, is imperative.
CoreSight are an Australian VAR that discover and deliver innovative, best-of-breed security technologies for our clients.
Our aim is to continually seek innovation in the security market, and to be the first to share the most beneficial of these new ideas, products and services with our clients.
Current vendor partners include BeyondTrust, Imperva, Vormetric, SecuPi, LogRhythm, SecurEnvoy and Sophos. We deliver these tools and supporting services to clients primarily in the finance, healthcare, manufacturing and government sectors.
CoreSight was founded in 2003 and services clients throughout Australia and New Zealand.
% of Breaches
had a financial or espionage motive
Months or Years
Time taken to discover insider and privilege misuse was months or years in 70% of cases
% OF CYBER-ESPIONAGE BREACHES
capture trade secrets or proprietary information
* figures from Verizon 2016 Data Breach Investigations Report