Our core vendor partners that develop innovative and effective IT security tools
BeyondTrust cyber security solutions deliver the visibility to reduce risks and the control to act against internal and external data breach threats.
Whether in the cloud or on-premises, Imperva delivers cyber security that protects all your data and applications.
Imprivata OneSign® offers single sign-on, authentication management, and virtual desktop roaming enabling fast, secure access to applications.
SecurEnvoy provide a solid and reliable innovative solution for two factor authentication that millions of users experience everyday that’s easy to use, manage and deploy.
Network and endpoint protection, centrally managed and communicating together. For stronger, simpler security.
LogRhythm’s security intelligence and analytics platform enables organizations to detect, prioritize and neutralize cyber threats that penetrate the perimeter or originate from within.
Regardless of content, database, or application—whether physical, virtual, or in the cloud—Vormetric Data Security enables conﬁdence, speed, and trust by encrypting the data that builds business.
SecuPi addresses all high-risk web and enterprise application security and regulatory requirements.
updates from our vendor partners, and the industry in general
Reduce Time to Detect and Respond to Cyber Threats—Without Additional Resources Today’s reality is that organisations will continue to be confronted by increasingly frequent and complex cyber threats There is the older prevention-centric strategy that naively assumes all threats can be blocked at the perimeter, leaving you blind to threats that do get in. Instead,[…]
By Scott Carlson, February 15th, 2017. New (US) guidelines for credit unions have recently been released by the NCUA (National Credit Union Administration) including a focus on “Cyber-security, Insider Threat and Security Clearance Reform, Open Data, and People and Culture.” When you look at the priorities, and include advancing technology paired with the needs of[…]
Bill Brenner (Sophos) – 17 Feb, 2017. It’s day 4 of RSA Conference 2017 as I write this. For me, the event ends with a flight home in a few hours. Before doing so, a review of the week is in order. Journalists often write preview stories for RSA, and we’re no exception. My preview appeared on Naked[…]
Majority of global healthcare enterprises using cloud, big data and IoT without securing sensitive data Thales, a leader in critical information systems, cybersecurity and data security, announces the results of its 2017 Thales Data Threat Report, Healthcare Edition, issued in conjunction with analyst firm 451 Research. The fifth annual report indicates global healthcare IT professionals[…]
In computing “Break Glass” is the act of checking out a system account password to bypass normal access controls procedures for a critical emergency. This provides the user immediate access to an account that they may not normally be authorized to access. This method is generally used for highest level system accounts such as root[…]
LogRhythm 7.2 Boosts Effectiveness and Efficiency of Enterprise SOCs More powerful machine analytics, embedded security automation and orchestration, and enhanced performance at scale extend differentiation for company’s threat lifecycle management solution (November 2016) — LogRhythm, he Security Intelligence Company, today announced the release of LogRhythm 7.2, a major upgrade to its leading security[…]
(by Karen Scarfone) My colleague, Steve Piper, and I just finished writing a free ebook: The Definitive Guide to Security Intelligence and Analytics. In this comprehensive ebook, we cover how you can use security intelligence and analytics technologies to greatly improve detection and to stop threats before damage can be done. The ebook has three[…]
A brief demonstration on how to create a Asset Based and Vulnerability Based Smart Rule using BeyondInsight. source
Ransomware has the potential to cause massive disruption to an organization’s productivity. So it’s vital to understand how to build the best possible defense against it. The producers of ransomware aren’t just idly waiting for their bit of malware to hit its target. They work in professional teams, constantly updating and enhancing new variants of[…]
In 1993, I had the privilege of working with a brilliant engineer who developed and patented a technology called Above Real Time Training (ARTT). The concept was applied to military flight simulators to train pilots how to deal with high speed, stressful engagements, by making the simulators operate at speeds faster than real time. It[…]
The real perpetrator of the widespread Internet outage on Friday, October 21, 2016 is still not known but the weapon of choice was definitely IoT devices compromised with Mirai malware. The Distributed Denial of Service (DDoS) attack that started on the East coast of the US targeted DNS provider Dyn, and appears to have comprised[…]
Highly regulated industries have always led the way for best practices in accounting, information technology, and cyber security. Laws and regulations have mandated certain procedures to be followed and in order to gain a competitive advantage, shortcuts that are now regulated have been eliminated. This has leveled the playing field from money spent on data[…]
Key Focus Areas
Some of the core security challenges we help address
PRIVILEGED ACCESS MANAGEMENT
Tools to help attain a least privilege approach – where permissions are granted to those that need it, when they need it and only for the time required.
Enforce strong (multi-factor) user authentication to assets. Simplify the cost and complexity of network authentication management.
Advanced transparent encryption, powerful access controls, and centralized key management lets organizations encrypt everything efﬁciently, with minimal disruption.
Monitor and audit access to sensitive information across high-risk web and enterprise applications, apply UBA and a central privilege access policy to instantly dynamically mask or redact sensitive data in real-time with no code or DB changes.
Increase user productivity and reduced password management costs by enabling single sign-on (SSO) to all your enterprise applications.
Manage what does and doesn’t reach your users and applications through traffic filtering at the gateway or in the cloud. Including web, email, WAF and DDOS.
Large-scale, cross-platform, prioritised vulnerability assessment and remediation, with configuration compliance and compliance reporting available.
Intrusions happen, threats emerge – see them when they do and neutralize them fast. Knowing what to investigate after detection, and how to respond quickly, is imperative.
CoreSight are an Australian VAR that discover and deliver innovative, best-of-breed security technologies for our clients.
Our aim is to continually seek innovation in the security market, and to be the first to share the most beneficial of these new ideas, products and services with our clients.
Current vendor partners include BeyondTrust, Imperva, Vormetric, SecuPi, LogRhythm, SecurEnvoy and Sophos. We deliver these tools and supporting services to clients primarily in the finance, healthcare, manufacturing and government sectors.
CoreSight was founded in 2003 and services clients throughout Australia and New Zealand.
% of Breaches
had a financial or espionage motive
Months or Years
Time taken to discover insider and privilege misuse was months or years in 70% of cases
% OF CYBER-ESPIONAGE BREACHES
capture trade secrets or proprietary information
* figures from Verizon 2016 Data Breach Investigations Report