we provide IT security technologies and services
to help organisations
Prevent Significant Data Breaches

Usually this means you'll have a complex IT environment, or security requirements such as compliance or your own customers' needs.
Industries we work in regularly include government (Federal and State), finance, business services, healthcare, telecommunication and retail.

__CONFIG_optin__{"optin": 0,"color":"red","size":"medium","text":"Yes, Sign Me Up!","layout":"horizontal"}__CONFIG_optin__

Technologies and Services we Deliver Include:


Strong Authentication

Enforce strong (multi-factor) user authentication to assets.
Simplify the cost and complexity of B2B, B2C and M2M authentication management.

Privileged Access Management

Tools to help attain a least privilege approach – where permissions are granted to those that need it, when they need it and only as required.

Vulnerability Management

Large-scale, cross-platform, prioritised vulnerability assessment and remediation, with configuration compliance and compliance reporting available.

SIEM

Intrusions happen, threats emerge – see them when they do and neutralize them fast. Knowing what to investigate after detection, and how to respond quickly, is imperative.

Gateway Security

Manage what does and doesn’t reach your users and applications through traffic filtering at the gateway or in the cloud. Including web, email, WAF and DDOS.

Encryption and Key Management

Advanced transparent encryption, powerful access controls, and centralized key management lets organizations encrypt everything efficiently, with minimal disruption.

Advanced Endpoint

From anti-ransomware protection to least privilege and all in between. Including outstanding defence against zero day attacks and powerful root cause analysis.

Security Consulting

Strategy development, programme reviews, risk assessments, gap analysis, red teaming and pen testing.  We use in-house and external experts to deliver great results.

Advanced Analytics

The ability to 'put it all together' and see the bigger picture is essential when dealing with stealthy attackers.  A range of technologies to complement your existing tools.

Vendors we Partner with Include:

BeyondTrust Logo

BeyondTrust security technologies provide the visibility to reduce risks and the control to act against internal and external data breach threats.

LogRhythm’s security intelligence and analytics platform enables organizations to detect, prioritize and neutralize cyber threats that penetrate the perimeter or originate from within.

Vormetric (Thales)

Regardless of content, database, or application — whether physical, virtual, or in the cloud — Vormetric Data Security enables confidence, speed, and trust by encrypting the data that builds business.

Network and endpoint protection, centrally managed and communicating together. For stronger, simpler, security.

Whether in the cloud or on-premises, Imperva delivers cyber security that protects all your data and applications.

SecurEnvoy provide a solid and reliable innovative solution for two factor authentication that millions of users experience everyday that’s easy to use, manage and deploy.

Twilio (Authy)

Everybody should use two-factor authentication.  Want a better solution to Google’s Authenticator app?  And Twilio's "comms via API".

CyCognito Logo

IT teams use CyCognito to view attacker-exposed assets, all of which are automatically classified based on business function.  Once identified, risks are assessed and mitigations able to be prioritised.

SecureAuth Small

SecureAuth offer threat-aware identity, access, authentication and vulnerability management solutions to help your team control access, reduce risk, and maintain compliance.

Trusted Impact

Trusted Impact are a security consultancy focused entirely on helping you achieve your business objectives across the scope of information security.

RedShield is a world first “cyber security as-a-service” offering that shields & protects web applications. How do you compete with nimble motivated hackers?

We work with Barracuda across their range of content security, data protection and disaster recovery technologies.

Pcysys Logo

Agentless, continuous penetration testing.  Change is constant, so testing should be too.  Pcysys assures you can safely validate your cybersecurity posture daily to keep your guard up at all times.

ITsMine Logo

ITsMine have developed a unique, proactive approach to Data Loss Prevention (DLP).  A fully automated solution with negligible false positives and without affecting productivity.

Cloudbridge

Cloudbridge have created an innovative, secure IT automation platform that transforms manual, laborious IT tasks into well-oiled predictable, streamlined, repeatable and managed processes.

Recent Updates:

Why 'traditional' application security measures usually fail - and one approach that works. https://links.coresight.com.au/broken-appsec #appsec

Image for the Tweet beginning: Why 'traditional' application security measures

Service Accounts – A Privileged Access Risk? https://links.coresight.com.au/iYhwX via @BeyondTrust

Image for the Tweet beginning: Service Accounts – A Privileged

Why 'traditional' application security measures usually fail - and one approach that works. https://links.coresight.com.au/broken-appsec #appsec

Image for the Tweet beginning: Why 'traditional' application security measures

Ransomware Attacks Healthcare with Potentially Devastating Consequences https://links.coresight.com.au/ZEaju - via @CyCognito

Image for the Tweet beginning: Ransomware Attacks Healthcare with Potentially

Gartner 2020 Magic Quadrant for Privileged Access Management (PAM) Again Recognise BeyondTrust as a Leader https://links.coresight.com.au/Enxeo via @BeyondTrust #PAM #quadrant #2020

Image for the Tweet beginning: Gartner 2020 Magic Quadrant for
Load More...
App Security in a Direct-to-Cloud Model
(Forcepoint, 2019)  Everyday more organisations embark on a ‘direct-to-cloud’ path.  This can lead to improvements in performance, operations and cost[...]
Adding Context to Trust – An Approach that Helps Protect Critical Data
(Forcepoint, Oct 2018)  Let’s be clear:  organisations today face real challenges protecting critical data. And it isn't just obvious targets,[...]
Viewing Security through an Identity Lens
(SecureAuth, Nov 2018)  I have always been amazed that Superman became unrecognizable as soon as his alter ego Clark Kent[...]

Contact:

Contact Us