OUR CYBER SECURITY PARTNERS - THE BEST OF THE BEST
MSD Information Technology is an Australian Managed Service Provider who believes that technology should support and enhance an organisations success, not constrain it. MSD are experts in the SME Business environment, helping companies to grow without ICT limits. MSD has assisted in client growth from a single staff member at 1 office to 100 staff across multiple offices over a wide range of industries and collaborate with Avantia Cyber Security to execute the technical and operational aspects of Cyber Security and Cyber Resilience.
ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions to private and public sector organizations and to millions of individuals impacted by cyber incidents. The company's flagship product, Dark Web ID, combines human and sophisticated Dark Web intelligence with capabilities to identify, analyse and monitor for compromised or stolen employee and customer data, mitigating exposure to clients’ most valuable assets – their digital identity.
Huntsman provides security technology to measure, report and reduce cyber risk to enable the digital transformation of governments and business to more efficient operating models, while at the same time complying with the increasing demands of legislative requirements. Huntsman's 'Essential 8 Auditor' is a cybersecurity auditing tool that provides an objective, quantitative measure of an organisation’s cyber posture to determine and alert organisations to any gaps in key cyber defense strategies. The Essential 8 (E8) Framework was developed by the Australian Signals Directorate (ASD). It is a prioritised list of practical security controls that organisations can implement to make their organisation’s information more secure and has been found to mitigate up to 85% of cyber attacks.
With Cyber Security experts estimating that up to 70% of all Data Breachers are caused by company insiders including 30% of these breaches being malicious, it is vital for organisations to compete regular Employee Background Checks checks as part of their ‘Cyber Risk Mitigation Strategy’. Background vetting includes a confidential one-on-one background screening interview covering areas such as criminal history, illegal drug use, financial stress, adverse work behavior, security breaches, false or inflated CVs and more. Vetting is carried out by 'Stephanie' the worlds first Artificial Intelligence Vetting Officer. Reports are PSPF Compliant to Federal Government Standards.
Many cybersecurity incidents today are the result of internal security issues that no firewall or anti-virus could have prevented. Cyber Hawk combines machine learning and intelligent tagging to identify anomalous activity, suspicious changes, and threats caused by misconfigurations. It is uploaded remotely on your Windows-based Endpoints (Desktops/Laptops/Tablets) and keeps you posted of any potential internal security issues going on inside your network. Set the time for the daily scan and Cyber Hawk reports back with an email alert sent to any address you specify. The daily alerts aggregate the issues that were detected during the past 24 hours and can be sorted either by priority/severity (high, medium and low) of the threat, or by the type of issue (threat, anomaly, change).
Unitrends makes efficient, reliable backup and recovery as effortless and hassle-free as possible. Unitrends combine deep expertise gained over thirty years of focusing on backup and cloud storage purpose-built to make data protection simpler, more automated and more resilient than any other solution in the industry. Up to 1 TB of cloud storage is included for each workstation, more than enough for even the largest endpoints. No fees to access your data or restore files, and recovery is self-service. No surprises. No gotchas. Just simple, cost-efficient endpoint protection that you would expect from a company with over 30 years of experience.
For over 20 years, WatchGuard has pioneered cutting-edge cybersecurity technology and delivered it as easy-to-deploy and easy-to-manage solutions. With industry-leading network security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables more than 80,000 small and midsize enterprises from around the globe to protect their most important assets. In a world where the cybersecurity landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cybersecurity technology accessible for every company. WatchGuard is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America.
Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, and servers in your network against malware, risks, and vulnerabilities. Symantec Endpoint Protection combines virus protection with advanced threat protection to proactively secure computers against known and unknown threats, such as viruses, worms, Trojan horses, and adware. Providing low maintenance and high power across all operating systems, Symantec Endpoint Protection communicates over your network to automatically safeguard both physical systems and virtual systems against attacks.
LastPass is a Password Manager that stores encrypted passwords online. The standard version of LastPass comes with a web interface, but also includes plugins for various web browsers and apps for many smartphones. As a password manager, LastPass will help you in your day-to-day work while improving the overall security of your online life. Key benefits of using LastPass include: Convenience – No more forgotten or mistyped passwords; Time saved – Instantly log in to websites; Stronger security – Long passwords that you don't have to remember.
Passly is our Digital Risk Protection Platform. With the mass migration to remote work and the increased dependency on cloud applications to run daily business operations, Secure Identity and Access Management is the cornerstone of enabling the right people to have the right resources - all from the right devices and locations. Passly includes state-of-the-art features to protect your systems and data, including multi-factor authentication, secure password vault, single sign-on, and integration with Dark Web ID to view exposed credential hits. Passly is the ideal security solution for today’s remote workforce – at a fraction of the price of other tools.
The BullPhish ID platform delivers simulated phishing attacks and security awareness training campaigns designed to educate employees, making them the best defense against cybercrime. 22 engaging training videos and online quizzes offered by BullPhish ID are available in the following languages, in addition to English: Dutch; French; German; Italian;
Portuguese; Spanish (Iberian/European) and Spanish (Latin) Employees learn best in their native language. By offering BullPhish ID training videos with translations in seven additional languages, we’re making security awareness training more accessible to users around the world. Training your employees about the dangers and risks of cybersecurity is the first line of defense by expanding and empowering companies and their employees to take action against cyber threats and to shore up protection of digital identities and corporate assets.
IT Governance is a leading global provider of cyber risk and privacy management solutions, with a special focus on cyber resilience, data protection, PCI DSS, ISO 27001 and cybersecurity. In an increasingly punitive and privacy-focused business environment, they are committed to helping businesses protect themselves and their customers from the perpetually evolving range of cyber threats. Their deep industry expertise and pragmatic approach helps their clients improve their defences and make key strategic decisions that benefit the entire business.
Without proper attention to the physical security of information assets, your IT Data and Infrastructure are subject to security threats from known or unknown sources looking to steal or compromise your IP. The risk of physical security breaches, internally or externally, to your IT Systems, are critical to protecting your most valuable asset: Data. Physical protection includes essential Alarms and Monitoring; CC TV Systems; Access Control Systems; Intercoms; Cameras and Backup Systems. At Perimeter Security, we are experts in Assessing, Supplying, Installing and Monitoring robust Security Infrastructure to suit all your needs.
If you feel that any of the above services could be of benefit to your business please contact Paul Nielsen on +61 7 30109711 Office Hours for a confidential no-obligation discussion about your needs.