cyber-security-matrix2-portrait
What’s better than open source software? What’s better than commercial software? The perfect blend of both!
 
Wouldn’t you like your Macs supported with the very best tools, no matter the cost? Get protected by software originally deployed at FaceBook, Google and Netflix?
 
It’s easier to simply pay for commercial tooling and accept the limitations of what you’re given. We chose to take the best available software and tools and develop our own solutions despite the difficulty.
 
This means instead of a SOC team developing a single solution, we can leverage the insight of thousands of contributors worldwide.
 
This isn’t a one way street though- we also contribute back to the community. This sets us apart from others and you benefit. 
 
If you’d like a review of cyber security within your business, please get in touch by calling 1300 000 629, or fill in the form on our contact page.
 
Have a look at the inclusions below- a lot of this is included in our standard service too!

 $20,000 Labour Guarantee

Confidence that we won’t ghost you if there’s an incident
 

🔐 Security Assessment & Risk Management

  • Initial Risk Assessment (vulnerabilities, threat landscape)

  • Asset Inventory (systems, devices, software)

  • Business Impact Analysis

  • Risk Register and Mitigation Plan

     

🛡️ Network Security Controls

  • Firewall Management (configuration, monitoring)

  • Intrusion Detection/Prevention Systems (IDS/IPS)

  • Secure VPNs and remote access controls

  • Segmentation of networks (e.g., VLANs, guest networks)

💾 Endpoint Protection

  • Antivirus / EDR (Endpoint Detection and Response)

  • Mobile Device Management (MDM) if relevant

  • Application Whitelisting / Control

  • Patch Management for OS and third-party apps

🧑‍💼 Identity & Access Management

  • Multi-Factor Authentication (MFA)

  • Role-Based Access Control (RBAC)

  • Password Policies (length, rotation, reuse)

  • Single Sign-On (SSO) / Federated Identity (if applicable)

📧 Email & Web Security

  • Spam Filtering and Phishing Protection

  • Attachment Sandboxing

  • URL Rewriting & Link Scanning

  • DMARC, DKIM, SPF configuration

🔍 Monitoring, Detection & Response

  • Security Information and Event Management (SIEM)

  • 24/7 Automated Monitoring

  • Log Collection & Retention

  • Automated Alerts and Incident Ticketing

     

🔄 Backup & Disaster Recovery

  • Automated Backups (on-site and off-site/cloud)

  • Disaster Recovery Plan (DRP)

  • Regular Testing of restores and failovers

  • RPO/RTO Targets defined

📋 Security Policies & Training

  • Acceptable Use Policy (AUP)

  • Data Classification Policy

  • Remote Work Security Policy

  • End-User Awareness Training (phishing, password hygiene)

⚖️ Compliance & Regulatory Alignment

  • GDPR, HIPAA, ISO 27001, NIST CSF, or other relevant frameworks

  • Audit Support

  • Policy Documentation

  • Gap Analysis Reports

     

🔄 Ongoing Maintenance & Review

  • Quarterly Business Reviews (QBRs)

  • Vulnerability Scanning & Remediation

  • Policy Review and Update Cycle


Advanced Inclusions

  • Dark Web Monitoring

  • Threat Hunting

  • Deception Technology (honeypots, traps)