Perth’s fourth annual cyber security and hacking contest, WACTF 2020 (WA Capture the Flag), kicked off on Saturday 12th December with a bigger and more enthusiastic group of cyber sleuths than ever before.
Leverage security technologies integrated with global intelligence and local insight and expertise for increased visibility and faster detection of attacks specific to your organisation.
To protect your operations and the people you value, we’ve built a comprehensive cyber security capability to share your security risk.
Our specialist security crew leverage deep knowledge of customer operations to set new standards in delivering PROTECT+ to continually elevate the protection of crucial business assets.
Faster detection and increased visibility of attacks specific to your organisation.
Connected global intelligence, combined with local knowledge & understanding.
Direct access to our partners & international security experts located onshore.
This core Security Operations Centre (SOC) service is focused on detecting suspicious behaviour through analysis of patterns, trends and anomalies in your network. Tightly integrated with the MITRE ATT&CK™ framework, our SOC team employs known tactics, techniques and procedures to identify and surface potential threat actors in your environment.
Leveraging integration with cloud access security broker (CASB) services, our expert team monitors and assesses all aspects of your cloud environment, including custom applications and databases to identify and treat potential vulnerabilities. We apply policies within your cloud environment to prevent the loss of data through malicious or unintentional means
In the case of an active cyber threat, our Incident Response team rapidly assesses the cause, scope and potential of an attack, using evidence collected through digital forensics and systems analysis. The team leverages threat intelligence and indicators of compromise to contain and neutralise the attack and restore operational security.
Combining contemporary security technologies with human expertise, our Security Analysts and Threat Researchers integrates our global threat intelligence with telemetry and analytics across your environments to identify Indicators of Compromise (IOC) and Indicators of Attack (IOA) aligned to the proven techniques and tactics of the attacker. This enables proactive breach prevention while allowing for fast remediation in the event of an incident.
Our expert security analysts research and investigate current threats and attacks to provide you with insightful knowledge on malicious activity threatening your organisation's network. This means we are able to provide expert advice on how to detect, respond and stop general or targeted threats.
Advanced User and Entity Behaviour (UEB) analytics provides contextual insight into suspicious or abnormal behaviour in your network. Analysts establish a baseline of network activity which is then used to identify anomalous activity and assess its risk based on the behaviour. This rule-less detection capability provides an advanced lens on security threats to your organisation based on what 'normal' activity looks like.