Cyber Security

With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from anywhere in the world. CITEC’s security services ensure data is protected by trusted security solutions both on premises and in the cloud.

In collaboration with the Queensland Government Chief Information Office (QGCIO), our cyber-security services make use of an aggregated government internet and private fibre networks to provide visibility and intelligence from a large volume of traffic. Expert security solutions enable the clean, secure delivery of network traffic with the invaluable protection that comes with stringent Queensland Government security policies.

  • 24/7 Support
  • Customised services
  • Dual redundancy, high availability
  • Industry leading SLAs
  • Rapid incident response
  • Vulnerability scanning
Enquire Now

Firewall Management

Firewall Management services deliver the front line of defence against external threats and hostile activity. Customised firewall services ensure a high level of network access and information availability, integrity and privacy, with the option of firewall configuration analysis and full audit capabilities to further assist with risk reduction.

For more information click here.

Intrusion Detection and Prevention System (IDPS)

IDPS provides in-line protection that mitigates network and application level attacks.

The primary functions of intrusion prevention systems are to identify malicious activity, log information about this activity, block and/or stop it and report it.

For more information click here.

Operational Intelligence, Logging and Reporting

This secure log retention, searching and reporting service enables you to monitor a definitive record of all user transactions, customer behaviour, machine behaviour, security threats, fraudulent activity, failing functions and more.

Reverse Proxy and Virtual IP

Reverse proxy enables the delivery of scalable, secure and highly available services to end-users. They provide a customisable layer of abstraction that serves as a bridge between the business and the technical world – empowering you to implement organisational policy with confidence.

The reverse proxy acts as an intermediary between web servers and the external clients/users who attempt to access those web servers.

For more information click here.

Authentication and Remote Access

Authentication services control and authorise access to corporate resources, intellectual property and mission critical business applications using two-factor authentication. Remote access services give you the option of soft or hard security tokens for individuals and secure VPNs for appliance-to-appliance connectivity, always ensuring safe and reliable connections.

DNS Hosting, Resolution and Protection

This service incorporates both DNS hosting (we host your data and provide it to the internet) and DNS resolution (we provide internet DNS information to agencies).

DNS hosting can be provided in either an authoritative configuration where all data is stored on our servers; or a slaving configuration where data is stored on client servers and slaved from there onto CITEC servers for internet visibility.

DNS resolution provides internet DNS resolving services without requiring agency infrastructure to be exposed to the internet. Our DNS system has mitigations in place to reduce the likelihood of misuse of and attack on the DNS infrastructure.

For more information click here.

Managed Detection and Response

Managed Detection and Response provides a 24/7 automated threat alerting service complemented by proactive protections through our forward defence capability. Expert analysts and threat hunters partner with your teams to provide greater visibility into your environment, achieve contextual threat detection and response, manage risk and improve your security posture.

For more information click here.

SSL Certificates

SSL certificates are the backbone of a secure internet. CITEC can provide SSL services for both certificate use and acquisition. These services help you protect sensitive information as it travels around the world by encrypting connections between browsers and web servers, while simultaneously adding security by preventing message tampering and eavesdropping.