With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from anywhere in the world. Our security services ensure data is protected by trusted security solutions both on premises and in the cloud.

In collaboration with the Queensland Government Chief Information Office (QGCIO), our cyber-security services make use of an aggregated government internet and private fibre networks to provide visibility and intelligence from a large volume of traffic. Our expert security solutions enable the clean, secure delivery of network traffic with the invaluable protection that comes with stringent Queensland Government security policies.

  • 24/7 Support
  • Customised services
  • Dual redundancy, high availability
  • Industry leading SLAs
  • Rapid incident response
  • Vulnerability scanning
Enquire Now

Queensland Government Network Cyber Security

Partnering with the QGCIO, our cyber-security systems include a number of mitigations to keep your data and network safe from threats. Standard to all customers of Queensland Government Internet and available to all other users, our services include Denial of Service (DoS) protection, Domain Name System (DNS) hosting and blocking, Queensland Government Internet Gateway monitoring and Intrusion Detection and Prevention Systems (IDPS).

Firewall Management

Our Firewall Management services deliver the front line of defence against external threats and hostile activity. Our customised firewall services ensure a high level of network access and information availability, integrity and privacy, with the option of firewall configuration analysis and full audit capabilities to further assist with risk reduction.

Web Application Firewall (WAF)

As an additional layer to an IDPS and firewall, our WAF system mitigates the risk of a potentially vulnerable web application. WAF deployment will help mitigate threats by securing web applications against detected vulnerabilities.

Operational Intelligence, Logging and Reporting

Our secure log retention, searching and reporting service enables you to monitor a definitive record of all user transactions, customer behaviour, machine behaviour, security threats, fraudulent activity, failing functions and more.

Authentication and Remote Access

Our authentication services control and authorise access to corporate resources, intellectual property and mission critical business applications using two-factor authentication. Our remote access services give you the option of soft or hard security tokens for individuals, and secure VPNs for appliance-to-appliance connectivity, always ensuring safe and reliable connections.

SSL Certificates

SSL certificates are the backbone of a secure internet and we can provide SSL services for both certificate use and acquisition. Our services will help you protect sensitive information as it travels around the world by encrypting connections between browsers and web servers, while simultaneously adding security by preventing message tampering and eavesdropping.

Managed Detection and Response

Our Managed Detection and Response Service provides a 24×7 automated threat alerting service complemented by proactive protections through our forward defence capability. Our expert analysts and threat hunters partner with your teams to provide greater visibility into your environment, achieve contextual threat detection and response, manage risk and improve your security posture.