* Denotes a company that has benefited from the AustCyber Projects Fund to complete commercialisation and/or further innovate.
Stretch goal – kick the password
Not only does Australian invention and ingenuity play here, you also get choice on the context.
Forticode's Cipherise removes the need for passwords to support MFA – and levels up by making the process bi-directional. It can be white labelled and is highly scalable. Call centres, banks, utilities, eCommerce, G2G, G2B, B2B, B2C and in the future perhaps C2C (think smartgrids). Cypherise can also protect virtual desktop/server sessions via a browser on any computer without needing to install anything on the client computer, managing legitimate access.
*Laava.id’s Smart Fingerprint has as many use cases as you can think of supporting product traceability, brand integrity (watch this space on a highly visible brand coming soon), document verification and identity management, and so on.
These two companies are also looking at ways to go further through partnership. Watch this space.
Focus on training up
Whether staff have a bit more time available with less travel and meetings – or they are on split rotations/shifts for continuity – now is a great time to deploy scalable and measurable online cyber training. Use sovereign providers who know your operating circumstances, contexts and appreciate the nuances of a multilingual (verbal and technical) workforce with different competencies and skill levels.
Cyber Aware – cyber 101 training and beyond for your whole organisation, not just the teams you work concurrently with; mapped to the NICE Framework.
*Fifth Domain – virtualised on demand, customisable and off the shelf cyber training for teams at any level of competency and maturity delivered through a web browser; mapped to the NICE Framework.
OK RDY – supporting training outcomes, this Australian company provides the structure to sustain flash mentoring and longer term mentoring in a meaningful and measurable way; have a cyber specific program.
Merimetso – levelling up for the highly technical, advanced environments requiring the sharpest of cyber skills; mapped to Cyber Scheme.
Secure Code Warrior – virtualised, customisable and off the shelf training that enables software developers to code securely.
Digital asset and infrastructure protection – the sovereign way
High numbers of staff working remotely clearly changes the landscape on asset and infrastructure protection. These innovative Australian cyber security companies have approaches that can be deployed to assist with the transition to and return from most staff working offsite for longer periods.
Aiculus – improve the security and privacy of your APIs and those you rely on.
*Airlock Digital – get application whitelisting sorted; now on the Crowdstrike marketplace.
Assetnote – scalable software deployment that automatically maps your external assets and monitors them for changes and security issues to help prevent serious breaches.
*Cybermerc – step up your protect mission through a sovereign provider of cyber deception techniques.
Dekko Secure – share and collaborate sensitive documents securely in a frictionless and controlled manner.
Ionize – get your red/blue teaming sorted with Australian scenarios across sectors and contexts.
Kasada – highly scalable bot attack prevention with high fidelity traffic and incident reporting.
Kortek - Cyber-secure, enterprise grade sensors, controllers and gateways for industry and critical infrastructure.
*HackHunter.io – passively monitor and detect malicious WiFi networks on premises and on the move.
Hactive.io – continuous, real time penetration testing and vulnerability assessment.
ParaFlare – provide real time managed detection and incident response for enterprise and supply chain partners.
*Penten – products invented in Australia to secure mobile communications, from the battle field to the global movements of the key people in your teams and organisation.
RightCrowd – integrated physical access management including digital asset tracking
SecureStack – secure cloud integration and management including a DevSecOps collaboration environment (website: No more special snowflakes that you can’t turn off because no one knows how to build it again). Coming to a Risky Biz podcast in April, with support from AustCyber.
Snare – join some of your colleagues and switch to a sovereign provider for log collection and monitoring, from the Australian company now deploying in 38 countries globally.
SaaS security configuration and changeable access
Australian cyber security company Detexian has developed a neat tool that monitors unauthorised changes in SaaS configurations and systems access.
Information management in office and home working environments
Consider putting in place practices that clearly communicate between staff and clients/ customers the level of sensitivity around information.
JanusNET is an Australian company that provides an online tool that marks your documents and emails with the right classification, like ‘commercial in confidence’ and helps to prevent data loss.
Have requirements to manage security clearances? Now is a good time to think about how to improve your approach.
*QuadIQ is revolutionising the way clearances are undertaken, processed and managed. They are live now for baseline and will later this year deploy on NV1 and NV2 level clearances.
Supplier/partner awareness uplift
Promote but consider making a preferred practice for SME suppliers and partners a rapidly deployable, low cost cyber readiness sense checker they can do and maintain themselves.
*Cynch Security’s Cyber Fitness online platform is specifically built for Australian micro and small business.
AustCyber and colleagues in other innovation ecosystems have deployed a factsheet to help startups and small business manage the cyber risks of distributed workforces. Consider sharing it with your smaller suppliers, partners and SME customers (located on AustCyber’s website).
Australia’s cyber security industry has over 500 companies developing and delivering products and services across the 50+ cyber security capability types in the global market. The companies listed in this fact sheet are a snapshot of those that have rapidly deployable solutions – there are many more available. Visit AustCyber’s website or contact us for more information.
AustCyber’s mission is to support the development of a vibrant and globally competitive Australian cyber security sector and in doing so, enhance Australia’s future economic growth in a digitally enabled global economy. We are one of six industry-led, federally‑funded Industry Growth Centres that operate as small private sector, non profit entities. Industry Growth Centres are an initiative that aims to drive innovation, productivity and competitiveness by focusing on areas of competitive strength and strategic priority.