Our Business Partners


Rapid7's security solutions deliver visibility and insight that help you accurately assess your defences, make informed decisions, create credible action plans, and monitor ongoing progress.

Rapid7 simplifies security compliance and risk management by uniquely combining contextual threat analysis with fast, comprehensive data collection across your users, assets, services and networks, whether on premise, mobile or cloud-based.


Ionize’s deliver technical security services that aim to identify the technical and systemic issues within information systems so these issues can be effectively managed. Ionize evaluates security controls for design weaknesses, technical vulnerabilities and failings in policies and procedures.


Webroot is internationally recognized for providing top-rated Internet security software and solutions, with outstanding antivirus reviews and awards from respected third-party media around the world.

Macquarie Telecom

Macquarie Telecom, deliver critical application and communication services managed with Personal Accountable Service™ – always – across data centre infrastructure and telecom network domains. 

Entrust Macquarie Telecom to provide fully managed, 100% Australian-based hosting, cloud, co-location and data, voice and mobile network services that are: always on, always efficient and always secure.

The HP security portfolio: Six key areas

Security governance, risk, and compliance: Protect your reputation, manage risk, and achieve regulatory compliance by replacing disparate governance functions with an integrated set of services.

Operations security: Integrate information from various security disciplines. Connect your security processes with your business processes.

Application security: Build enterprise security into your applications. Automate detection and response to vulnerabilities, and enable business agility through secure web applications.

Endpoint security: Protect all your endpoint devices and minimize risk inherent in a mobile workforce while centralizing and consolidating management tools to reduce costs.

Network security: Prevent network intrusions while making applications available. Avoid zero-day attacks and automate policy enforcement.

Data Center Security: Embed security holistically across networking, virtualization, mobility, and cloud in your data center.