info@alata.com.au

  • SOLUTIONS OVERVIEW

  • PARTNER PROGRAM

  • ABOUT US

  • CONTACT

  • More

    - Breach And Attack Simulation

    - Incident Response Automation

    - MicroSegmentation | Breach Detection | Deception 

    - ICS/SCADA/IIOT Visibility & Breach Detection

    - 3rd Party Risk Scoring & Monitoring

    - Intelligence - Cyber Threat Intelligence & Social Sphere

    VAD DISTRIBUTOR OF

    INTELLIGENCE &

    CYBERSECURITY

    SOLUTIONS

    OUR

    VISION

    Disrupt the way organisations address the local skills gap in Cyber and Intelligence 

    OUR APPROACH

     

    We localise and distribute in the Australian & NZ markets innovative cyber and intelligence technologies based on automation  

     

    We apply our skills, knowledge, and our people vast experience in these domains to localise, train and disrupt the market through our local channel partners.

    OUR VALUE PROPOSITION

     

    Founded by a group of former elite technology and cyber experts -we:

     

    • Leverage our experience in the disciplines of defensive and offensive cyber skills.

    • We curate advanced and innovative cyber and intelligence platforms, solutions, and services originated from  the cyber intelligence units and agencies

    • Have access to a unique pool of highly experienced former elite cyber technological agencies professionals 

     

     

    We introduce advanced, well funded and globally recognised solutions which solve today the problems faced by Australian and NZ organisations in the domains of Cybersecurity and Intelligence.

     

    OUR SOLUTIONS

     HELP:

    CORPORATES and GOVERNMENT ORGANISATIONS 

     

    The local shortage of skilled cyber professional resources in the market is resulting in substandard implementations and therefore poor utilisation of investments in cyber defences. We are solving these problems with advanced technologies based on Automation with ease of use by design:

     

    - Breach and Attack Simulation:  constant validation of your security posture

       

    - Cloud Workload Protection: Microsegmentation, Dynamic Deception,

                                                            Breach Detection, Automatic Incident Response

     

    - Industrial Networks ICS/OT/IIOT Cyber Security:  

        Visibility,  Vulnerabilities Assesment, Breach Detection & Response

    ​

    - Automated 3rd Party Risk Scoring and Monitoring.

    ​

    - Threat Intelligence:  1) Mitigating "Fake News" and social networks attacks

                                              2) Turnkey solution for Cyberthreat Intelligence

                                              3) Turnkey solution for OSINT ​

    ​

    - Crisis Simulation Automation and Preparedness

    ​

    - SOAR: SOC and Incident Response Automation 

     

    LEARN MORE
    HOMELAND SECURITY

     

    Law enforcement and Intelligence agencies

     

    Intelligence Technologies:

    • OSINT - Open Source Intelligence​​

    • CYBER Intelligence​

     

     

     

    LEARN MORE

    © 2018. ALATA GROUP