- Breach And Attack Simulation

- Incident Response Automation

- MicroSegmentation | Breach Detection | Deception 

- ICS/SCADA/IIOT Visibility & Breach Detection

- 3rd Party Risk Scoring & Monitoring

- Intelligence - Cyber Threat Intelligence & Social Sphere

VAD DISTRIBUTOR OF

INTELLIGENCE &

CYBERSECURITY

SOLUTIONS

OUR

VISION

Disrupt the way organisations address the local skills gap in Cyber and Intelligence 

OUR APPROACH

 

We localise and distribute in the Australian & NZ markets innovative cyber and intelligence technologies based on automation  

 

We apply our skills, knowledge, and our people vast experience in these domains to localise, train and disrupt the market through our local channel partners.

OUR VALUE PROPOSITION

 

Founded by a group of former elite technology and cyber experts -we:

 

  • Leverage our experience in the disciplines of defensive and offensive cyber skills.

  • We curate advanced and innovative cyber and intelligence platforms, solutions, and services originated from  the cyber intelligence units and agencies

  • Have access to a unique pool of highly experienced former elite cyber technological agencies professionals 

 

 

We introduce advanced, well funded and globally recognised solutions which solve today the problems faced by Australian and NZ organisations in the domains of Cybersecurity and Intelligence.

 

OUR SOLUTIONS

 HELP:

CORPORATES and GOVERNMENT ORGANISATIONS 

 

The local shortage of skilled cyber professional resources in the market is resulting in substandard implementations and therefore poor utilisation of investments in cyber defences. We are solving these problems with advanced technologies based on Automation with ease of use by design:

 

- Breach and Attack Simulation:  constant validation of your security posture

   

- Cloud Workload Protection: Microsegmentation, Dynamic Deception,

                                                        Breach Detection, Automatic Incident Response

 

- Industrial Networks ICS/OT/IIOT Cyber Security:  

    Visibility,  Vulnerabilities Assesment, Breach Detection & Response

- Automated 3rd Party Risk Scoring and Monitoring.

- Threat Intelligence:  1) Mitigating "Fake News" and social networks attacks

                                          2) Turnkey solution for Cyberthreat Intelligence

                                          3) Turnkey solution for OSINT ​

- Crisis Simulation Automation and Preparedness

- SOAR: SOC and Incident Response Automation 

 

HOMELAND SECURITY

 

Law enforcement and Intelligence agencies

 

Intelligence Technologies:

  • OSINT - Open Source Intelligence​​

  • CYBER Intelligence​

 

 

 

© 2018. ALATA GROUP