GA Systems Wins Greenstone Financial Services Multi-Year Managed Security Operations Service Contract

Greenstone Financial Services (GFS) selects Australian specialist security & managed provider GA Systems GFS awarded the multi-year contract to GA Systems (Global Asset Systems) as its preferred supplier to deliver fully managed security operations with round the clock incident response. As a core element of the GFS Security Program, the contract will see GA Systems..

Read more

GA Systems Wins Yarra Trams Multi-Year Security Operations Service Contract

Yarra Trams selects Australian specialist security & managed provider GA Systems for Managed Security Service contract Yarra Trams awarded the significant multi-year contract naming the GA Systems (Global Asset Systems) as its preferred supplier after the exhaustive evaluation of multiple submissions. As a core element of the Yarra Trams Security Program, the contracts will see..

Read more

Security is critical, but in Australia & New Zealand spending is low

Once upon a time, data breaches and cyber security breaches were the concerns of a company’s IT department alone. However, cybercrime is now one of the most talked-about topics in the business world across Australia and New Zealand, even if only a third of businesses are properly prepared for cyber attacks. Although spending on security..

Read more

Cyber security attacks continue unabated

Cyber security attacks and intrusions are on the rise all across Australia and New Zealand, according to leading reports. Although businesses across the Asia Pacific region are aware of the risks and the importance of cyber security and intrusion prevention, many companies are still failing to adequately protect their business infrastructure and data from breaches…

Read more

What is Australian Data Sovereignty

Australian data sovereignty, or data residency, is a concept that is still often misunderstood by businesses, managers, and the general public alike. However, it’s important for businesses to understand how their data is stored, who owns it, and how it moves–particularly now that cloud-based data applications are increasingly popular. Below, we look at what data..

Read more

The Benefits of Using Managed Security Solutions

Why You Need Managed Security Services Cyber crime is one of the most significant threats to business and commercial operations across the globe. Not only is the rate of cyber crime incidents spiking, but attacks are becoming increasingly more sophisticated. Gone are the days when viruses and malware were easy to spot–there’s a whole range..

Read more

How Is SIEM Typically Used?

SIEM, or security information and event management software, is a product you can’t afford to ignore if you’re serious about maintaining robust cyber security. Far more than a simple incident logging program, this management software aggregates data and highlights activity which is unlike typical system processing. SIEM is intelligent and proactive, and provides businesses with..

Read more
unified mobility management

How Unified Mobility Management Can Be Utilised

In an increasingly connected age, you don’t need to chain your company workforce to the office. Now that wireless communication is commonplace, and the demand for remote working is on the rise, we’re in a mobile corporate world. From cloud-based programs to portable devices, businesses have shifted away from a traditionally rigid office model–and they..

Read more
database security

What Is Database Security And Why Is It Important?

Database security, and data protection, are stringently regulated. Although the law struggles to keep up with the constant changes of an evolving digital world, there are regulations in force which demand certain standards from any business with an online component. Users across the globe expect their privacy to be taken seriously and modern commerce must..

Read more