($150.00 from, per hour (standard charge. Price may vary based on complexity and urgency))
This purchase is a no obligation free quote.
Cart will be discounted to zero on this item at purchase
Cybersecurity - The right security strategy helps protect against breaches that can lead to financial loss, damage to reputation, operational downtime and a host of regulatory compliance and governance issues. Our global experience enables us to help you build security capabilities that are crucial in defending against the impacts of a cyber attack through anticipation and prevention.
Packages for in-stock items are generally dispatched within 7 days after receipt of payment and are shipped via NZPOST with tracking and drop-off without signature. Whichever shipment choice you make, we will provide you with a link to track your package
Please do not immediately return your goods if you find them to be damaged or you are claiming a warranty repair. Please contact us first for an RMA authorization before returning your item.
Responding to the threat
Cyber Awareness Training & Education
Your staff can be the best defence against Cybersecurity threats. We deliver organisation-wide education and awareness programs to develop their human firewall capability. This includes the development and delivery of both classroom style and e-learning online programs provided in conjunction with Gallagher & Co Consultants for regulatory compliance checks.
Prevent phishing and other web-borne threats, block malware and data theft, and enforce policies on remote, off-network users.
We deploy stateful next-generation firewall, intrusion-prevention, anti-virus engine, and geography-based firewall rules to stop threats before they arrive on your network.
Backup and Disaster Recovery
Safety is in replication. We backup your data locally and in Adonis Technology owned secure encrypted data centres around the world to make sure your systems are safe from ransomware and other cyber attacks.
Rapid response to cyber incidents, including identification of cause and implementation of remediation measures for affected areas, as well as expert testimony when needed.
Incident Response planning.
Develop and test comprehensive incident response plans to minimise the impact of a cyber incident. This considers business critical processes, as well as roles and responsibilities of individuals throughout the organisation.
Simple Pen Test
To identify any open and injectable security flaws from inside and outside the network under test and report what we find.
Advanced Pen Test
The primary goal of an Advanced Pen Test is to identify weak spots in an organization's security posture, as well as measure the compliance of its security policy, test the staff's awareness of security issues and determine whether, and how, the organization would be subject to security disasters, and regulatory penalty.
Secure for Compliance
Once we, or someone else, has run the reports above, we work with you and your suppliers to assist in the creation of policies, procedures, disater recovery, and other security implementations to confirm compliance to legal industry standards.