AusCERT2019, Queensland – 28 May 2019: Cyber security software specialist, emt Distribution today launched its Cyber Threat Management strategy at the AusCERT2019 cyber security conference, providing partners and the organisations they serve with integrated solutions that support a rapid, coordinated response to cyber attacks.
“Australia’s Notifiable Data Breach Act has created an opportunity among organisations that want to improve their cyber security maturity to avoid the rising flood of security incidents,” said Richard Rundle, CEO for emt Distribution. “We have seen 964 breach notifications in the last year, eight times as many as the previous voluntary scheme.”
In February 2019 alone, Australia’s Parliament House and major political parties were breached, the Melbourne Heart Group reported that 15,000 patient records had been accessed by a cyber crime syndicate, and Toyota Australia said an attempted attack had been mitigated by the actions of its IT department and external cyber security experts.
Organisations can prevent cyber attacks escalating into Notifiable Data Breaches that result in serious harm by taking immediate and effective remedial action. emt’s Cyber Threat Management strategy helps organisations achieve a rapid, coordinated response to cyber attacks with integrated solutions for threat intelligence, threat analytics and cyber security orchestration. Solutions distributed by emt on show at AusCERT2019 include:
• Flashpoint’s Business Risk Intelligence (BRI) offerings, allowing organisations to more effectively consume and automate threat intelligence, and apply it across multiple use cases throughout the enterprise. Flashpoint helps to uncover possible data breaches or imminent threats unavailable through conventional means.
• ThreatConnect’s platform for threat intelligence aggregation, analysis, automation and orchestration. These capabilities are vitally important for detecting, reporting and managing cyber security incidents and preventing future attacks.
• VMRay’s advanced threat analysis and detection solution. Results from VMRay Analyzer can be ingested by the ThreatConnect platform to automate an organisation’s response.
“With a portfolio of leading Cyber Threat Management solutions, emt Distribution supports a level of cyber maturity many channel partners could not achieve in the past,” said Rundle. “This is good news for businesses and government agencies that are looking to take their cyber strategies to new maturity levels and need partners to help them get there.”
“Over the last year Flashpoint has significantly expanded its reach in Asia-Pacific, supporting large enterprises obtain the most meaningful intelligence to help them combat cyber threats, fraud, insider threats, and address corporate and physical security concerns,” said Brian Costello, SVP Global Sales and Solutions Architecture, Flashpoint. “Much of this expansion is due to our stellar partnership with emt, which is visionary in how it has assembled its portfolio of partners to reduce risk.”
Adam Vincent, CEO of ThreatConnect said, “We are excited to be a part of emt’s Cyber Threat Management strategy initiative. We believe that with the ThreatConnect Platform organisations in the region will now have a single place for all of their security knowledge, enhanced by intelligence, enriched with analytics, and driven by workflows to drastically improve the effectiveness of every member of the team.”
“We’re proud to be a partner with emt in expanding the market in Australia and elsewhere in Asia-Pacific for advanced cybersecurity solutions. emt stands apart through the technical prowess of its team and the complementary, integrated solutions they offer. For example, VMRay’s tight integration with ThreatConnect gives enterprises holistic visibility into threats and enables fast detection and response,” said Chad Loeven, VMRay’s VP of Sales and Marketing.
emt also offers solutions that address the Australian Signals Directorate’s (ASD’s) Top 4 cyber mitigation strategies to prevent cyber security incidents, as well as the broader strategies in the Australian Government’s Information Security Manual (ISM). On show at AusCERT2019 are solutions distributed by emt that, alongside patching of operating systems and applications, complete the ASD’s Top 4:
• Airlock Digital’s Australian-developed application whitelisting solution; and
• Thycotic’s leading privileged access management (PAM) solutions.
About emt Distribution
emt Distribution is an Adelaide-based value added distributor and vendor representative with a presence in Australia, Singapore, Hong Kong, Philippines, UAE and South Africa. It also works closely with like-minded distributors in the UK, Netherlands and Germany. emt offers cyber security solutions that address the top four mitigation strategies to prevent cyber security incidents, the broader strategies in the Australian Government’s Information Security Manual (ISM) and solutions to address Cyber Threat Management.
emt Distribution assists channel partners, MSPs and MSSPs to deliver cyber security solutions their customers need. emt offers pre and post-sales support, channel development, engaged sales processes and marketing assistance for both vendors and channel partners. See: www.emtdist.com
Increasing mandates around the security of personal data have made encryption for every business. Australian businesses are leading the world in the use of encryption to protect backups, payment-related data, and laptops – and yet they still have a long way to go before encryption is both ubiquitous and manageable.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem