Comprehensive cybersecurity for all
We combine industry-leading software and hardware with predictable and easily understandable pricing to provide you with confidence and peace of mind that your data is safe.
We can also help you design a custom package to meet the specific requirements of your complex or large organisation. Our highly experienced team of Australia-based cybersecurity engineers have advanced technical capabilities to assess, manage and protect organisations of all sizes — across any industry.
The security operations center of the future
ZSOC is our 24/7, Australia-based SOC that provides you with insights and alerts to keep you safe
More than just a licence
You will sleep better knowing that you are protected by ZSOC and our team — 24/7
Compare our packages
Zirilio Elements | Zirilio Plus | Zirilio Pro | Zirilio Complete | |
ZSOCAll of our packages include ZSOC, our 24/7 Australia-based Zirilio Security Operations Center platform that has been thoughtfully designed to keep you safe. ZSOC is the ultimate fully-managed SOC, and provides expert monitoring and assessment of threats to give you actionable alerts to stop attacks and keep your network protected. |
Basic | Enhanced | Full | Custom |
Email securityActive scanning and filtering to help prevent ransomware and phishing attacks that can disrupt your operations. |
✓ | ✓ | ✓ | ✓ |
Web securityPrevent ransomeware, viruses and malware by getting more control over web access. Disable malicious attacks on your network, stop data loss and block inappropriate content with cloud-based web security. |
✓ | ✓ | ✓ | |
Endpoint protectionReplace your legacy anitvirus software with cloud-based security that will protect your network and all of the devices that connect to it. Defend against common ransomware and malware by actively scanning for known threats and using threat intelligence to empower an immediate response that keeps you running smoothly. Endpoint protection can also ensure compliance with security policies at the user level, which helps protect your network from hackers. |
✓ | ✓ | ✓ | |
Managed firewallWe deploy highly configurable and flexible managed firewalls for maximum performance, to keep your data center, edge or branch offices safe. In addition to blocking unwanted traffic and ensuring that valid transactions move smoothly across your network, managed firewalls include VPN, IPS, anti-evasion, encrypted inspection, SD-WAN and mission-critical application proxies. |
✓ | ✓ | ||
SIEMOur Security Information and Event Management platform allows the detection, capture and logging of critical data related to the performance of your network and ongoing security threats and attacks. This increases visibility into your threat matrix and security posture, while also providing advanced capabilities such as asset discovery, vulnerability assessment, intrusion detection, behavioral monitoring and event correlation. Our SIEM sensors enable more granular and detailed reporting and real-time dashboards for the most sophisticated and demanding security needs. |
✓ | ✓ | ||
WAFWe protect your website and filter our the noise with PCI-compliant, automated security that reduces the risks created by third-party code. Our WAF ensures that your website only receives traffic from visitors you want, and shuts down hackers and bots. |
✓ | ✓ | ||
Vulnerability detectionYou can't protect what you can't see. We help you gain insight and visibility into what's happening on your network by checking for vulnerabilities and misconfigurations across assets silently and continuously, using active and passive network analysis combined with software agents that work to detect and report problems in real time. |
✓ | ✓ | ||
Full integration supportWe can work with you design a complete cybersecurity solution that integrates gracefully with your existing network and licensing agreements, helping you maximize your budget, save money and reduce waste. |
✓ | |||
Migration roadmapWe can collaborate with your team to create forward-looking roadmaps and plans to help tell the story and paint the picture of your evolving cybersecurity maturity level and threat posture for your executive leadership team and internal staff. Having a long-term plan and partner can help manage expectations and ensure sufficient budgetary resources to accomplish your internal goals. |
✓ | |||
Data-Loss PreventionPrevent reputation and brand damage resulting from data breaches, leaks, exfiltration or unwanted destruction of sensitive data with DLP as part of your package. We can help you protect Personally Identifiable Information and comply with regulations about customer data while guarding intellectual property and the crown jewels of your organisation. With Bring Your Own Device and work from home office environments continuing to evolve and expand, DLP is a must-have component for many organisations to secure the enterprise. |
✓ | |||
CASBOur Cloud Access Security Broker helps you manage and analyze usage of cloud apps across your organisation, control access to data resources and discover sources of shadow IT in your organisation. With a CASB as part of your package, you can also evaluate your organisation to monitor compliance, sanction approved cloud apps, prevent leaks and limit access to regulated data. |
optional | |||
Custom firewallWe can help you design the perfect firewall to meet your exact use case and need. We can deploy devices that meet your internal high security requirements, including for the most demanding customers in the high technology, financial services and defence industries. |
optional | |||
Secure remote accessLet us collaborate with your team to design the perfect Secure Remote Access solution for your organisation. We can help you ensure that your organisation is optimised to support secure work from home and BYOD is configured correctly and aligned with cybersecurity best practices. |
optional |
Optional add-ons and upgrades
Essential Eight Audit Review
Let us help you with a comprehensive review of your Essential Eight Maturity Level and audit of your security posture. We can help you understand exactly what steps you need to take to properly implement the Essential Eight an important new cybersecurity framework created by the Australian Cyber Security Centre of the Australian Signals Directorate to help improve your readiness and preparation in the event of a cyber attack.
By prioritising the eight most basic mitigation strategies, the ACSC hopes to help organisations protect themselves and avoid disastrous outcomes caused by hacking and cyber attacks. Implementing the Essential Eight now also saves you the pain, time and money of responding to a major cyber security incident on your own.
It is likely that soon all organisations in Australia will be required to disclose their Essential Eight Maturity Level and demonstrate compliance with these most basic preventative measures. Wherever you are in your cyber security journey — whether you are sophisticated and experienced, or just starting out — we can help you level up and improve your security posture.
Essential Eight Dashboard Monitoring
Zirilio Pro and Zirilio Complete package customers can add an Essential Eight Dashboard that provides a real-time summary of your organisation’s compliance with the ACSC Essential Eight framework. This is a powerful add-on that provides an easy-to-understand snapshot of your cybersecurity Maturity Level that can be useful for providing updates to executive leaders within your organisation, insurers and partners.
Cyber Incident Response
When you have a cyber incident you need the best expert support to recover and get back on track. Let us help you quickly pick up the pieces and restore operations while securing your organisation as you move forward. Our team has deep experience in cyber incident response and can assist you in responding to any cybersecurity crisis you may encounter.
SecureTest Penetration Testing
With pricing starting at $3,499, Our Zirilio SecureTest penetration testing product covers the most common needs and scenarios, including:
-
Internal Infrastructure Penetration Testing
-
External Infrastructure Penetration Testing
-
Web Application Penetration Testing
-
Mobile Application Penetration Testing
Don’t risk outsourcing your cyber security overseas. Penetration testing works by intentionally allowing a breach of your network, systems and security to identify weaknesses and security problems. It is not advisable to allow anyone outside of Australia to do this. All of our engineers are based in Australia and have more than 10 years of security experience. We only hire the best local staff and do not outsource your penetration testing like some competitors. We are bound by strict Australian laws and we follow the highest standards.
After gathering technical details about your organisation, our team will confirm pricing for your penetration test. To reduce the possibility of disruptions to your business processes, testing is conducted in accordance with a pre-determined schedule and mutually agreed upon rules and guidelines. A comprehensive report will be produced once testing has concluded, listing vulnerabilities and exploits categorised by risk levels.
Recommendations for mitigation strategies will also be provided according to the cyber-threat landscape of your business, along with guidance on how to address any outstanding issues. We also offer technical and executive management debriefing sessions to share our findings. Once the issues have been rectified by you, we can conduct a complimentary remediation scan. Optionally, our team can remediate all identified issues for you and recommend the right level of ongoing protection through our Zirilio Essentials, Plus, Pro or Complete package.
Vulnerability Assessment
Our vulnerability assessment includes the identification, measurement and ranking of severity of the vulnerabilities in specific systems for your organisation. In addition to providing you with a valuable understanding of your security fabric, this type of assessment can also help you think in a rigorous way about how to intelligently deploy resources to remediate the most serious issues.
Red Team Campaigns
Looking to go beyond a security audit, vulnerability scan or penetration test without hiring new staff?
Hire our external Red Team to design and run the most rigorous information security test available. This add-on, called Zirilio Red is an advanced Red Team campaign centered around testing a specific set of goals that emulate likely attack scenarios for your organisation.
Our Zirilio Red product comes in three distinct flavors to match up with the most common use cases:
Zirilio Red – Advise Your White Team
-
Provide expert oversight to the team overseeing the Blue Team and the Red Team
-
Help refine campaign objectives and rules to increase rigor
-
We are neutral experts, interpreting the final results of the campaign
Zirilio Red – Your External Red Team
-
Our staff serve as the Red Team and attack the client over an agreed upon period of time (14-30 days)
-
Provide detailed info sharing about TTP to help drive improvements
-
We engage creatively and aggressively to find weaknesses
Zirilio Red – Your Purple Team Leader
-
Help facilitate communication and information sharing between Blue and Red Teams
-
Help you build processes and systems to support ongoing sharing
-
We are a trusted expert, fully invested in your long-term security