top of page
cyber-landscape.png

Security Compliance - ISO 27001, ACSC Essential 8 Maturity Models - Implementation

Security Architecture, Consultancy and Design including
  • Asset Management - Create and manage the asset management with all the details

  • Network Security - Protects internal networks from intruders by securing infrastructure.

  • Application Security -

  • Data loss prevention and backup: Developing policies and processes for handling and preventing the loss of data, and developing recovery policies in the event of a cyber security breach.

  • Cloud

  • End-User Security - Building alerts for users to follow best practices and automation of regular practices.

  • Physical and Equipment Security implementation

Vulnerability Scan and Penetration Testing
  • Penetration Testing

  •  Attack simulation e.g. DDoS, Phishing, and Ransomware

Cyber Security Operations Centre - Team and platform set up
  • Centralized Event logging and management using Splunk - Implemented at Envision IT and also about to sign up OEM agreement with Splunk.

  • Security Incident Management platform set-up

  • Back-up and Disaster Recovery and

  • Encryption of data at rest and in transition

Security Training support and preparation

Cyber Security Services

Swan%20Foresight%20logo%203_%20Create%20

At Swan Foresight, we explore probable scenarios for sustainability. Once the scenarios are created, stories on how we care for the future are detailed for development.

 

Since 2018, we are striving to create sustainable ecosystems for the community with a holistic approach.

  • LinkedIn
  • Facebook
  • Twitter

Get Connected

info[@]swanforesight.org

388 Huntingdale Rd, Oakleigh South, Melbourne, VIC 3167, Australia.

bottom of page