Cyber Security

  • Security Operations Management

  • Security Consultation, Assessments & Risk Mitigation Strategies

  • Network, Perimeter & Firewall Security Services

  • Private & Hybrid Cloud Security Management

  • Vulnerability Scanning & Penetration Testing

  • Intrusion Detection & Intrusion Prevention Solutions

  • End User Security Education

What is Cyber Security?
How can we help?
Our Cyber Security Services
Cyber Security Risks

What is Cyber Security?

Cyber Security (also referred to as IT Security) is the practice of protecting the confidentiality, integrity and availability of business assets and systems. The term is broad-ranging and applies to everything from computer security to disaster recovery and end-user education

Cyber Security is a series of business processes and security technologies to safeguard the protection of your intellectual property from malicious threats and attacks

Current state in New Zealand

The number of reported Security breach events rises significantly each quarter in NZ. Despite most businesses not bothering to report these events – the trend is unwavering and shows no sign of slowing down. Bearing in mind that the vast majority of businesses do not report security breaches, financial losses are still in the millions per quarter and although difficult to quantify the reputational and operational impact is significant

New Zealand businesses understand that Cyber Security is important and you’ve all heard horror stories about various attacks and even accidental data leakage here in NZ – however, the “out of sight – out of mind” mentality still exists and businesses still do not protect themselves sufficiently … if at all

When it comes to Cyber Security you’re only as strong as your weakest link

How can we help?

Being a Cloud Service Provider we know a bit about Cyber Security … in fact, security is our number 1 priority and it will remain so

Our Security expertise, principles, policies and technology that is applied to our own hosted Cloud Services can be deployed to your own IT systems and services providing a robust, managed security solution

We believe Security is a process – a mix of people, business procedures and technology striving for continuous Security improvement. It is not a one size fits all approach, nor is it a set and forget exercise … it requires a rhythm of monitoring, reporting, upgrading and testing to ensure you remain protected

Cyber Security risks are here to stay – businesses should be focused on proactive threat detection and prevention rather than reactive remediation of attacks

Quality Cyber Security involves people, process & technology … it is about defining internal business policy, educating end users, deploying appropriate security technology and having your Security monitored, maintained, reported on and managed to ensure you remain proactive, current and secure

Contact us today to discuss your Cyber Security, understand the likelihood of a potential security breach & what can be done to avoid this occurring

    STROBE Cyber Security Services

Security Operations Management

End to end monitoring, reporting, maintenance and managed security operations from Cloud to the Desktop and everything in between

Network, Perimeter & Firewall Management

Focusing on prevention of perimeter breaches and security hardening of your Internal Networks

Intrusion Detection System (IDS) & Intrusion Prevention System (IPS) Management

Granular monitoring, blocking and remediation based on user and event analysis

Security Testing

Vulnerability Scanning and Penetration Testing of Infrastructure, Systems & applications to identify and remediate known and potential vulnerabilities

Private & Hybrid Cloud Security Management

Safeguarding your Cloud services and assets

Business Continuity

Plan B to maintain business operations and return to service after a security breach

Web Application Firewall (WAF) & Reverse Proxy solutions

Best practice web app security solutions

End User Security Education

Training on end user Security best practices and the implications for not adhering to those best practices

CERT NZ recently reported that scams, fraud, phishing, credential harvesting, and malware remain the highest reported incident categories (accounting for 81% of all reported incidents)

Many of these breaches can be avoided by educating your end users on basic do and dont’s in their roles as PC operators … knowledge of what to look out for can be very valuable and could save your business from a security breach

Talk to us about how we approach End User Security Education and the real life examples and consequences of why your staff are vital to the success of your overall Cyber Security

Security Assessments

Security posture base-lining and consultation for on premise Infrastructure, Endpoints, Cloud Infrastructure & hosted Applications

Security Strategy

Focusing on developing security and risk mitigation strategies

    Cyber Security Risks

Potential Security gaps are broad and varied – here a few common attack vectors and Security challenges

IT Infrastructure

Network Infrastructure … physical & virtual networking services & appliances


Firewall … misconfiguration, insecure perimeter devices, insecure DMZ, remote access, EDI

End Point … client PC’s, mobile devices, BYOD, malware, ransomware, antivirus

Database & Operating Systems … Servers, platforms, middleware, SQL injection, Cross Site Scripting

Physical Access … lack of physical secure access controls, Internet of Things (IoT)

Software & Applications

IT Lifecycle … patch management, system updates, lack of compliance with updated security standards


Application Code … software source-code exploits

Computer Standards … lack of a PC Standard Operating Environment with non-compliant software and version controls

Web Applications … brute force attacks, CMS logon, DDoS, API security

People & Social

Phishing … & credential harvesting, spam, social engineering, impersonations, hacktivism


Internet & Email misuse … lack of web content management and filtering systems

Education … lack of end user education and security awareness, lack of business policy and governance

Data Loss Prevention (DLP) … accidental data loss or external leakage, employee data theft

Business Processes … lack of on/off boarding processes, lack of IT change control

IT Administration

Authorisation … privileges, permissions and systems administration abuse, untrusted 3rd party access


Authentication & Communications … lack of encryption, lack of password complexity, password policies, password storage management and user account sharing

FAQ’s

Its nothing personal … small, medium or large – hackers don’t discriminate. The majority of hacking is automated using Internet bots and automated tools to discover and penetrate vulnerabilities. So you’re right – in almost all cases it’s not a targeted attack against your business but rather anyone that can be exploited

It’s a good start but it’s really nowhere near enough if you’re taking Cyber Security seriously. Its important to understand the various attack vectors. Any device or system that is Internet facing is potentially a security risk. The list is broad and includes: Servers, Networks & Network devices, VoIP systems & IP phones, Email, PC’s, Applications, Databases, ISP, Wi-Fi, Websites, Smartphones, IP cameras, IoT devices and the list goes on … so, keep up the good work with Windows patching but keep in mind that only covers a very small piece of potential risks

Give us a call and we’ll meet up for a no obligation, free chat about your business. You’ll quickly understand we cut out the jargon and focus on providing solutions to security challenges that customers can understand

Phishing (pronounced fishing) is the fraudulent practice of sending emails purporting to be from a trustworthy source in order to induce individuals to reveal sensitive information, such as usernames, passwords and payment card numbers, online. Phishing is often associated with spam emails.

Yes, we offer anti DDos services to prevent these DDoS attacks. They are a common occurrence and can target a variety of systems and services

This is a common challenge. Small IT teams simply can’t be experts in all aspects of IT and Cyber security is one of those speciality skillsets that typically isn’t up to scratch. We’ve got plenty of options to assist on this … from one-off discreet projects to ongoing managed security services and anywhere in between.

We have 2 Security specialists who are CISSP certified. The rest of the team live and breathe IT Security … given we’re a Cloud Service provider, Security is paramount for us and our customers … it truly is baked into our operating rhythm and is always at the forefront of each design, solution and operational discussion

Give us a call or send us an enquiry in the first instance. We’ll arrange to meet up, discuss your business, your people, processes and technology and plan an audit to baseline your current position and risks. We’d obviously crack on with remediation immediately if you had existing issues

Service Portfolio       

Multiple Services, 1 Service Provider … how can we help you today?

Servers

Run your business apps and IT services from our VPS, Dedicated or Container Servers. Host your Servers on best of breed Hypervisor, Storage & High Availability Server Infrastructure. Cost effective, custom specifications and scalable on demand

Learn More…

HA Clusters

All compute services are delivered from our own High Availability clusters in Auckland. Our HA clusters are built for availability, reliability, scalability and performance. Our Infrastructure is 100% owned, built and operated by us

Learn More…

Platform as a Service (PaaS)

Test, Dev, Pre-Prod, Staging, UAT, QA … whatever your phase of the development lifecycle host your apps on our Platform as a Service (PaaS) and / or Database as a Service (DBaaS) Clusters. Focus on development without having to manage the underlying Infrastructure and middleware

Learn More…

Infrastructure as a Service (IaaS)

Cost effective, high availability, scalable Infrastructure on demand. Our Infrastructure as a Service (IaaS) offering eliminates capital investment and operational overhead, is fully customisable and super secure with amazing performance

Learn More…

Containers

Containers are highly portable and offer the best density on a hardware to application ratio … this delivers great scalability and ensures they’re a viable proposition particularly with application development

Learn More…

Storage as a Service (StaaS)

Enterprise Block, Object & File Storage built on high performance fault tolerant Storage clusters for your Servers, Databases and everyday business Storage requirements

Learn More…

IT Managed Services & Operations Management

STROBE’s proactive IT Managed Services provides fixed cost, guaranteed resource availability and “all you can eat” IT management with unlimited scope options – reach out to STROBE, your experts for IT Managed Services

Learn More…

Strategic Management

Owners of your IT leadership and strategic management. Valued partners for solution architecture design, service delivery, IT cost out opportunities and overall strategic direction 

Learn More…

About Us

Check out a bit about who we are and what we care about, our values, technologies and datacentres

Learn More…

Consultancy & Project Management

IT Consulting, Project and Programme Management expertise for your next IT project. Also offering consultancy for LEAN Six Sigma, IT licensing, auditing, PCI and IT industry compliance 

Learn More…

IT Operations & Support

For all your IT operations, systems administration, Infrastructure management, end user client support, maintenance break / fix, systems integration and networking requirements

Learn More…

Lifecycle Management 

Our IT infrastructure and asset lifecycle programme management includes asset refresh, firmware upgrades, version controls, patching schedules and functionality enhancements for all hardware, software, platforms, appliances and toolsets. Call us today and avoid a situation where your business is hamstrung by legacy systems that haven’t been maintained or upgraded 

Learn More…

Change Management 

Disciplined, mature IT Change Management eliminates human error which is the number 1 reason for IT failures. Adopt a change control process and avoid unnecessary disruption from failed changes

Learn More…

Internet Service Provider

Fast, reliable, UFB Fibre Broadband and dedicated, uncontended Business grade Fibre Internet circuits. All links are monitored and include unlimited data, no contracts, no install charge, no shaping and plenty of optional extras

Learn More…

Managed Networks & Firewalls

Network design, build, integration, monitoring and management services for LAN, WAN, Firewalls, Routers, WiFi, VPN’s, Load balancing, Proxy and Content Management. Specialist Managed Network service for customers who value performance, traffic optimisation and robust network security

Learn More…

Wide Area Networks

Multi-site inter-connectivity providing private, dedicated, layer 3 WAN services. Best in class networking performance for your site locations

Learn More…

VoIP & Cloud PBX

Our Enterprise grade Cloud PBX services offer high performance, amazing quality, secure, reliable Voice over Internet Protocol (VoIP) communications. Super flexible calling and call routing options to suit every business size and Voice requirements 

Learn More…

Email Hosting

Email services rivalling Office 365 functionality with all the bells and whistles you’d expect from a modern Email solution. Plenty of configuration options from our secure, high availability hosted Email service

Learn More…

Phone Numbers 

New or existing local, regional or international phone numbers and free-call numbers available with custom phone number selection. Significant cost savings and numerous VoIP end point options available from IP handsets, Softphones, SIP on cell phone and analogue telephone adapters to choose from

Learn More…

Cyber Security

Check out our Cyber Security offerings and why this is important to your business. Everything from Security and risk assessments, Security breach remediation and vulnerability scanning from perimeter to end points. Chat to us on how we manage, monitor, report & maintain security operations

Learn More…

Virtual Private Networks (VPN)

Still the most secure, cost effective and seamless method for external remote access to internally (or externally) hosted business resources. We provide robust Virtual Private Network as a Service (VPNaaS) gateways providing secure, encrypted VPN tunnels for always on site-to-site VPN’s or on demand client based VPN access

Learn More…

SSL Certificates

A must have for any website. Protect your website, improve customer perception and increase customer visitation with SSL encryption. Get yourself a cost effective certificate today 

Learn More…

Network & Perimeter Security

Network security is a vital component of your overall Cyber Security posture. Not just Internet and perimeter but internal Local Area Networks (LAN’s) … have a chat to us about our Managed Firewall and Managed Networks & Security services to safeguard your IT assets, data and intellectual property

Learn More…

Web Design & Development 

Custom website design and development including mobile responsive and eCommerce built on modern Open Source PHP frameworks with Content Management Systems (CMS). Also offering Website performance optimisation, repairs, maintenance, security, CMS training and cosmetic content changes

Learn More…

Web Hosting 

World class, high performance Web Hosting on our High Availability Cluster with industry leading cPanel or Plesk control panel options. Flexible, cost effective, managed or unmanaged hosting plans to choose from with plenty of bundled extras

Learn More…

Domain Names

A domain name will instantly make your business appear more professional, trustworthy and add credibility. Endless domain name extensions to choose from. Domain registration includes unlimited DNS changes and support. Speak to us today about registering your new domain name

Learn More…

Business Continuity & Disaster Recovery (BC/DR)

Despite the threat of natural disasters and significant business disruption, BC / DR is something NZ business is yet to fully embrace. We provide IT risk consultancy and BC / DR solutions to ensure your downtime is eliminated or minimised and business operations are restored quickly

Learn More…

Backups 

Our Cloud Backup as a Service (BaaS) eliminates capital expenditure on backup Infrastructure and avoids the administrative headaches of managing backups. Backup data is housed on our High Availability clusters, is replicated to a secondary Datacentre and all backup solutions receive custom scheduling, custom data retention periods and data restore testing as standard

Learn More…

TALK WITH AN EXPERT TODAY

  • ENQUIRE