Directory · NZ
Computer and Network Security in New Zealand
A register of firms and the professionals working at them in the Computer and Network Security sector based in New Zealand. Browse the public index, then filter or export on Kipplo.
Companies
93 on file
Redshield
RedShield offers a comprehensive managed web application and API security service. Our expert team provides real-time vulnerability remediation as a fully managed service, with no application code changes required. WEB-APPLICATION & API SECURITY: RedShield delivers advanced protection and proactive remediation for web applications and APIs. By seamlessly routing your web traffic through our AWS-powered platform, we apply real-time fixes, referred to as “in-flight patches,” to neutralize vulnerabilities in applications as they are detected. These patches work alongside complementary Web Application Firewall (WAF) and DDoS/bot protection, and our service continuously monitors and mitigates attacks to provide risk reduction for customers. NO APPLICATION CODE CHANGES NEEDED: Our solution operates without requiring any changes to your application code. Once traffic is routed through our platform, vulnerability scans and pen-test results are analysed by our global security experts. Fixes are then automatically deployed. For unique or complex vulnerabilities, including business logic issues, our 24/7 defense teams design custom in-flight security patches to fix the vulnerabilities on-the-wire. ASSURED OUTCOMES: RedShield is more than just a tool. It is a service with guaranteed security outcomes. You receive ongoing assurance through continuous testing, monitoring, incident response, change management, and detailed reporting. Our fully managed model significantly reduces your total cost of ownership while enabling stronger and faster risk mitigation. WHO BENEFITS- CISOs seeking effective risk reduction and demonstrable security outcomes- Developers eager to eliminate vulnerability backlog and focus on building features- Security Teams requiring continuous protection without staffing overhead. Get Started If vulnerability remediation is slow or resource-heavy, now is the time to explore RedShield. Start a free trial or book a consultation with our experts.
51 to 200 staff
Aura Information Security
Virtually every business that conducts business online is at risk of compromise by hackers, malware and other information-related crimes. Founded in 2006, Kordia’s Aura Information Security is New Zealand’s leading provider of cyber security services. Its team of industry-leading experts – hand-picked from around the world – provide a range of services to businesses both here in New Zealand and Australia. From penetration, red team, mobile and Wi-Fi testing to general consulting, Virtual Security Officer and training – the team at Aura InfoSec have all business security needs covered. Aura InfoSec's head office is based in Wellington, with satellite offices located in Auckland and Melbourne.
11 to 50 staff
Chillisoft Cybersecurity Specialists
Chillisoft was established in 1998 as a cybersecurity solutions distributor raring to make an impact on the cybersecurity landscape in Australia, New Zealand and the Pacific Islands. Fast forward 23 years, and the company represents leading cybersecurity vendors in New Zealand and Australia with a 1500+ strong reseller channel. The products that Chillisoft represents are all analyst leading vendors which includes ESET, LogRhythm, Imperva, CyberArk, Tripwire, Cofense, Extrahop, and Radware. Due to our specialisation in IT security distribution, we strive to be the go to company of cybersecurity products in ANZ. Get in touch today to see how Chillisoft can help your business operate more securely in today’s volatile IT market with leading cybersecurity solutions.
11 to 50 staff
Emsisoft
Emsisoft's ambition is to produce and market better antivirus/anti-malware software for small to medium sized businesses and managed service providers. We are a leading supplier of efficient real-time protection technology with a focus on behavioral analysis technology to detect new and unknown threats. Our specialty is our multi-layered protection core that combines long-term proven technologies like signature based scanning with state-of the art next-gen cybersecurity provided by machine learning in the cloud. The fully featured Emsisoft EDR platform provides improved threat visibility, root cause analysis with timeline, and advanced threat hunting tools. Our endpoint protection is designed to be completely remote-manageable through the Emsisoft Management Console. The Emsisoft business product range includes the security programs Emsisoft Business Security, Emsisoft Enterprise Security (with EDR), and the Emsisoft Remediation Kit, the world's first fully portable dual-engine scanner. For consumers we offer Emsisoft Anti-Malware Home and Emsisoft Mobile Security for Android. The company was founded in 2003 by Christian Mairoll, realizing his vision of a virtual company: Our threat protection experts are distributed all over the world but work together as if they are sitting next to each other in a real office. In 2014, the company relocated from Austria to New Zealand.
11 to 50 staff
Smx Email Cyber Security Specialists
For almost twenty years, the SMX culture of innovation has seen it evolve alongside emerging threats, technologies and ways of working to remain at the forefront of cybersecurity. SMX takes a human-centric, people-first approach to cybersecurity, using data to deliver solutions that meet users' needs across organisations and supply chains.
11 to 50 staff
Incident Response Solutions
Provision of Incident Response Solutions including Forensic Services, Forensic Technology, Cyber Security, Whistleblowers and Crisis Management
1 to 10 staff
Sandfly Security
Sandfly is an agentless, instantly deployable, and safe Linux Endpoint Detection and Response (EDR) platform. Sandfly protects virtually any Linux system, from modern cloud deployments to decade-old devices, regardless of distribution or CPU architecture. And, we do it without loading agents on your endpoints that can cause performance and stability impacts. Besides traditional EDR capabilities, Sandfly also tracks SSH credentials, audits for weak passwords, detects unauthorized changes with drift detection, and allows custom modules to help incident responders find emerging threats. We do all of this with the utmost compatibility, performance, and safety on Linux.
51 to 200 staff
Xuba
Looking for a dedicated, hard-working, clever IT support partner? You've come to the right place. Xuba was conceived from a shared vision for faster, smarter IT technology coupled with bright spark, cut above the rest IT support service. We believe in quick. We believe in quality. And we’re passionately committed to doing things better. The result? It’s really quite simple; we help our clients sleep at night. We have a rather clever team. With 15 years in the industry and IT in the blood, they are match fit and rearing to go. In order to create lasting bonds, we learn our client’s business and where they are headed and how we can meet them there. We love getting on with it. When it comes to our clients, it’s not size that matters. Whether we’re working with a long-established company or a small start-up, we approach every project with an open mind and enthusiastic attitude.
1 to 10 staff
Capture The Bug
Capture The Bug (CTB) is an agile Pentesting as a Service (PTaaS) platform designed to solve the time-consuming, expensive, and one-off security testing challenges that many businesses face. Our solution offers continuous, on-demand security testing, allowing fast moving SaaS companies and enterprises to address vulnerabilities in real time. We provide faster, more cost-effective, and higher-quality pentesting, helping companies stay secure while reducing the burden on their internal teams. One of the key problems we’re solving is the long lead times and lack of agility in traditional pentesting models. Typically, companies wait weeks or months for a security assessment and receive static reports that don’t align with their fast-paced development cycles. CTB’s platform integrates pentesting directly into the software development lifecycle, enabling real-time reporting, faster remediation, and continuous security coverage.
11 to 50 staff
First Watch - Cyber Security
First Watch is a technology company that develops and delivers solutions to protect the core network of industrial plants and critical infrastructure – the HMI and PLC from cybersecurity risk, ensuring business continuity and secure operation. Founded as a partnership between the University of Waikato and Combined Technologies (CTEK) Automation Engineering Ltd in 2019, First Watch has developed the first cybersecurity platform to prevent attacks on the OT network. Our solutions including a patent protected software platform and professional support services provide protection to industrial and key infrastructure sectors Combining our expertise with a range of innovative partners, we work together to successfully deliver leading cybersecurity solutions and services to our customers. Our expert team is committed to helping your organization manage cyber risk, giving you the support and tools to succeed.
11 to 50 staff
Authsignal
Secure your customer journeys with Authsignal. Drop flexible authentication flows into your customer journeys today. Deploy passkeys and out-of-the-box passwordless (MFA) authentication in hours. Authsignal is a drop-in authentication platform. Focused on enabling enterprise and mid-market businesses to seamlessly authenticate customer identity, mitigate fraud, and secure customer data. Partnering with modern consumer-focused enterprises, Authsignal enables a flexible and contextual approach to authentication. Underpinned by a powerful no-code-rules engine Product and Fraud teams leverage Authsignal to secure customer flows, reduce customer friction, and mitigate risk and fraud. Built to drop into any identity stack, out-of-the-box integrations via OpenID Connect (OIDC), Microsoft Azure b2c, ForgeRock, and Ping Identity deliver rapid deployment times and significant cost savings. Customer service and fraud teams gain complete observability of their customer journeys with a single view of customer actions and audit trail reporting dashboards. Authsignal’s identity stream delivers a real-time view of actions and behavior. Authsignal enables businesses to easily deploy passwordless authentication, eKYC, biometric authentication, customer journey orchestration, fraud detection, and mitigation powered by a no-code fraud rules engine for rapid policy deployment. Mitigate risk and fraud with a no-code-rules engine and deliver seamless customer experiences with a hosted and fully customizable UI. Authsignal makes it easy to protect customer data, deliver seamless customer authentication experiences
11 to 50 staff
Phew Cyber Security
phew is an independent cyber security company making enterprise-grade stability accessible and affordable to all businesses. We offer a range of cyber security services, in particular expert pen testing of web apps and APIs. As a boutique company, we care deeply about the quality and value of the services we provide, and are proud of our select team of skilled and experienced specialists.
11 to 50 staff
Blacklock Security
Blacklock is an award-winning Penetration Testing as a Service (PTaaS). The service allows you to perform penetration testing when you need it - with a click of a button or through your DevOps processes. Our vision is to make penetration testing more accessible, affordable, and efficient for all organisations. The penetration testing is performed in a continuous manner combined with automated vulnerability scanning for assurance and compliance. The service is compliant with industry security standards such as OWASP, CWE, ISO and SOC2 requirements. Key features include-Self or assisted onboarding of web application or external infrastructure -Automated vulnerability scanning with Start Now button -AI-Powered Scan Engine coupled with manual penetration testing -Automated remediation testing -Automated report generation (management and developer report)-Flexible API integration for DevOps -Integrate with Slack for team collaboration or JIRA for automatic bug reporting and tracking -Add-on attack surface testing, i.e. subdomain enumeration, breached email address, SSL/TLS misconfiguration, exposed ports and services, targeted CMS attacks (WordPress/Joomla/SilverStripe) It’s the first of its kind solution that combines automation and manual penetration testing to deliver accurate and actionable reports in a cost effective and efficient manner. The service automates three out of four traditional penetration testing processes to deliver our service in cost-effective, scalable and continuous manner. We are ISO 27001:2022 certified and CREST accredited penetration test provider. We are approved suppliers on NZ Pae Hokohoko government marketplace, AWS, Microsoft Azure, OWASP and the winner of IDG NZ Reseller Innovation Award - 2021 and 2024. Get in touch for a 14-day free trial or book a demo: https://blacklock.io/#contact-section.
1 to 10 staff
Cybercure Ltd
CyberCure is a boutique cyber security and privacy consultancy based in Wellington, NZ. We are highly experienced practitioners with years of experience working in Tech providers, MSSP's & Big 4 consultancies. CyberCure is more than just a cyber security company - we're your trusted partner in navigating the complex world of cyber threats. Our consulting services provide customized solutions to meet your specific needs, from risk assessments and compliance audits to incident response planning and employee training. With our team of experienced consultants and cutting-edge technology, we help you stay ahead of the curve and protect your business from cyber attacks. Don't leave your security to chance - let CyberCure be your guide to a safer, more secure future.
1 to 10 staff
It Task Force Ltd
IT Task Force's mission is to help customers get the best value from their IT infrastructure investment. At the outset, that means slashing IT while at the same time delivering industry-leading security and reliability. No matter what. But that’s just the start…
1 to 10 staff
Websecure Intelligence
Over the last 21 years, WebSecure has been implementing technically complex solutions within many leading enterprise and government departments. WebSecure’s point of difference can be defined by what it’s not. WebSecure is not a generalist IT firm that claims to do everything. We specialise in complex digital Identity projects.
11 to 50 staff
Carapace
Expert, highly independent penetration testing and security review services. We specialise in providing tailored assessments for every facet of your information security.
1 to 10 staff
Cloud Edge
What is the cloud? It's the modern way of doing IT by hosting your services privately on the Internet. Only pay for you what you use and scale up at anytime. We can save you money by moving your services to the cloud.
1 to 10 staff
Controlplane
Expert Kubernetes Consultancy for Secure, Scalable, and Automated Cloud Native Solutions We are a London-based Kubernetes consultancy specialising in building secure, scalable, and efficient cloud native infrastructure. Our expertise spans multiple domains: Cloud & Kubernetes – Architecting, deploying, and optimising Kubernetes infrastructure for reliability and performance. CI/CD & DevOps – Streamlining software delivery with robust automation, continuous integration, and deployment pipelines. AI/MLOps – Enabling scalable and efficient machine learning workflows with Kubernetes-powered infrastructure. Software Supply Chain – Enhancing security, compliance, and efficiency across the entire software lifecycle. Security at the Core We integrate security into every stage of the development lifecycle, ensuring resilient and compliant systems with: Security Assessments – Identifying and mitigating risks across your Kubernetes and cloud environments. Secure-by-Default Design – Embedding security best practices from day one. Secure-by-Design Build – Ensuring security is an integral part of the development and deployment process. Through-Life Assurance – Continuous security validation and compliance monitoring to protect your infrastructure long-term. Enterprise Support for Flux CD We provide expert enterprise support for Flux CD, helping organisations implement and optimise GitOps workflows for secure and automated Kubernetes management. Learn more about our offerings here: https://fluxcd.control-plane.io/pricing/ We help businesses navigate the complexities of modern cloud infrastructure—empowering teams with automation, security, and operational excellence. Let’s build the future together 🤝
51 to 200 staff
Govern Cybersecurity
Govern works with our clients to create a solid ISMS, allowing them to drive excellence by embedding resilience, allowing them to grow sustainably, adapt to change and prosper for the long term. Depending on the needs of our clients, we provide a unique combination of complementary services. From a comprehensive cybersecurity audit that analyses and evaluates the effectiveness of any organisational security systems, to making recommendations for improved security and assisting with the implementation of products that provide high-level protection against cyber threats, we can work seamlessly with your in-house teams to guide them through the process to ultimately achieve their objectives. For those looking to complete the gold standard of business security - we are also experienced Lead Auditors and Lead Implementers of the ISO 27001 process and SOC2 certified, both internationally recognised certifications, which will increase an organisations performance, reputation and competitive advantage. By advising on cybersecurity governance, compliance and management, Hartley and Associates customers can be confident that their business is protected. Contact us today to see how we can assist your business.
1 to 10 staff
It Fortress
At IT Fortress, we specialize in delivering cutting-edge IT solutions tailored to empower businesses globally. With expertise spanning cloud computing, cybersecurity, data analytics, and DevOps, we are committed to driving innovation and efficiency for organizations of all sizes. Our services include: Cloud Solutions: Design, deployment, and management of Azure, Google Cloud, and AWS environments. Cybersecurity: End-to-end protection with advanced threat detection, Microsoft Sentinel, XDR solutions, and penetration testing. Data Analytics: Implementation and optimization of Tableau, Power BI, and Big Query for actionable business insights. DevOps & Automation: Seamless CI/CD pipelines with Terraform, Ansible, and Kubernetes expertise. With a global presence in New Zealand, Australia, UAE, and Canada, we pride ourselves on delivering bespoke IT consultancy with a focus on quality, reliability, and client satisfaction. Why Choose Us? Experienced Leadership: Founded by an IT veteran with over 25 years of experience, working with diverse industries across the globe. Global Reach: Successfully executed projects for top-tier clients in Germany, UAE, Australia, and New Zealand. Innovation-Driven: Committed to harnessing the latest technologies to future-proof your business. Our Mission: To be a trusted partner in your digital transformation journey, empowering you with secure, scalable, and sustainable IT solutions.
1 to 10 staff
Mega As Consulting Ltd
Mega AS Consulting Ltd. is an Internet/Intranet Security Solutions development company. The company was created in 2002 by a team of IT experts. Mega AS’s security market arena is the 3As: Authentication, Authorization and Administration Software. The 3As are one of the most compelling forms of Internet security that has the ability to verify that the proper users are accessing a given network. Mega AS is the developer of the CAT (Cellular Authentication Token) Strong Authentication, Access Control, Identity Management solutions family. The CAT is affordable, secured and easy to deploy TFA OTP Strong Authentication.
11 to 50 staff
Safe Surfer
Safe Surfer is organisation focussed on cyber safety and cyber security, our vision is to create the standard of safety our kids deserve! World leading technology for parents with built-in education for their kids provided through their Internet Service Provider.
1 to 10 staff
Secompass Limited
Need direction in CyberSecurity and Privacy? Let us be your ComPass!
1 to 10 staff
Smart Mobile Limited
Smart Mobile Limited deals with mobile phones, laptops, computers, iPads, tablet accessories, and repair. We have 10+ stores in New Zealand wide.
11 to 50 staff
Axenic Ltd
Axenic is an independent information security and privacy consultancy specialising in governance, risk and assurance. Our mission is to provide high-quality information security and privacy advice to help and support our clients to achieve their business goals and objectives. We use recognised frameworks, standards and methodologies to deliver consistent, repeatable, traceable and defendable advice – rather than unspecified ‘best practice’ or unsupported opinions. Delivered by experts with extensive real world experience across both the public and private sectors. We have chosen not to sell product, partner with vendors or offer technical implementation services in order to maintain a truly independent advisory role. Hence our name Axenic [a-zen-ic], meaning pure or uncontaminated. Our dedication to delivering quality advice – that is free from influence – is shown in the results we deliver.
11 to 50 staff
Mercury It
Mercury IT is an ICT Services organisation located in Auckland, Tauranga, Wellington, Hamilton, Sydney and Melbourne. We have been providing Technology solutions for over 25 years. We manage IT services for more than users, 250+ servers and approx 200+ organisations. We have over 25 years’ experience providing secure, reliable and quality IT support and infrastructure solutions for a variety of clients including corporations, not-for-profit organisations and multi-site businesses. We have a team of 40 professionals, including qualified technical engineers, software developers, project managers and administrators who work hard to deliver results and drive innovative IT solutions. This ensures that your organisation’s technology is in safe hands now, and future-proofed for tomorrow. The team is led by Corry Tierney, Pauline Arkinstall, Elliott Breen, Peter Moran, and Jason Peak. Our primary objective is to provide you with quality IT services & support. We understand that your IT infrastructure & security is just as critical to the running of your business whether home or office based. Our IT solutions are bespoke for every customer to meet your individual needs. Specialties: IT support services, Cyber Security, Managed Security Services and SOC, Microsoft 365 and Azure, Web and Software Development, Backup and Recovery, Virtual CIO/IT Strategy, Hardware and Software Procurement, Internet, Voice and Network, Microsoft 365 Training, Microsoft Copilot AI
11 to 50 staff
Security Lit
Security Lit's team of cybersecurity experts can help you identify, mitigate, and respond to the threats of today and tomorrow, so you can grow safely and with peace of mind. Driven by our core values, we strive towards spreading cyber awareness in the community and help businesse effortlessly fight cyber-attacks. Whether you’re looking to test your systems with VAPT, need a robust incident response plan for when things go wrong, want to breed a culture of security awareness in your organisation, or need to meet key compliance criteria – we’ve got you covered. We specialise in Vulnerability Assessment and Penetration Testing for both Web and network applications. Our team has extensive experience in testing and finding vulnerabilities in large corporate networks and systems.
11 to 50 staff
All Is Well
IT Support - Network Support - Network Troubleshooting & Maintenance - IT Infrastructure design and suppor
1 to 10 staff
Core 73
Core 73 is an Auckland based cybersecurity firm with over 20 years of experience on Network Security. We offer a variety of scalable, tailored-made solutions and services, such as: Firewall audit, Remediation deployment and migration, Network security Posture assessment, and Penetration services. We pride ourselves on our consistent ability to provide excellent quality of service while maintaining the priority of a smaller firm to providing an exceptional customer experience.
1 to 10 staff
Layer 9 Information Security
Layer 9 was founded by a team of specialists committed to delivering strategic value and passionate about organisational security. Some of our customers outsource their security functions to us, others lean on us to bring a fresh perspective and lead specific security initiatives that demand a holistic approach. We provide services that enable organisations to develop and continuously improve their security capabilities, and obtain maximum value from their technology investments. These initiatives are strategically aligned with the organisation's goals and deliver measurable risk reduction outcomes. • Security Governance & Strategy • Security Management & Improvement • Security Risk & Assurance • Incident Preparedness & Response • Defence Operations • Attack Surface Monitoring • Penetration Testing • Cloud Security Our broad range of clients have commercial objectives, underpin our critical infrastructure, and contribute to social, health, and wellbeing outcomes for all of New Zealand. They trust us to operate with objective independence and build strategic alignment so that we can make a positive impact and contribute to their mission.
11 to 50 staff
73inc Limited
WE GET THE JOB DONE RIGHT WE’RE 73INC LIMITED Do you have something that needs fixing? You’ve gone into an authorised repairer and were put off with the exorbitant price for either repair or replacement? This is where 73inc Limited comes in to provide you with a much more economical solution for repairs. Unlike other companies, we focus on repairs and upgrades of Apple® products. Not sure what’s wrong with your device? Bring it in for diagnostic testing. We offer same day service and can often fix your device while you wait. From iPhone® devices, iPad® tablets, iMac® computers, MacBook® laptops to Apple accessories, we’ve got you covered. We offer a 90-day warranty on all repairs and stock only the highest quality parts. Don’t trust your Mac® computers with anyone else – experience the 73inc difference. We are mostly dedicated to doing out of warranty repairs and upgrades on all Apple® related products, however we also work on other major brands like Dell, Toshiba, HP, Acer, ASUS, Sony etc. We are the #1 choice in the Auckland area for fast, quality Mac repairs and support for all of Apple’s various devices and software. Our local repair facility is open to the public 6 days a week, no appointments required.
1 to 10 staff
Assessment Plus
Industrial Control Systems (ICS) and Operational Technology (OT) Cyber Security Assessments and Design We specialise in assessing and designing secure system architecture for Critical Infrastructure. We offer the following services: Site Assessments Asset Inventory System Architecture Maturity Roadmap DR & IR Planning Table Top Exercise Governance, Risk and Compliance
1 to 10 staff
Bay Of Islands Computers
Looking for honest, friendly IT advice? Come to Bay of Islands Computers in Waipapa for all IT help. Computer sales, repair, maintenance and ongoing support made easy. We’re here to help. We’re a local team of experienced, approachable, professionals and look forward to helping Northland individuals and businesses with their technology issues. Come to our Computer Shop in Kerikeri …. or we can come to you. It’s your choice. Sales and repairs of computers. Onsite support
1 to 10 staff
Gigabyte Solutionz Ltd
Computer Solutions Provider. We provide solutionz for small to medium sized organisations. We have a very large network in New Zealand. This allows us to supply and provide expertise in many fields. Our motto is to be the best in our fields. Those that work with us are second to none in their fields.
1 to 10 staff
Isect Limited
Information risk and security consulting - mostly. ISO27k (ISO/IEC family of standards, 27001/2/3/4/5.)- strategy, planning, gap analysis, risk assessment, controls selection, ISMS auditing and management reviews, certification support, maturity management and more Strategy - preparing information risk and security management strategies, budget requests, business cases and implementation project proposals to support the organisation's business objectives and compliance requirements Metrics - measuring against and driving towards business objectives relating to information risk and security, privacy, trust, resilience etc. Policies - a complete, integrated suite of professionally-crafted information security policies, readily adapted for your organisation Awareness & training - creative content covering a wide range of topics, with streams for staff, managers and specialists
1 to 10 staff
Liverton Security Limited
Liverton Security is a trusted cybersecurity provider specialising in secure email solutions and information security consulting. Our advanced software products enable individuals and organisations to exchange information, emails, files, and messages securely and with complete confidence. Trusted by the government and commercial clients worldwide, we deliver robust, reliable, and compliant solutions tailored to meet the evolving demands of digital communication and data protection. Our consulting relates to Governance, Risk, Identity Management, Privacy Assessment, Certification, Penetration and Vulnerability Assessment, and Services.
11 to 50 staff
Revolution Infosec
Revolution InfoSec take the geek speak out of Cyber Security. We focus on your businesses risk to let you get on with running your business. Too many cybersecurity businesses work with a technology first approach. They don’t necessarily take the time to understand the business needs of the client in order to appropriately match the risk and security requirements. Revolution InfoSec addresses this problem by flipping this approach. By assessing what is important to your business and make security ‘get out of the way’, so your business can keep on doing what it does best. We are 100% Kiwi owned and operated, and provide impartial advice.
1 to 10 staff
Comraptor Secure Encrypted Mobile Communications
SECURE ENCRYPTED MOBILE COMMUNICATIONS Comraptor® provide comprehensive and effective secure encrypted mobile communication systems for industries that require highly secure and confidential text SMS, voice, email and data transmission such as government, military, law enforcement, companies and individuals who communicate sensitive information. We design and build to customer’s specific highly secure needs with hosted, on-premise and portable cloud solutions providing protection- Certified and accredited - Multi-device protection for government, military, law enforcement and corporations - Single device protection for individuals - Cross platform design - Android and iOS mobile phone, tablet and smart watch application - In-car and drone systems - Hosted, on-premise and portable systems - MDM, BYOD and Secure SIP installation - Full design and implementation - Hacking prevention
1 to 10 staff
Cyber Research Nz - A Cybercx Company
This company page is no longer active. Please follow us at @CyberCX for all future posts. Cyber Research NZ is now part of CyberCX – Australasia's greatest force of cyber security professionals. CyberCX brings together New Zealand and Australia's best cyber security talent into an end to end offering that empowers organisations to thrive in a disrupted world.
11 to 50 staff
Plural Cyber
A team of cyber security experts, helping businesses build cyber resilience and manage their cyber security risk. At Plural, we understand that in today’s digital landscape, cyber threats are constantly evolving. That's why we provide tailored advisory services and comprehensive managed security services designed to fortify your business against these threats. With Plural, you gain a partner dedicated to safeguarding your business through proactive cyber security services and contextualised risk management.
1 to 10 staff
Safe Web Traffic
We are concerned about the digital safety of our communities and are driven to find solutions to protect every home we can. We’ve seen that people are unaware of the dangers that exist as soon as you connect to the internet. Every day, nefarious parties are engineering schemes, viruses, content, and scams designed to steal your information or poison your mind.
1 to 10 staff
Secureaz
SecureAZ provides tailored cyber security training for New Zealand and Australian businesses. Our comprehensive and region-specific training equips businesses with the knowledge, skills and confidence to protect their data and systems from cyber-attacks. Our training is tailored to each business, focusing on the most relevant topics for their industry and organisational needs. We believe in empowering businesses to protect themselves and stay one step ahead of cybercriminals.
1 to 10 staff
Verifydmarc
DMARC Reporting for MSPs & IT Teams. Efficiently secure many domains with actionable insights & ensure emails reach inboxes.
1 to 10 staff
Alpha Safe
Alpha Safe offers comprehensive solutions for preventing hackers from making off with confidential business data, in addition to providing disaster recovery plans in the event that such a data breach occurs. We can provide staff training and ongoing support, and can even advise external suppliers on your business' unique cybersecurity requirements. But we don't just stop at the company level! We also extend our cybersecurity support to families and the local community. Need to convince your boss that your home network is secure enough to work from home? We can help. Have an elderly relative that you worry may fall victim to a scam? We can help. Have a young child that you need to set parental controls for? We can help.
1 to 10 staff
Bicc Cyber Security & It Solutions
Cyber Security & IT Solutions, Computer Security, DDoS Protection, Network Firewalls, Data Loss Prevention (DLP), Data Security, IT Security Audit & Disaster Planning, Device encryption & Cloud Management, Secure Email & Servers, Managed IT Services, Business Solution and Data Analytics, Cloud Hosting. For more service please visit We are partnered with Checkpoint, ESET, Kaspersky, McAfee & Dell Solution Provider. OUR TECHNOLOGY - AI & Machine-learning to detect zero-day threats in near real-time- Instant visibility of network security- Automated resolution of security incidents. Manage endpoints, servers and mobiles- Integrated firewall to block hostile network attacks- Full-disk encryption and cloud sandbox management- Insider threat protection to safeguard against unintentional and malicious actions.
1 to 10 staff
I.T. Business Solutions Ltd
I.T. Business Solutions is an Information Technology company. We supply, support and manage the IT infrastructure for small and medium businesses in the Hutt Valley, Porirua & Wellington region. Services range from break-fixes, upgrades and network audits, to cloud services migration or complete IT services management. We can be your primary support - your outsourced IT Department. We manage your I.T. so you don’t have to!
1 to 10 staff
New Zealand Forensics
An innovative and affordable approach to Computer Forensics. New Zealand Forensics is one of New Zealand's leading Computer Forensic and mobile device examination companies and was established in We specialise in computer examinations, using the most up to date software/hardware that has been extensively tested worldwide by its users. All results are authenticated/verified and can be replicated by a third party at any time. We pride ourselves in that we provide an individual service to every client, where the examination is tailored for each examination. At all times, the client is kept informed of the current progress of the examination. We use a suite of different software applications and hardware to complete our examinations. Using multiple platforms enables us to check the reliability of our result as different platforms can produce different results. We are CelleBrite Certified in the use of the world leader in mobile forensic hardware and software.
1 to 10 staff