Directory · AU
Data Security Software Products in Australia
A register of firms and the professionals working at them in the Data Security Software Products sector based in Australia. Browse the public index, then filter or export on Kipplo.
Companies
40 on file
Scantek
Scantek provides software solutions to verify identities in real-time, anywhere. Founded in 2012, headquartered in Perth, Western Australia, Scantek is leading the way in digital verification of identity. Scantek is the right partner to digitise your processes, enhance your business and give your customers the very best user experience. Fully accredited in ISO 9001, ISO 14001, AS/NZS 4801 and ISO 27001, we can provide the highest level of data protection and privacy in Australia. Scantek specialises in instant identity verification built on facial recognition technologies and identity documentation and card verification. Scantek solutions serve as a SaaS model and are designed to combat fraud, increase security and improve user and customer experience. Scantek continually hones it's machine learning models to provide the very best solution to meet their customers business needs. Scantek's commitment to delivering real results are fuelled by their core values; ambition, accountability, collaboration, innovation, and to do whatever it takes to get the job done! So if you are looking for a technology partner that is committed to improving your operational efficiencies, adding a layer of security to your customer's information and improving their overall experience with your business, then Scantek is the perfect solution for you; give us a call today!
11 to 50 staff
Datatrue
DataTrue is a leading SaaS tool designed to efficiently quality assure and monitor web analytics and media tagging deployments as well as identifying data leakage of personally identifiable information (PII). DataTrue is a valuable tool for enterprises seeking to audit and monitor their compliance with the changing landscape of privacy laws such as GDPR and the CCPA.
11 to 50 staff
Myrisk
Transforming Cyber Risk with AI-Augmented Governance & Services At MyRISK, we empower organizations to break free from manual, reactive risk practices. Our mission is to build the Future of Risk—where cyber governance is continuous, intelligent, and deeply integrated with business objectives. We deliver both products and services that help mid-sized enterprises, critical infrastructure, and government teams modernize their cyber risk programs using automation, AI, and continuous assurance. Our flagship platform, HyperGRC™, is the world’s first composable cyber GRC system, hosted on Oracle Autonomous Database and powered by agentic AI. What We Do – Platform & Services Product: HyperGRC™ Platform – Modular, Oracle-powered GRC with built-in CRQ, CCM & third-party automation Compliance Automation – Prebuilt frameworks (ISO 27001, ISM, AECSF, CPS 234) with automated testing & evidence collection AI Agents for Risk & Compliance – Automate policies, control reviews, and vendor scoring Services (Future of Risk): Cyber Risk Transformation – Strategic advisory to shift from siloed compliance to integrated cyber governance GRC Integration & Automation – Workflow engineering to connect existing GRC tools, ServiceNow, pen test feeds, and dashboards CRQ & Board Reporting – Design & delivery of financial risk quantification aligned to board expectations TPRM Modernisation – Rapid third-party risk uplift using AI, telemetry, and continuous scoring Cyber Technology Rationalisation – Align security stack to business risk, cut costs, and bridge silos Why MyRISK? Built on Oracle Autonomous Database, with IRAP-certified infrastructure for public, private, and defence clouds Powered by AI from Oracle, Cohere, LangChain – with agent orchestration via CyberFLOWS™ Trusted Thought Leaders – Backed by ISACA-published research on CRQ, CCM, and future-ready GRC Real-Time Assurance – Replace static reports with continuous visibility, insight, and decision
11 to 50 staff
6pillars.Ai
6pillars' AUTOMATE+ delivers cloud compliance automation that doesn't just find issues but fixes them. With the largest library of 100% non-disruptive auto-remediations in infrastructure and code, real-time continuous compliance and powerful AWS Well-Architected and Foundational Technical Review integrations and workflows, 6pillars's AUTOMATE+ is the fastest and most cost-effective way to automate AWS Partner practices, free up resources and deliver value to customers faster.
11 to 50 staff
Securitysnares
SecuritySnares is ending the business disruption and damage caused by malware. Founded by cybersecurity experts and executives frustrated with advanced endpoint protection technologies, SecuritySnare’s mission is to supplement endpoint detection & response (EDR) technologies enhancing where they are weak. SecuritySnares provides complete protection from ransomware and wipers for all your assets, including operational technologies, to keep your operations up and running. Our products are ultra lightweight or don't require updates, learning periods, or connectivity. They are designed to work with legacy software and security tools, without conflict.
1 to 10 staff
Redactive Acquired By Recordpoint
Redactive has been acquired by RecordPoint! Redactive's AI Data Security platform sets a new standard for enterprise data security in the AI era. As organizations embrace generative AI, a critical challenge emerges: maintaining precise access control across unstructured data while enabling AI's transformative potential across the business. For security teams, Redactive Permissions Assurance provides unprecedented visibility and control over data access by understanding the context and meaning of unstructured data just like AI does. This enables organizations to resolve their data access debt by fixing misconfigured permissions at scale and secure information before AI deployment—eliminating blind spots and preventing unauthorized exposure. For engineering teams, Redactive Permissions Enforcement enables permissions-aware AI deployment with granular control over what data employees, agents, and AI applications can access. This means teams can innovate faster while maintaining zero-compromise security, unblocking AI initiatives from pilot into production. Founded in 2023 by former Atlassian product leaders and backed by Felicis Ventures and Blackbird Ventures, Redactive is trusted by enterprises in regulated industries to make AI adoption secure, compliant, and scalable. With offices in the US and Australia, we're building the foundation for the next generation of secure AI innovation. Join leading organizations using Redactive to unlock AI's full potential while achieving zero-compromise, granular control over their data security.
11 to 50 staff
My Life Capsule
My Life Capsule provides ultra-secure digital vaults for data and file sharing between professional services, individuals and families for efficient management of confidential information. For personal legal and financial services, My Life Capsule's Partner Portal streamlines client onboarding and data exchange, reducing administrative overhead and mitigating corporate security risks. For individuals and families, My Life Capsule's state-of-the-art digital vaults help protect, organise and share private information to make lives easier, better prepared and better protected. Enquire at info@mylifecapsule.com Learn more at
1 to 10 staff
Platinum High Integrity Technologies
Prevention is Better than Cure - Our patented Shield Technology Abatis is an innovative security software solution that integrates fully into operating systems to prevent executable files from writing to computer hard drives, enforcing corporate security policies, and providing detailed analysis and audit information.
11 to 50 staff
Secure Forte
Secure Forte is a SaaS-based technology provider of Cyber Supply Chain Risk Management. Our patented and award-winning technology of the Top 10 Cyber Solutions 2024 is designed to proactively manage and communicate risks across the enterprise, upstream customers, and third—and fourth-party suppliers.
11 to 50 staff
World Data Exchange
Our data connectivity engine provides you with the ability to connect to each of your data sources, translates the data in a normalised data format and store it into your own standalone secure data store. With your consent, your data can be then shared with whoever you want, and the data recipient can use this normalised, accurate and consented data to provide better goods and / or services.
11 to 50 staff
Archtis
archTIS Limited (ASX:AR9) is an award winning, global technology company focused on protecting sensitive information. Leveraging its strong pedigree with Government and Defence, the company has developed industry-leading information security platforms for sharing and collaborating on sensitive or classified information. At archTIS we believe that security doesn't mean compromising on productivity. archTIS specialises in the design and development of products, solutions and services that enable companies and government agencies to increase productivity whilst keeping their data safe. We do this by using attribute-based access control, which provides individualised views of information across multiple levels of security. Watch these videos for more information about our products and archTIS' philosophy to sharing information: https://youtu.be/0Ov6UJU62JI https://youtu.be/RGKwP3290qw
11 to 50 staff
Ellty
Closing deals, raising capital, sharing sensitive data with full tracking and access control.
1 to 10 staff
Aona Ai
Aona AI is transforming how enterprises adopt and leverage generative AI technology. Our innovative AI Adoption Platform combines cross-platform analytics, real-time employee coaching, personalized upskilling journeys, and robust AI safety guardrails to empower organisations to safely and effectively harness AI's full potential. Designed specifically for HR, Learning & Development, CIOs, IT Managers, Digital Transformation Leaders, and Team Leaders, Aona AI bridges the gap between technology and people. We provide real-time insights into AI usage across all tools, including visibility into shadow AI, empowering teams to optimize adoption, compliance, and productivity. With Aona AI, your employees gain personalized AI coaching that enhances their skills directly in their workflow, driving engagement and responsible AI usage. Our platform ensures sensitive information remains secure through intelligent safety guardrails aligned with emerging regulatory standards such as GDPR, EU AI Act & Australia's Mandatory AI Safety Standard. Join industry leaders who trust Aona AI to seamlessly integrate generative AI into their organisational DNA, fostering a culture of continuous learning, innovation, and compliance. Discover more about how Aona AI can elevate your enterprise AI adoption strategy.
11 to 50 staff
Shadowsight
The Insider Threat Challenge For companies of any size, insider threat – unsanctioned activity by employees – is often unintentional but potentially devastating. Products trying to solve this still treat the 1% of malicious activity as if it were 99% of the problem. ShadowSight™ is different. Driven by an awareness that this problem is human-led, it builds an awareness of business context to accurately report on threats in near real-time. This allows businesses to identify patterns of behaviour, shift company culture and prevent financial and reputational harm. CIO’s, CISO’s and their teams have an intimate knowledge of the problem but are dissatisfied with current ‘solutions’. Existing tools are set-and-forget applications that flood teams with unmanageable activity logs and useless alerts. They also do nothing to shift employee behaviour and prevent risk in the long-term. ShadowSight™ – An Innovative Approach ShadowSight™ provides an accurate and scalable solution that leads with business context. Insider threat is a human-led problem, and so the solution needs to reflect this. Coupling automated processes with ongoing support, ShadowSight™ provides CISO’s with a way to shift employee behaviour and prevent insider threats in the long-term. The ShadowSight™ platform is implemented within hours – beginning its process of exponential learning. This means the automated processes it provides alongside ongoing support continuously build an understanding of what is and isn’t risky behaviour. This allows ShadowSight™ to accurately report on potential risk factors in near real-time and identify patterns of risky behaviour. Helping to shape employee behaviour, ShadowSight™ is a long-term solution for an organisation’s fight against insider threats.
1 to 10 staff
It Junction Pty Limited
About IT Junction Established in 2018, A platform to introduce customers with upcoming technologies that will change the way we do things today and for those who intend to embark on AI & Deep Learning journey. CYBER SECURITY an Ever-Challenged space, and a Never Ending Journey. To address this challenge, we work with our customers in the following space! Customers gain visibility of their IT Security posture (health check) 2. Find Security gaps – VAPT 3. Advanced Endpoint Security 4. Email Security, Networking Security & Remote Access 5. Cloud Security 6. Identity Access and Governance 7. Data Protection (Backup, DR and Restore) 8. Security Compliance In addition to in-house skills, we have partnered with some unique and great vendors to bring best of the best in this ecosystem. IT Junction Channel Business:* IT Junction is the Master MSP/MSSP Aggregator for Deep Instinct. If you are an MSP/MSSP, reach out to become a partner today!* IT Junction is a Distributor for Ridge Security.* RidgeBot - An Automated Penetration Testing And Continuous Exposure Management Solution.* RidgeShield - Workload Security Policy Monitoring Platform. Your first line of defense, providing zero-trust micro-segmentation technology to protect cloud workloads, regardless of whether they are deployed on- premises, in hybrid cloud, or multi-cloud environments. Do contact us for an obligation free discussion! Contact: IT Junction Pty Limited, security@it-junction.com Or Visit:
1 to 10 staff
Zertid
Zertid is the first and only converged ServiceNow-native Identity Security solution. Installed within minutes, it is the fastest-to-value IAM, IGA and Privileged Access Management solution for ServiceNow customers, which also provides the familiar administration and reporting interfaces in ServiceNow. Zertid is also available as a standalone SaaS instance for customers, who use a non-ServiceNow ITSM solution at present. Visit https://zertid.com/ for more details.
51 to 200 staff
Backrightup Acquired By Rubrik
Secure and Simplify Your DevOps Backups with Backrightup. Trusted by organizations such as Siemens, Telstra, Nuvei, Department of Defense, Assurant, British Red Cross, and top healthcare organizations. Problems We Solve: • Manual Backup Processes: Time-consuming and prone to human error. • Compliance Risks: Failing to meet regulatory standards can lead to costly fines. • Data Loss: Unprotected pipelines and repositories can lead to critical loss. Why Backrightup? • Automated Backup & Restore: Eliminate manual processes with automated backups of Azure DevOps and GitHub repositories. • Compliance-Ready: Backrightup ensures you meet industry regulations, like APRA, HIPPA and GDPR. • One-Click Restore: Recover your repositories instantly with our seamless restore feature. Boost Your Data Security and Efficiency: • Compliance Assurance: Automated compliance reporting and audit trails. • Continuous Protection: Always-on monitoring and backup to prevent data loss. • Full Platform Integration: Works seamlessly with Azure DevOps, GitHub, and GitLab (soon). The Future of DevOps Protection is Here. Save time, reduce risk, and ensure compliance. Secure Your Crucial DevOps Data with Backrightup Today!
11 to 50 staff
Enquodb
EnquoDB exists to encrypt all of your organisation's data, wherever it is, against all adversaries. Leveraging leading-edge cryptography and prioritising ease-of-use, EnquoDB is your partner in protecting against data theft, extortion, and insider threats.
1 to 10 staff
Secured Communications
Mercury Workspace allows users to host fully end-to-end encrypted HD video conferences, make secured VOIP calls, send secured messages, and securely share files of unlimited size seamlessly, all within a single application interface in confidence with confidence, every time using messaging layer security (MLS) and post quantum encryption (PQE). Secured Communications views its clients as partners and offers first class personalized support in addition to providing customization services and integrations to help them manage their most sensitive communications and stay in control of vital information. For more information visit: securedcommunications.com.
11 to 50 staff
Expede
Expede helps Enterprise Companies to Migrate Unstructured Data to Microsoft Azure Cloud to meet Security & Compliance requirements while Intelligently Converting this Data into Structured Information for Corporate Insight & Growth. Deloitte estimate that within mid to large enterprise corporations across all sectors over 80% of all company data is unstructured. Only 18% have converted this data into beneficial business insight which has often led to a revenue growth exceeding 60%. With the remainder not only missing out on these benefits but also exposing themselves to growing regulatory compliance requirements & cybersecurity risk. Even with so much at stake, corporations are struggling to address their unstructured data due to the significant technical challenge of capturing and converting this to meaningful insights along with the substantial time & cost it requires to do so. Expede is a next generation unstructured data management platform that utilizes proven uniquely developed technology to automate the process of capturing & converting large volumes of enterprise unstructured data to meaningful information & moving it to the Microsoft Azure Cloud. The resulting structured data can be instantly accessed through the Expede Knowledge Hub which provides users powerful data analysis & search capabilities. With over 170 enterprise connections, Expede can support wider enterprise data strategies, data lakes & Big Data initiatives. Expede provides a consumption-based solution that is at least 20 times more efficient and 60% cheaper than current legacy solutions. Expede is exclusively distributed through the Microsoft marketplace with deployment, billing & licensing fully managed by Microsoft. The marketplace is a preferred enterprise transactional model as it allows corporations to obtain Expede under the wider banner of Microsoft enterprise agreements without the need of separate contracts, budgets & payments.
11 to 50 staff
Keymaas
KeyMaaS is based out of Geelong, Victoria, Australia. We are helping you to empower key security for your business
1 to 10 staff
Ecc Payments
ECC is a redefining of the Bitcoin experience, removing complexity without compromising on security. Blending traditional financial infrastructure with the future of decentralized financial control. The ECC project is built on the concept of zero knowledge encryption. Where custodial wallets require you to hand control of your private keys to another party, our philosophy is "What if no one knows the private key at all?". This can be a hard thing to conceptualize, so in it's absolutely simplest terms - imagine a multi-signature address. Without all the required elements, the address cannot be used. More importantly, it cannot be abused. By utilizing ideas developed for situations requiring ultimate secrecacy and plausible deniability, we are able to successfully obfuscate a wallets private key. At no time do we capture or store a private key. We don't know it nor do we want to know it! What makes us different to others in the payment space is that we aren't looking at the payment settlement level. We believe there is already a secure and robust process for that - Bitcoin. Instead, we operate as a privacy solution that manages the risks associated with exposure of private keys.
1 to 10 staff
Subrosa
A data security platform for AI
1 to 10 staff
Knocknoc
Knocknoc is a novel yet elegant approach to removing attack surface. Your infrastructure becomes invisible until users authenticate, eliminating pre-auth exposure across distributed IT and OT environments, from remote access, VPNs, dev/test networks to legacy apps, internal networks or critical, high-security systems. By linking your existing identity platforms to your existing network controls, access is granted only when required, and only to the users you approve. No agents. No VPN. No chokepoints. No pre-auth network-level exposure. This is just-in-time, identity-driven access at the network layer: Direct access, low latency, no architectural redesign, and protection that works across brownfield infrastructure and critical environments. With Knocknoc, assets stay dark until the moment they're needed, shrinking risk, removing exposure and shutting down the recon window attackers rely on.
11 to 50 staff
Livesign
Livesign is a revolution in identity verification for digital signatures. It connects digital document signing with digital identity verification. It's the only app that links digital signatures with government-issued photo ID at the precise point of signing. Livesign uses facial biometric and cryptographic technology so you can be sure that the person digitally signing a document matches their ID. It’s witnessing reimagined, not removed.
11 to 50 staff
Cipherise Pty Ltd
We deal in absolutes. It’s the only way to achieve perfection; honestly, it’s the only way to approach your security. Absolute trust. Absolute is what we do and who we are. Perfection is saying we create perfect identity trust. The person you think you’re connecting with is in fact that person. Trusted identity. Trusted interaction, free from intruders, free from fakers. Trust.
11 to 50 staff
Beta Docs
BetaDoc is an AI-powered platform that helps researchers and universities find, write, and manage competitive research grant applications — all in one secure, collaborative workspace. We streamline the entire grant lifecycle — from discovering high-fit opportunities to writing narratives, tracking compliance, and capturing institutional knowledge. Unlike generic tools, BetaDoc uses a secure, personalised AI assistant that learns from your past applications to help you improve success rates without compromising data privacy or IP. Built for both the researcher and the research office, BetaDoc replaces fragmented tools like Word docs, spreadsheets, emails, and static guidelines with one smart, integrated platform designed for real-world academic and industry research workflows.
1 to 10 staff
Data Protection Services
Welcome to Data Protection Services, we wake up every morning with the objective of making the world a better place, a safer place, one where your and your customers’ data is protected. We work with the best digital security vendors in the world and we are passionate about customer service. The team at Data Protection Services is dedicated, we have a long history of working together and ensuring great customer outcomes. Who we work with: 1. Thales Digital Identity and Security: Businesses and governments rely on Thales to bring trust to the billions of digital interactions they have with people. Their identity management and data protection technologies help banks exchange funds, people cross borders, energy become smarter and much more. More than organizations already rely on Thales solutions to verify the identities of people and things, grant access to digital services, analyse vast quantities of information and encrypt data. Products and Services include: • Data Discovery and Classification • Access Management and Authentication • Data at Rest Encryption • Data in Motion Encryption • Key Management • General Purpose HSM’s • Payment HSM’s • Secrets Management • Secure File Sharing 2. Entrust Entrust, lay the secure foundation that protects identities, payments, and data and advances any organisation in an ever-changing world. Their identity and data security solutions enable Zero Trust strategies and the secure interactions your customers and citizens. Products and Services include: • Digital Signing Solutions • Code Signing Solutions • Secure email Certificates • nShield HSM • Identity Essentials • Financial Card Issuance • Identity • Key Control • PKI Managed Services • IoT Security
1 to 10 staff
Avian Ai
Avian AI partners with leading technology providers to deliver innovative cybersecurity software that safeguards your digital assets. Leveraging advanced artificial intelligence and industry expertise, our solutions empower businesses to stay ahead of threats and maintain a robust security posture. Together, we’re creating a safer, more resilient digital future.
1 to 10 staff
Cyberup
Effective Cyber Security Solutions and Services to safeguard your organisation! Proudly serving Australian and New Zealand organisations for over 15 years in building cyber-resilient businesses. Specialised in uplifting maturity, safeguarding critical assets and sensitive data with innovative solutions, highly skilled & motivated consulting services and a customer-first attitude.
1 to 10 staff
Fullbackup
FullBackup connects you with the best in backup without the complexity. We resell industry-leading solutions like Keepit and ExaGrid, giving you direct access to the same powerful tools used by top enterprises, ready to run in your own environment. Whether you’re protecting Microsoft 365, Entra ID, SaaS apps, or on-prem infrastructure, we’ll help you choose the right solution, get it deployed quickly, and stay supported every step of the way. No managed service. No lock-in. Just simple, scalable backup you control, with full recovery when it counts.
1 to 10 staff
Hive Data Security
Hive Data Security discovers, classifies, and manages data risks for large organisations. It has an AI-powered natural language user interface (like ChatGPT) so that directors and executives can gain assurances relevant to their particular organisation, such as- What data do we have classified as CONFIDENTIAL- Where is our financial data stored- How much PROTECTED data do we have in the cloud- Which SaaS apps contain privacy data? Visit our website today to find out more:
1 to 10 staff
Nyxium
Nyxium builds sovereign, Microsoft-centric software for professionals in legal and financial services. Our platforms combine rigorous regulatory compliance with modern, API-first design to remove operational drag, reduce risk, and unlock intelligent automation across case management, documents, and task management. We focus on three realities firms face daily:(1) legacy systems that won’t integrate,(2) rising compliance overheads and audit scrutiny,(3) the need for sovereign hosting options without sacrificing usability. Nyxium addresses all three with products that are secure by default, cloud-ready, and designed for practitioner-grade workflows. Compliance and trust: We build with a Microsoft 365-first approach, sovereign cloud options, and privacy-by-design. We align to ISO/IEC 27001 practices, maintain full audit trails, and prioritise accessibility (WCAG) and role-based security. Regulatory reporting (ASIC/AFSA/ATO) is a first-class capability in our roadmap. Interoperability: API-first; integrations with Microsoft 365, Xero, Sage, and QuickBooks; support for guided and automated data migration from common legacy platforms. If you are seeking to modernise workflows, reduce risk, and move beyond incremental upgrades, Nyxium provides a credible path to operational excellence with an AI-ready core without compromising sovereignty or control.
1 to 10 staff
Securicode
QR codes, 2D codes and RFID chips can all be easily counterfeited. We have developed a unique code with a quadrillion variations so can’t be faked, and when scanned with the SecuriCode app, will show time & date of scanned codes on a global map to prevent counterfeiters using real codes on fake items, all for just a few cents.
1 to 10 staff
Xist Global
Our Mission was to design advanced technology to secure the world’s most valuable asset … DATA. and we succeeded! To deliver world leading information security by launching innovative, future proof Info-Sec solutions empowering businesses to thrive in a secure transparent, and trusted digital ecosystem. XIST Global aspires to set the global standard for information security, ensuring seamless access, operation and protection of sensitive personal identity information, public health information, and intellectual property simultaneously driving compliance, resilience, and trust in every transaction. What we Solve XIST (Xtended InfoSec Trust) is a Data Optimization and Data Security technology deigned to address the challenges that dominate the management and security of data across platforms mitigating the risk and volatility impact of cyber threats and data breaches. XIST is platform, application, and file format agnostic engineered to mitigate data breaches and leaks, and negate exfiltrated (stolen) data. XIST works to maintain data integrity at rest, in-use and in motion, and to protect and secure intellectual property, sensitive consumer data, financial transactions, and personal identity and public health information. XIST is designed to secure sensitive data from unauthorized access, ensuring the InfoSec tenets of confidentiality, integrity, and availability. Critical and sensitive information can now be searched, streamed, accessed, viewed, edited, updated and transmitted while the data is simultaneously optimized and secured. Plus, maintain regulatory compliance, preserve customer trust, and diminish financial and reputational damage. XIST enables businesses to operate securely and efficiently in an increasingly data-driven interconnected world.
11 to 50 staff
Isthisspam - Ultimate Spam Checker
We aim to make spam and spam detection easy.
1 to 10 staff
Qestix Media
Qestix Media is dedicated to raising literacy levels through fun and entertainment
1 to 10 staff
Secuguard Ai
SecuGuard AI is an advanced AI-driven security risk assessment tool designed to streamline and enhance the security processes for government departments and large enterprises.
1 to 10 staff
Verifiabl
A privacy-protective platform eradicating document fraud globally
1 to 10 staff
Xspectre Cybersecurity
XSPECTRE is a premier cybersecurity solution, offering cutting-edge Vulnerability Management technology to proactively identify and allow you to mitigate potential security threats and vulnerabilities within your digital environment.
1 to 10 staff