macquariegovernment.com
Open in
urlscan Pro
125.7.24.133
Public Scan
Submitted URL: https://protect-au.mimecast.com/s/4OpzCvl1Yvi7qnnRhXTFjD?domain=macquariegovernment.com/
Effective URL: https://macquariegovernment.com/
Submission: On January 16 via manual from AU — Scanned from AU
Effective URL: https://macquariegovernment.com/
Submission: On January 16 via manual from AU — Scanned from AU
Form analysis
3 forms found in the DOMGET /
<form action="/" method="get">
<div class="search-input-group">
<div class="search-input-icon">
<input id="search-button" class="search-image" type="submit" value="">
</div>
<div class="search-input-text">
<input type="text" name="s" id="search-input-desktop" class="form-control" value="" required="" pattern="[\S\s]*\S[\S\s]*" oninput="setCustomValidity(''); checkValidity(); setCustomValidity(validity.valid ? '' :'Please fill out this field');">
</div>
</div>
</form>
GET /
<form action="/" method="get">
<div class="search-input-group search-form">
<div class="search-input-icon">
<input id="search-button-mobile" class="search-image" type="submit" value="">
</div>
<div class="search-input-text">
<input type="text" name="s" id="search-input-mobile" class="form-control" value="" placeholder="Type your search here." required="" pattern="[\S\s]*\S[\S\s]*"
oninput="setCustomValidity(''); checkValidity(); setCustomValidity(validity.valid ? '' :'Please fill out this field');">
</div>
</div>
</form>
<form id="enquiry-module-form-belowFoldForm" class="enquiry-form" data-form-type="enquiry-form">
<div>
<div class="field-group">
<input type="text" name="firstName" required="" placeholder="First Name" maxlength="30" pattern="[(/\s/)a-zA-Z0-9]+[a-zA-Z0-9]+">
<input type="text" name="lastName" required="" placeholder="Last Name" maxlength="30" pattern="[(/\s/)a-zA-Z0-9]+[a-zA-Z0-9]+">
</div>
<div class="field-group">
<input type="email" name="email" required="" placeholder="Email">
<div class="compound-field">
<input type="tel" name="phone" required="" placeholder="Phone" maxlength="20" class="half" pattern="^[+]?([0-9][ ]?|[0-9]+)+$" oninvalid="this.setCustomValidity('Please enter valid Phone Number');" oninput="this.setCustomValidity('')">
<input type="text" name="company" required="" placeholder="Company" maxlength="50" class="half" pattern="[(/\s/)a-zA-Z0-9]+[a-zA-Z0-9]+">
</div>
</div>
<div class="field-group">
<textarea name="Comments" required="" placeholder="How can we help?"></textarea>
</div>
</div>
<div class="asf">
<!-- Please do not change the attribute value of autocomplete "nope" this is for security or anti spam purpose! -->
<input type="text" name="hobby" required="" autocomplete="nope">
</div>
<div class="cta-wrapper">
<button type="button" class="submit-button btn btn-info btn-custom" id="send-button-belowFoldForm" name="send" value="Send" data-module-id="belowFoldForm" onclick="return false;">Send<span class="spinner hide"></span>
</button>
<div class="macquarie-phone-info ">
<i class="macq-i macq-white-phone-icon phone-icon" data-safe-defer-class="macq-white-phone-icon"></i>
<span class="enquiry-phone-number">1800 004 943</span>
</div>
</div>
<input type="hidden" name="timestamp" value="2023-01-16T03:10:52+00:00">
<input type="hidden" name="hkey" value="1673838255">
<input type="hidden" name="hash" value="146430076">
<input type="hidden" name="LeadOrigin" value="Macquarie Government">
<input type="hidden" name="LeadPageOrigin" value="https://macquariegovernment.com/">
<input type="hidden" name="ga-event-category" value="">
<input type="hidden" name="ga-event-action" value="">
<input type="hidden" name="ga-event-label" value="">
<input type="hidden" name="ga-event-value" value="">
<input type="hidden" name="ga-conversion-tracking-event" value="">
</form>
Text Content
* Telecom * Cloud Services * Data Centres * Blog * Contact Us * Glossary * Support * Login * Macquarie View * Teleconferencing Toggle navigation Brand * Secure Cloud Secure Cloud Secure Cloud ASD-certified cloud services built for Australian governments. * Protected Cloud ASD-certified for Australian government PROTECTED data. * OFFICIAL Cloud Affordable and ASD-certified secure. * State Gov Cloud Public, private or hybrid cloud that’s GovDC connected and ISO 27000 compliant. * Secure Cloud Exchange Australia’s first multi-cloud exchange for Australian governments. * Enhanced Virtual Data Centre Dedicated cloud with greater control and deeper security. * Unclassified Cloud Ideal for web front-end workloads. * Dedicated Servers Just what you need for your specific compute requirements. * Essential 8 Mitigate against over 85% of cyber-security threats. * Secure Internet Gateway Secure Internet Gateway * Cybersecurity Cybersecurity Cybersecurity Tried, tested and trusted security services for Australian governments for over 15 years. * Breach Attack Simulation Test your security controls using real – but disarmed – cyber security attacks. * Cyber Hubs Designed to uplift the cyber security posture of all federal government agencies. * Cyber Threat Intelligence Know and proactively protect against the threats targeting you and your peers in government. * SIGBOX Secure file sharing Secure file sharing capabilities without dropping your security. * SIEM-as-a-Service Real time threat monitoring of all cloud, on-premises and hybrid data from a single pane of glass. * SOC-as-a-Service Our Security Operations Centre as-a-Service offers 24×7 real-time monitoring and responses to cyber threats. * Distributed Denial of Service Effective protection from Distributed Denial of Service (DDoS) attacks. * Secure Email Inbox safety extends well beyond annoying spam. Learn how we close the door on both unwanted and potentially dangerous emails. * Defence Solutions Defence Solutions * Colocation Colocation Colocation Ultra-secure, high capacity, high density data centres that are staffed 24×7, offer geo-redundancy and connectivity to all major telecommunications carriers. * Canberra Data Centre Ensure you data is safe and secure right in our nation’s capital. * Sydney Data Centres Efficient and secure facilities conveniently based in Sydney and custom designed to perform for government. * Why Us? Why Us? Why Us? With over 42% of government already benefiting from our services and over 15 years’ experience, learn why we are trusted with government data. * Easy to Buy Easy to deploy and easy to use. * Customer Story We care about our customer care seriously, very seriously. * Certifications / Accreditations Know you’re secure with Australian Government certifications and world class accreditations. * Partner With Us Our built-for-government solutions ensure we’re better together. * Support Our local 24 x 7 professional and accredited support team is ready to help. * Data Sovereignty For Australian governments, data sovereignty is more important than where your data resides. MACQUARIE GOVERNMENT Close * Secure Cloud ▾ * Protected Cloud * OFFICIAL Cloud * State Gov Cloud * Secure Cloud Exchange * Enhanced Virtual Data Centre * Unclassified Cloud * Dedicated Servers * Essential 8 * Secure Internet Gateway * Cybersecurity ▾ * Breach Attack Simulation * Cyber Hubs * Cyber Threat Intelligence * SIGBOX Secure file sharing * SIEM-as-a-Service * SOC-as-a-Service * Distributed Denial of Service * Secure Email * Defence Solutions * Colocation ▾ * Canberra Data Centre * Sydney Data Centres * Why Us? ▾ * Easy to Buy * Customer Story * Certifications / Accreditations * Partner With Us * Support * Data Sovereignty * Telecom * Cloud Services * Data Centres * Blog * Contact Us * Glossary * Support * Login * Macquarie View * Teleconferencing 42% Australian Government internet traffic actively monitored 7 billion+ Security events analysed daily 4,000+ Cyber security use cases proactively hunted 40+ Threat intelligence feeds KNOW THE THREATS THAT MATTER RIGHT NOW. Macquarie Government's cybersecurity services give government IT and Security teams unprecedented visibility and protection from the threats faced by their agencies right now. Our threat intelligence is compiled through monitoring 42% of Australian Government internet traffic activity and ingesting over 30 threat intelligence feeds. Cybersecurity can be delivered as a fully managed service or operated alongside your team. UPLIFT YOUR THREAT STANCE. IMMEDIATELY. Get support from experts who monitor and respond to attacks on Australian Government IT every day. Use our knowledge of attacks to improve your ability to quickly make informed decisions and meet your infosec requirements, including Essential 8, ISM controls and ISO27001. IMPROVE DETECTION AND RESPONSE Sift through the noise to identify and focus on the notable incidents that need action now. Be armed with the details you need for their speedy resolution. Use our managed User Entity Behaviour Analytics (UEBA) and System Information and Event Management (SIEM) services to pinpoint advanced threats before they are executed. OPTIMIZE RISK REDUCTION Prioritize vulnerabilities and focus on your high-risk use cases first. Raise your cybersecurity stance in a constant, sustainable manner. Protect your valuable information assets with our Data Loss Prevention, Secure Cloud, Secure Firewalls, Secure Web and Email Gateway solutions. UPLIFT YOUR THREAT STANCE. IMMEDIATELY. Get support from experts who monitor and respond to attacks on Australian Government IT every day. Use our knowledge of attacks to improve your ability to quickly make informed decisions and meet your infosec requirements, including Essential 8, ISM controls and ISO27001. IMPROVE DETECTION AND RESPONSE Sift through the noise to identify and focus on the notable incidents that need action now. Be armed with the details you need for their speedy resolution. Use our managed User Entity Behaviour Analytics (UEBA) and System Information and Event Management (SIEM) services to pinpoint advanced threats before they are executed. OPTIMIZE RISK REDUCTION Prioritize vulnerabilities and focus on your high-risk use cases first. Raise your cybersecurity stance in a constant, sustainable manner. Protect your valuable information assets with our Data Loss Prevention, Secure Cloud, Secure Firewalls, Secure Web and Email Gateway solutions. SIEM AS A SERVICE. Analyse logs across your entire IT environment to pinpoint attacks as they happen. Learn more SOC AS A SERVICE. 7x24 threat monitoring and response. Proactive threat hunting. By experts in government cybersecurity. Security cleared for government Learn more ADVANCED THREATS NEED ADVANCED PROTECTION. Data Loss Prevention (DLP) for email and web. User and Entity Behaviour Analysis (UEBA). File sandbox detonation. Learn more ESSENTIAL 8. Real-time Essential 8 Dashboard. Available as part of our SOCaaS and SIEMaaS. Learn more KNOW WHERE YOU STAND. KNOW WHERE TO FOCUS. WHO'S PROTECTING YOU FROM ADVANCED AND EMERGING THREATS? NATHAN. Gain peace of mind knowing Nathan and the Security Operations Centre are on the job protecting you against advanced and emerging threats across endpoint, network, cloud, email and web. 24×7 EXPERT MONITORING. Eyes on glass around the clock, ready to respond. RAPID RESPONSE. Contain and remediate threats before they impact your agency. TARGET IMPACTFUL THREATS. Let our experts investigate events and proactively threat hunt. COMPREHENSIVE CYBERSECURITY FOR AUSTRALIAN GOVERNMENT. Our cybersecurity services are designed for Federal and State government agencies, based on our extensive experience, partnerships with Government and international best practice. SECURITY OPERATIONS CENTRE 24×7 threat monitoring, response and proactive threat hunting. Learn more SECURE INTERNET Consistent, compliant infosec protection for users, apps and data wherever they are located. Learn more SECURE CLOUD On demand compute and storage that always assumes it’s under attack. Learn more SECURE DATACENTRES Sovereign data fortresses enabled to protect apps and data up to TOP SECRET. Certified Strategic by the Australian Government. Learn more SECURITY OPERATIONS CENTRE 24×7 threat monitoring, response and proactive threat hunting. Learn more SECURE INTERNET Consistent, compliant infosec protection for users, apps and data wherever they are located. Learn more SECURE CLOUD On demand compute and storage that always assumes it’s under attack. Learn more SECURE DATACENTRES Sovereign data fortresses enabled to protect apps and data up to TOP SECRET. Certified Strategic by the Australian Government. Learn more EASY TO BUY. EASY TO DEPLOY. EASY TO USE. * GOVERNMENT PANELS. It's simple to buy from us through existing procurement frameworks and contracts. * API INTEGRATION. Our services integrate with your ITSM tools like ServiceNow and VMWare. * LOCAL SUPPORT. Our security-cleared engineers are here for you. Highly trained, proudly local. BUILT FOR GOVERNMENT. FOR YOUR AGENCY. We start with the needs of your agency and our 15 years experience in government, then we develop the solutions you need. That’s why so many agencies look to us for their cybersecurity and government cloud services. GOT A QUESTION? TALK TO US. We are always here to answer your enquiries. Call us Enquire online Send 1800 004 943 WE'LL BE IN TOUCH WITH YOU SOON. Thank you for contacting us. FROM THE BLOG THE ROLE OF SECURITY DOMAINS IN GATEWAY ... Secure Internet Gateways like Macquarie Government’s SIGNET play an important role in protecting digital government. To better understand ... Read More WHAT IS SOCI? In the past 12 months, amendments to the Securing of Critical Infrastructure (SOCI) and the new Security Legislation Amendment (Critical Inf... Read More CYBER BULLETIN - OCTOBER 2022 “Side door” infiltration through users replicating their credentials on external websites. This bulletin uses the MITRE Adversarial Tact... Read More MACQUARIE GOVERNMENT * Secure Cloud * Protected Cloud * OFFICIAL Cloud * Unclassified Cloud * Secure Cloud Exchange * Essential 8 * Enhanced Virtual Data Centre * Secure Internet Gateway * Cyber Security Services * Distributed Denial of Service * SIGBOX Secure file sharing * Security Operations Centre * State Government Cloud * Colocation * Sydney Data Centre IC3 East * Canberra Data Centre * Why Us? * Easy to Buy * Certifications and Accreditations * Partner With Us * Blog * Resources * Careers * Locations * Legal * Contact Us Proudly part of the Macquarie Telecom Group * About The Group * News * Investors * Government * Telecom * Cloud Services * Data Centres © Copyright 2023 Macquarie Telecom Group * Privacy Policy * Terms Of Use * Service Agreements word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 Live Chat