macquariegovernment.com Open in urlscan Pro
125.7.24.133  Public Scan

Submitted URL: https://protect-au.mimecast.com/s/4OpzCvl1Yvi7qnnRhXTFjD?domain=macquariegovernment.com/
Effective URL: https://macquariegovernment.com/
Submission: On January 16 via manual from AU — Scanned from AU

Form analysis 3 forms found in the DOM

GET /

<form action="/" method="get">
  <div class="search-input-group">
    <div class="search-input-icon">
      <input id="search-button" class="search-image" type="submit" value="">
    </div>
    <div class="search-input-text">
      <input type="text" name="s" id="search-input-desktop" class="form-control" value="" required="" pattern="[\S\s]*\S[\S\s]*" oninput="setCustomValidity(''); checkValidity(); setCustomValidity(validity.valid ? '' :'Please fill out this field');">
    </div>
  </div>
</form>

GET /

<form action="/" method="get">
  <div class="search-input-group search-form">
    <div class="search-input-icon">
      <input id="search-button-mobile" class="search-image" type="submit" value="">
    </div>
    <div class="search-input-text">
      <input type="text" name="s" id="search-input-mobile" class="form-control" value="" placeholder="Type your search here." required="" pattern="[\S\s]*\S[\S\s]*"
        oninput="setCustomValidity(''); checkValidity(); setCustomValidity(validity.valid ? '' :'Please fill out this field');">
    </div>
  </div>
</form>

<form id="enquiry-module-form-belowFoldForm" class="enquiry-form" data-form-type="enquiry-form">
  <div>
    <div class="field-group">
      <input type="text" name="firstName" required="" placeholder="First Name" maxlength="30" pattern="[(/\s/)a-zA-Z0-9]+[a-zA-Z0-9]+">
      <input type="text" name="lastName" required="" placeholder="Last Name" maxlength="30" pattern="[(/\s/)a-zA-Z0-9]+[a-zA-Z0-9]+">
    </div>
    <div class="field-group">
      <input type="email" name="email" required="" placeholder="Email">
      <div class="compound-field">
        <input type="tel" name="phone" required="" placeholder="Phone" maxlength="20" class="half" pattern="^[+]?([0-9][ ]?|[0-9]+)+$" oninvalid="this.setCustomValidity('Please enter valid Phone Number');" oninput="this.setCustomValidity('')">
        <input type="text" name="company" required="" placeholder="Company" maxlength="50" class="half" pattern="[(/\s/)a-zA-Z0-9]+[a-zA-Z0-9]+">
      </div>
    </div>
    <div class="field-group">
      <textarea name="Comments" required="" placeholder="How can we help?"></textarea>
    </div>
  </div>
  <div class="asf">
    <!-- Please do not change the attribute value of autocomplete "nope" this is for security or anti spam purpose! -->
    <input type="text" name="hobby" required="" autocomplete="nope">
  </div>
  <div class="cta-wrapper">
    <button type="button" class="submit-button btn btn-info btn-custom" id="send-button-belowFoldForm" name="send" value="Send" data-module-id="belowFoldForm" onclick="return false;">Send<span class="spinner hide"></span>
    </button>
    <div class="macquarie-phone-info ">
      <i class="macq-i macq-white-phone-icon phone-icon" data-safe-defer-class="macq-white-phone-icon"></i>
      <span class="enquiry-phone-number">1800 004 943</span>
    </div>
  </div>
  <input type="hidden" name="timestamp" value="2023-01-16T03:10:52+00:00">
  <input type="hidden" name="hkey" value="1673838255">
  <input type="hidden" name="hash" value="146430076">
  <input type="hidden" name="LeadOrigin" value="Macquarie Government">
  <input type="hidden" name="LeadPageOrigin" value="https://macquariegovernment.com/">
  <input type="hidden" name="ga-event-category" value="">
  <input type="hidden" name="ga-event-action" value="">
  <input type="hidden" name="ga-event-label" value="">
  <input type="hidden" name="ga-event-value" value="">
  <input type="hidden" name="ga-conversion-tracking-event" value="">
</form>

Text Content

 * Telecom
 * Cloud Services
 * Data Centres
 * Blog
 * Contact Us
 * Glossary
 * Support
 * Login
   * Macquarie View
   * Teleconferencing



Toggle navigation Brand
 * Secure Cloud Secure Cloud
   Secure Cloud
   
   ASD-certified cloud services built for Australian governments.
   
    * Protected Cloud
      
      ASD-certified for Australian government PROTECTED data.
   
    * OFFICIAL Cloud
      
      Affordable and ASD-certified secure.
   
    * State Gov Cloud
      
      Public, private or hybrid cloud that’s GovDC connected and ISO 27000
      compliant.
   
    * Secure Cloud Exchange
      
      Australia’s first multi-cloud exchange for Australian governments.
   
    * Enhanced Virtual Data Centre
      
      Dedicated cloud with greater control and deeper security.
   
    * Unclassified Cloud
      
      Ideal for web front-end workloads.
   
    * Dedicated Servers
      
      Just what you need for your specific compute requirements.
   
    * Essential 8
      
      Mitigate against over 85% of cyber-security threats.
   
   
 * Secure Internet Gateway Secure Internet Gateway
 * Cybersecurity Cybersecurity
   Cybersecurity
   
   Tried, tested and trusted security services for Australian governments for
   over 15 years.
   
    * Breach Attack Simulation
      
      Test your security controls using real – but disarmed – cyber security
      attacks.
   
    * Cyber Hubs
      
      Designed to uplift the cyber security posture of all federal government
      agencies.
   
    * Cyber Threat Intelligence
      
      Know and proactively protect against the threats targeting you and your
      peers in government.
   
    * SIGBOX Secure file sharing
      
      Secure file sharing capabilities without dropping your security.
   
    * SIEM-as-a-Service
      
      Real time threat monitoring of all cloud, on-premises and hybrid data from
      a single pane of glass.
   
    * SOC-as-a-Service
      
      Our Security Operations Centre as-a-Service offers 24×7 real-time
      monitoring and responses to cyber threats.
   
    * Distributed Denial of Service
      
      Effective protection from Distributed Denial of Service (DDoS) attacks.
   
    * Secure Email
      
      Inbox safety extends well beyond annoying spam. Learn how we close the
      door on both unwanted and potentially dangerous emails.
   
   
 * Defence Solutions Defence Solutions
 * Colocation Colocation
   Colocation
   
   Ultra-secure, high capacity, high density data centres that are staffed 24×7,
   offer geo-redundancy and connectivity to all major telecommunications
   carriers.
   
    * Canberra Data Centre
      
      Ensure you data is safe and secure right in our nation’s capital.
   
    * Sydney Data Centres
      
      Efficient and secure facilities conveniently based in Sydney and custom
      designed to perform for government.
   
   
 * Why Us? Why Us?
   Why Us?
   
   With over 42% of government already benefiting from our services and over 15
   years’ experience, learn why we are trusted with government data.
   
    * Easy to Buy
      
      Easy to deploy and easy to use.
   
    * Customer Story
      
      We care about our customer care seriously, very seriously.
   
    * Certifications / Accreditations
      
      Know you’re secure with Australian Government certifications and world
      class accreditations.
   
    * Partner With Us
      
      Our built-for-government solutions ensure we’re better together.
   
    * Support
      
      Our local 24 x 7 professional and accredited support team is ready to
      help.
   
    * Data Sovereignty
      
      For Australian governments, data sovereignty is more important than where
      your data resides.
   
   


MACQUARIE GOVERNMENT

Close
 * Secure Cloud ▾
   * Protected Cloud
   * OFFICIAL Cloud
   * State Gov Cloud
   * Secure Cloud Exchange
   * Enhanced Virtual Data Centre
   * Unclassified Cloud
   * Dedicated Servers
   * Essential 8
 * Secure Internet Gateway
 * Cybersecurity ▾
   * Breach Attack Simulation
   * Cyber Hubs
   * Cyber Threat Intelligence
   * SIGBOX Secure file sharing
   * SIEM-as-a-Service
   * SOC-as-a-Service
   * Distributed Denial of Service
   * Secure Email
 * Defence Solutions
 * Colocation ▾
   * Canberra Data Centre
   * Sydney Data Centres
 * Why Us? ▾
   * Easy to Buy
   * Customer Story
   * Certifications / Accreditations
   * Partner With Us
   * Support
   * Data Sovereignty

 * Telecom
 * Cloud Services
 * Data Centres
 * Blog
 * Contact Us
 * Glossary
 * Support
 * Login
   * Macquarie View
   * Teleconferencing


42% Australian Government
internet traffic actively
monitored 7 billion+ Security events
analysed daily 4,000+ Cyber security use cases proactively hunted 40+ Threat
intelligence
feeds


KNOW THE THREATS THAT MATTER RIGHT NOW.

Macquarie Government's cybersecurity services give government IT and Security
teams unprecedented visibility and protection from the threats faced by their
agencies right now. Our threat intelligence is compiled through monitoring 42%
of Australian Government internet traffic activity and ingesting over 30 threat
intelligence feeds. Cybersecurity can be delivered as a fully managed service or
operated alongside your team.


UPLIFT YOUR THREAT STANCE. IMMEDIATELY.

Get support from experts who monitor and respond to attacks on Australian
Government IT every day. Use our knowledge of attacks to improve your ability to
quickly make informed decisions and meet your infosec requirements, including
Essential 8, ISM controls and ISO27001.


IMPROVE DETECTION AND RESPONSE

Sift through the noise to identify and focus on the notable incidents that need
action now. Be armed with the details you need for their speedy resolution. Use
our managed User Entity Behaviour Analytics (UEBA) and System Information and
Event Management (SIEM) services to pinpoint advanced threats before they are
executed.


OPTIMIZE RISK REDUCTION

Prioritize vulnerabilities and focus on your high-risk use cases first. Raise
your cybersecurity stance in a constant, sustainable manner. Protect your
valuable information assets with our Data Loss Prevention, Secure Cloud, Secure
Firewalls, Secure Web and Email Gateway solutions.


UPLIFT YOUR THREAT STANCE. IMMEDIATELY.

Get support from experts who monitor and respond to attacks on Australian
Government IT every day. Use our knowledge of attacks to improve your ability to
quickly make informed decisions and meet your infosec requirements, including
Essential 8, ISM controls and ISO27001.


IMPROVE DETECTION AND RESPONSE

Sift through the noise to identify and focus on the notable incidents that need
action now. Be armed with the details you need for their speedy resolution. Use
our managed User Entity Behaviour Analytics (UEBA) and System Information and
Event Management (SIEM) services to pinpoint advanced threats before they are
executed.


OPTIMIZE RISK REDUCTION

Prioritize vulnerabilities and focus on your high-risk use cases first. Raise
your cybersecurity stance in a constant, sustainable manner. Protect your
valuable information assets with our Data Loss Prevention, Secure Cloud, Secure
Firewalls, Secure Web and Email Gateway solutions.


SIEM AS A SERVICE.

Analyse logs across your entire IT environment to pinpoint attacks as they
happen.

Learn more


SOC AS A SERVICE.

7x24 threat monitoring and response.
Proactive threat hunting.

By experts in government cybersecurity.
Security cleared for government

Learn more


ADVANCED THREATS NEED ADVANCED PROTECTION.

Data Loss Prevention (DLP) for email and web.
User and Entity Behaviour Analysis (UEBA).
File sandbox detonation.

Learn more


ESSENTIAL 8.

Real-time Essential 8 Dashboard. Available as part of our SOCaaS and SIEMaaS.

Learn more

KNOW WHERE YOU STAND. KNOW WHERE TO FOCUS.


WHO'S PROTECTING YOU FROM ADVANCED AND EMERGING THREATS? NATHAN.

Gain peace of mind knowing Nathan and the Security Operations Centre are on the
job protecting you against advanced and emerging threats across endpoint,
network, cloud, email and web.


24×7 EXPERT MONITORING.

Eyes on glass around the clock, ready to respond.


RAPID RESPONSE.

Contain and remediate threats before they impact your agency.


TARGET IMPACTFUL THREATS.

Let our experts investigate events and proactively threat hunt.




COMPREHENSIVE CYBERSECURITY FOR AUSTRALIAN GOVERNMENT.

Our cybersecurity services are designed for Federal and State government
agencies, based on our extensive experience, partnerships with Government and
international best practice.

SECURITY OPERATIONS CENTRE

24×7 threat monitoring, response and proactive threat hunting.

Learn more

SECURE INTERNET

Consistent, compliant infosec protection for users, apps and data wherever they
are located.

Learn more

SECURE CLOUD

On demand compute and storage that always assumes it’s under attack.

Learn more

SECURE DATACENTRES

Sovereign data fortresses enabled to protect apps and data up to TOP SECRET.
Certified Strategic by the Australian Government.

Learn more

SECURITY OPERATIONS CENTRE

24×7 threat monitoring, response and proactive threat hunting.

Learn more

SECURE INTERNET

Consistent, compliant infosec protection for users, apps and data wherever they
are located.

Learn more

SECURE CLOUD

On demand compute and storage that always assumes it’s under attack.

Learn more

SECURE DATACENTRES

Sovereign data fortresses enabled to protect apps and data up to TOP SECRET.
Certified Strategic by the Australian Government.

Learn more


EASY TO BUY. EASY TO DEPLOY. EASY TO USE.


 * GOVERNMENT PANELS.
   
   It's simple to buy from us through existing procurement frameworks and
   contracts.


 * API INTEGRATION.
   
   Our services integrate with your ITSM tools like ServiceNow and VMWare.


 * LOCAL SUPPORT.
   
   Our security-cleared engineers are here for you. Highly trained, proudly
   local.


BUILT FOR GOVERNMENT. FOR YOUR AGENCY.

We start with the needs of your agency and our 15 years experience in
government, then we develop the solutions you need. That’s why so many agencies
look to us for their cybersecurity and government cloud services.




GOT A QUESTION? TALK TO US.

We are always here to answer your enquiries.

Call us Enquire online
Send
1800 004 943


WE'LL BE IN TOUCH WITH YOU SOON.

Thank you for contacting us.


FROM THE BLOG

THE ROLE OF SECURITY DOMAINS IN GATEWAY ...

Secure Internet Gateways like Macquarie Government’s SIGNET play an important
role in protecting digital government. To better understand ...

Read More

WHAT IS SOCI?

In the past 12 months, amendments to the Securing of Critical Infrastructure
(SOCI) and the new Security Legislation Amendment (Critical Inf...

Read More

CYBER BULLETIN - OCTOBER 2022

“Side door” infiltration through users replicating their credentials on external
websites. This bulletin uses the MITRE Adversarial Tact...

Read More


MACQUARIE GOVERNMENT

 * Secure Cloud
   * Protected Cloud
   * OFFICIAL Cloud
   * Unclassified Cloud
   * Secure Cloud Exchange
   * Essential 8
   * Enhanced Virtual Data Centre
 * Secure Internet Gateway
 * Cyber Security Services
   * Distributed Denial of Service
   * SIGBOX Secure file sharing
   * Security Operations Centre
 * State Government Cloud
 * Colocation
   * Sydney Data Centre IC3 East
   * Canberra Data Centre
 * Why Us?
   * Easy to Buy
   * Certifications and Accreditations
   * Partner With Us
 * Blog
 * Resources
 * Careers
 * Locations
 * Legal
 * Contact Us

Proudly part of the Macquarie Telecom Group
 * About The Group
 * News
 * Investors


 * Government
 * Telecom
 * Cloud Services
 * Data Centres

© Copyright 2023 Macquarie Telecom Group
 * Privacy Policy
 * Terms Of Use
 * Service Agreements



word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
Live Chat