sun-secure.com.au
Open in
urlscan Pro
77.37.66.66
Public Scan
Submitted URL: https://www.sun-secure.com.au/
Effective URL: https://sun-secure.com.au/
Submission: On July 14 via automatic, source certstream-suspicious — Scanned from AU
Effective URL: https://sun-secure.com.au/
Submission: On July 14 via automatic, source certstream-suspicious — Scanned from AU
Form analysis
3 forms found in the DOM<form class="metform-form-content">
<div class="mf-main-response-wrap mf-response-msg-wrap" data-show="0">
<div class="mf-response-msg"><i class="mf-success-icon fas fa-check"></i>
<p></p>
</div>
</div>
<div class="metform-form-main-wrapper">
<div data-elementor-type="wp-post" data-elementor-id="107" class="elementor elementor-107" data-elementor-post-type="metform-form">
<div class="elementor-inner">
<div class="elementor-section-wrap">
<section class="elementor-section elementor-top-section elementor-element elementor-element-602c9f89 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="602c9f89" data-element_type="section"
data-settings="{"background_background":"classic"}">
<div class="elementor-background-overlay"></div>
<div class="elementor-container elementor-column-gap-default">
<div class="elementor-row">
<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-203532fc" data-id="203532fc" data-element_type="column" data-settings="{"background_background":"classic"}">
<div class="elementor-column-wrap elementor-element-populated">
<div class="elementor-widget-wrap">
<div class="elementor-element elementor-element-64ff9333 elementor-widget__width-auto elementor-widget elementor-widget-mf-email" data-id="64ff9333" data-element_type="widget"
data-settings="{"mf_input_name":"mf-email"}" data-widget_type="mf-email.default">
<div class="elementor-widget-container">
<div class="mf-input-wrapper"><input type="email" class="mf-input " id="mf-input-email-64ff9333" name="mf-email" placeholder="Enter Your Email " aria-invalid="false" value=""></div>
</div>
</div>
<div class="elementor-element elementor-element-32eecbd8 elementor-widget__width-auto mf-btn--center elementor-widget elementor-widget-mf-button" data-id="32eecbd8" data-element_type="widget"
data-widget_type="mf-button.default">
<div class="elementor-widget-container">
<div class="mf-btn-wraper " data-mf-form-conditional-logic-requirement=""><button type="submit" class="metform-btn metform-submit-btn " id=""><span>Subscribe </span></button></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</section>
</div>
</div>
</div>
</div>
</form>
<form class="metform-form-content">
<div class="mf-main-response-wrap mf-response-msg-wrap" data-show="0">
<div class="mf-response-msg"><i class="mf-success-icon fas fa-check"></i>
<p></p>
</div>
</div>
<div class="metform-form-main-wrapper">
<div data-elementor-type="wp-post" data-elementor-id="143" class="elementor elementor-143" data-elementor-post-type="metform-form">
<div class="elementor-inner">
<div class="elementor-section-wrap">
<section class="elementor-section elementor-top-section elementor-element elementor-element-5503d841 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5503d841" data-element_type="section"
data-settings="{"background_background":"classic"}">
<div class="elementor-container elementor-column-gap-default">
<div class="elementor-row">
<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-72e92056" data-id="72e92056" data-element_type="column">
<div class="elementor-column-wrap elementor-element-populated">
<div class="elementor-widget-wrap">
<div class="elementor-element elementor-element-34fef3d7 elementor-widget elementor-widget-mf-text" data-id="34fef3d7" data-element_type="widget" data-settings="{"mf_input_name":"mf-text"}"
data-widget_type="mf-text.default">
<div class="elementor-widget-container">
<div class="mf-input-wrapper"><input type="text" class="mf-input " id="mf-input-text-34fef3d7" name="mf-text" placeholder="Your Name " aria-invalid="false"></div>
</div>
</div>
<div class="elementor-element elementor-element-654e59e2 elementor-widget elementor-widget-mf-email" data-id="654e59e2" data-element_type="widget" data-settings="{"mf_input_name":"mf-email"}"
data-widget_type="mf-email.default">
<div class="elementor-widget-container">
<div class="mf-input-wrapper"><input type="email" class="mf-input " id="mf-input-email-654e59e2" name="mf-email" placeholder="Your Email " aria-invalid="false" value=""></div>
</div>
</div>
<div class="elementor-element elementor-element-7e970611 elementor-widget elementor-widget-mf-text" data-id="7e970611" data-element_type="widget" data-settings="{"mf_input_name":"mf-text"}"
data-widget_type="mf-text.default">
<div class="elementor-widget-container">
<div class="mf-input-wrapper"><input type="text" class="mf-input " id="mf-input-text-7e970611" name="mf-text" placeholder="Subject " aria-invalid="false"></div>
</div>
</div>
<div class="elementor-element elementor-element-239c321d elementor-widget elementor-widget-mf-textarea" data-id="239c321d" data-element_type="widget" data-settings="{"mf_input_name":"mf-textarea"}"
data-widget_type="mf-textarea.default">
<div class="elementor-widget-container">
<div class="mf-input-wrapper"><textarea class="mf-input mf-textarea " id="mf-input-text-area-239c321d" name="mf-textarea" placeholder="Your Message " cols="30" rows="10" aria-invalid="false"></textarea></div>
</div>
</div>
<div class="elementor-element elementor-element-449c85c2 mf-btn--center elementor-widget elementor-widget-mf-button" data-id="449c85c2" data-element_type="widget" data-widget_type="mf-button.default">
<div class="elementor-widget-container">
<div class="mf-btn-wraper " data-mf-form-conditional-logic-requirement=""><button type="submit" class="metform-btn metform-submit-btn " id=""><span>Send Message </span></button></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</section>
</div>
</div>
</div>
</div>
</form>
<form class="metform-form-content">
<div class="mf-main-response-wrap mf-response-msg-wrap" data-show="0">
<div class="mf-response-msg"><i class="mf-success-icon fas fa-check"></i>
<p></p>
</div>
</div>
<div class="metform-form-main-wrapper">
<div data-elementor-type="wp-post" data-elementor-id="143" class="elementor elementor-143" data-elementor-post-type="metform-form">
<div class="elementor-inner">
<div class="elementor-section-wrap">
<section class="elementor-section elementor-top-section elementor-element elementor-element-5503d841 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5503d841" data-element_type="section"
data-settings="{"background_background":"classic"}">
<div class="elementor-container elementor-column-gap-default">
<div class="elementor-row">
<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-72e92056" data-id="72e92056" data-element_type="column">
<div class="elementor-column-wrap elementor-element-populated">
<div class="elementor-widget-wrap">
<div class="elementor-element elementor-element-34fef3d7 elementor-widget elementor-widget-mf-text" data-id="34fef3d7" data-element_type="widget" data-settings="{"mf_input_name":"mf-text"}"
data-widget_type="mf-text.default">
<div class="elementor-widget-container">
<div class="mf-input-wrapper"><input type="text" class="mf-input " id="mf-input-text-34fef3d7" name="mf-text" placeholder="Your Name " aria-invalid="false"></div>
</div>
</div>
<div class="elementor-element elementor-element-654e59e2 elementor-widget elementor-widget-mf-email" data-id="654e59e2" data-element_type="widget" data-settings="{"mf_input_name":"mf-email"}"
data-widget_type="mf-email.default">
<div class="elementor-widget-container">
<div class="mf-input-wrapper"><input type="email" class="mf-input " id="mf-input-email-654e59e2" name="mf-email" placeholder="Your Email " aria-invalid="false" value=""></div>
</div>
</div>
<div class="elementor-element elementor-element-7e970611 elementor-widget elementor-widget-mf-text" data-id="7e970611" data-element_type="widget" data-settings="{"mf_input_name":"mf-text"}"
data-widget_type="mf-text.default">
<div class="elementor-widget-container">
<div class="mf-input-wrapper"><input type="text" class="mf-input " id="mf-input-text-7e970611" name="mf-text" placeholder="Subject " aria-invalid="false"></div>
</div>
</div>
<div class="elementor-element elementor-element-239c321d elementor-widget elementor-widget-mf-textarea" data-id="239c321d" data-element_type="widget" data-settings="{"mf_input_name":"mf-textarea"}"
data-widget_type="mf-textarea.default">
<div class="elementor-widget-container">
<div class="mf-input-wrapper"><textarea class="mf-input mf-textarea " id="mf-input-text-area-239c321d" name="mf-textarea" placeholder="Your Message " cols="30" rows="10" aria-invalid="false"></textarea></div>
</div>
</div>
<div class="elementor-element elementor-element-449c85c2 mf-btn--center elementor-widget elementor-widget-mf-button" data-id="449c85c2" data-element_type="widget" data-widget_type="mf-button.default">
<div class="elementor-widget-container">
<div class="mf-btn-wraper " data-mf-form-conditional-logic-requirement=""><button type="submit" class="metform-btn metform-submit-btn " id=""><span>Send Message </span></button></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</section>
</div>
</div>
</div>
</div>
</form>
Text Content
* Home * Services * What makes us Different * Blog * Privacy Policy X Contact Us CYBER SECURITY SOLUTIONS FOR ORGANIZATION WITH SMB We are your trusted Australian cybersecurity partner, offering unbeatable, lightning-fast, and tailored Cybersecurity services accessible to everyone, from individuals, startups to SMB’s and Not for profits to Enterprises. Discover More Facebook-f Twitter Linkedin-in Pinterest-p VIRTUAL EVENTS Cum sociis natoque penatibus et magnisd is parturient montes nasc. August 11, 2021 NEW REPORT Cum sociis natoque penatibus et magnisd is parturient montes nasc. August 11, 2021 EXPERT PANEL Cum sociis natoque penatibus et magnisd is parturient montes nasc. August 11, 2021 TRUSTED OVER 2300+ COMPANIES IN THE WORLD WHAT WE OFFER We offer CyberSecurity as a Service (CSaaS) to Everyone OUR SERVICES What We Offer SECURE DESIGN/SECURE CLOUD Donec pede justo, fringilla vel, aliquet nec vulputate eget, arcu. In enim justo, rhoncus ut imperdiet. Learn More CAAS FOR BUSINESSES Donec pede justo, fringilla vel, aliquet nec vulputate eget, arcu. In enim justo, rhoncus ut imperdiet. Learn More CAAS FOR HOME USERS Donec pede justo, fringilla vel, aliquet nec vulputate eget, arcu. In enim justo, rhoncus ut imperdiet. Learn More SECURE DESIGN/SECURE CLOUD Donec pede justo, fringilla vel, aliquet nec vulputate eget, arcu. In enim justo, rhoncus ut imperdiet. Learn More CAAS FOR BUSINESSES Donec pede justo, fringilla vel, aliquet nec vulputate eget, arcu. In enim justo, rhoncus ut imperdiet. Learn More DATA ENCRYPTION AND PRIVACY Donec pede justo, fringilla vel, aliquet nec vulputate eget, arcu. In enim justo, rhoncus ut imperdiet. Learn More PENETRATION TESTING: Donec pede justo, fringilla vel, aliquet nec vulputate eget, arcu. In enim justo, rhoncus ut imperdiet. Learn More CSAAS FOR STRATUPS View More CSAAS FOR SMB View More CSAAS FOR NOT FOR PROFIT View More CSAAS FOR HEALTHCARE AND PUBLIC SERVICES View More YOUR PERSONAL CISO View More SECURE CYBER STRATEGY A secure cyber strategy is a comprehensive plan for protecting an organization’s digital assets from cyber threats. This includes identifying potential threats and vulnerabilities, developing policies and procedures to mitigate those risks, and implementing security technologies to protect against those risks. Return to Top CSASECURE DESIGN/SECURE CLOUD ARCHITECTUREAS FOR SMB Support startups in achieving and maintaining compAssist startups in designing and implementing secure cloud architectures that align with industry best practices. This includes secure network configurations, data encryption, and secure identity and access management (IAM) policies.liance with relevant regulatory frameworks and industry standards. This includes assisting with compliance assessments, implementing necessary controls, and preparing documentation for audits. Return to Top SECURE DEVOPS CONSULTING Help startups integrate security into their DevOps processes by implementing secure coding practices, automated security testing, and continuous security monitoring. Guide them in building a secure software development lifecycle (SDLC) to identify and address security issues early on Return to Top SECURE CLOUD COMPLIANCE ASSISTANCE Support startups in achieving and maintaining compliance with relevant regulatory frameworks and industry standards. This includes assisting with compliance assessments, implementing necessary controls, and preparing documentation for audits. Return to Top SECURITY AWARENESS TRAINING Cybersecurity awareness training programs to educate startup employees about common security threats, safe computing practices, and how to identify and report potential security incidents. Raise awareness about the importance of maintaining a security mindset. Return to Top DATA PROTECTION AND PRIVACY Help startups implement data protection measures to safeguard sensitive information. This includes advising on data classification, implementing data loss prevention (DLP) controls, and ensuring compliance with data privacy regulations Return to Top INCIDENT RESPONSE PLANNING Collaborate with startups to develop incident response plans that outline procedures for detecting, responding to, and recovering from security incidents. Conduct tabletop exercises to test the effectiveness of the response plan. Return to Top WEB APPLICATION SECURITY TESTING Perform comprehensive web application security assessments, including penetration testing and vulnerability scanning, to identify potential weaknesses in the startup’s web applications. Provide actionable recommendations for improving security. Return to Top CLOUD SECURITY MONITORING AND THREAT INTELLIGENCE Implement cloud security monitoring solutions that provide real-time visibility into the startup’s cloud environment. Offer threat intelligence services to detect and respond to emerging threats and vulnerabilities. Return to Top VENDOR SECURITY ASSESSMENTS Assist startups in evaluating the security posture of their third- party vendors and service providers. Conduct security assessments and due diligence to ensure that vendors meet the necessary security requirements Return to Top VULNERABILITY ASSESSMENTS Conduct thorough assessments of IoT devices and systems to identify potential vulnerabilities and security gaps. This includes analyzing firmware, network protocols, communication channels, and authentication mechanisms. Return to Top PENETRATION TESTING Conduct thorough assessments of IoTPerform controlled testing scenarios to identify weaknesses in end-points ○ application and network infrastructure. This involves simulating real-world attacks to evaluate the system’s resilience and discover vulnerabilities that can be exploited. devices and systems to identify potential vulnerabilities and security gaps. This includes analyzing firmware, network protocols, communication channels, and authentication mechanisms. Return to Top ENDPOINT SECURITY Provide guidance on secure device configuration, including best practices for network settings, access controls, encryption, and firmware updates. Help clients establish secure configurations for their IoT devices to minimize potential risks. Return to Top DATA ENCRYPTION AND PRIVACY Assist in implementing strong encryption protocols and privacy measures to protect the sensitive data transmitted and stored by IoT devices. This includes end-to-end encryption, secure data storage, and compliance with relevant data protection regulations. Return to Top SECURITY ARCHITECTURE Help design and implement secure architectures, including robust network segmentation, secure gateways, and centralized monitoring and management systems. Provide guidance on securing data flows and ensuring secure communication between devices. Return to Top SECURITY POLICY AND GOVERNANCE Assist in developing IoT security policies and governance frameworks for organizations deploying IoT devices. This includes defining roles and responsibilities, incident response procedures, and ongoing monitoring and auditing mechanisms. Return to Top THREAT INTELLIGENCE AND MONITORING Provide IoT-specific threat intelligence and continuous monitoring services to identify and respond to emerging threats and vulnerabilities. This includes real-time monitoring of device behavior, anomaly detection, and threat hunting. Return to Top SECURE ASSET LIFECYCLE MANAGEMENT Offer guidance on secure device provisioning, decommissioning, and disposal processes. Help clients establish robust procedures for managing the entire lifecycle of IoT devices to minimize security risks. Return to Top EMPLOYEE TRAINING AND AWARENESS Conduct cybersecurity awareness training programs to educate employees and end-users about the unique security considerations of IoT devices. This includes raising awareness about potential risks, safe usage practices, and incident reporting procedures. Return to Top TOOLS Appknox, AWS, Veri and Palo, Entrust, Fortinet Return to Top IR & DFIR Offer guidance on secure device provisioning, decommissioning, and disposal processes. Help clients establish robust procedures for managing the entire lifecycle of IoT devices to minimize security risks. CSAAS FOR STRATUPS Donec pede justo, fringilla vel, aliquet nec vulputate eget, arcu. In enim justo, rhoncus ut imperdiet. Learn More CSAAS FOR SMB Donec pede justo, fringilla vel, aliquet nec vulputate eget, arcu. In enim justo, rhoncus ut imperdiet. Learn More HOW YOUR SUBSCRIPTION HELPS By subscribing to our cybersecurity services, you are not only protecting your business but also contributing to a larger cause. Most profits we make are directly reinvested into our community programs, amplifying the impact of your support. Your partnership helps us ensure that every individual has access to the essential services they need to lead a healthy, educated, and secure life. GET INVOLVED Your support is crucial in helping us continue our mission. Whether through subscribing to our services, donations, volunteering, or partnering with us, there are many ways to get involved and make a difference. Join us in empowering communities and transforming lives. Together, we can build a brighter future for all. Contact Us Subscribe Now WHY CHOOSE US UNBEATABLE COST Donec pede justo, fringilla vel, aliquet nec vulputate eget, arcu. In enim justo, rhoncus ut imperdiet. Learn More FAST EFFECTIVE SERVICES Lorem ipsum dolor sit ametconsectetuer dipiscing elitaenean commodo ligula eget dolor aenean massa. Learn More TAILORED SECURITY FOR ALL Integer tincidunt Cras dapibus bivamus ele mentum semper nisienean vulputate eleife nd tellusenean leo ligula. Learn More CSAAS FOR NOT FOR PROFIT Donec pede justo, fringilla vel, aliquet nec vulputate eget, arcu. In enim justo, rhoncus ut imperdiet. Learn More CSAAS FOR HEALTHCARE AND PUBLIC SERVICES Donec pede justo, fringilla vel, aliquet nec vulputate eget, arcu. In enim justo, rhoncus ut imperdiet. Learn More talk to an expert ADVANCED CYBER SECURITY PROVIDER We are your trusted Australian cybersecurity partner, offering unbeatable, lightning-fast, and tailored security services accessible to everyone, from individuals and startups to small and medium-sized businesses (SMBs) and critical infrastructure providers. We take immense pride in being a local organisation that Australians can rely on, use, and be proud of. 0 + GLOBAL PROJECTS 0 + CLIENTS PROTECT 0 % SERVICE GUARANTEE 0 + EXPERTS TEAM BEST CYBER SECURITY SERVICES Cybersecurity encompasses various factors, principles, and components that contribute to the protection of computer systems, networks, and data from unauthorized access, attacks, and vulnerabilities. Contact Us GENERAL QUESTIONS FREQUENTLY ASKED QUESTIONS? How Can I Safely Browse The Internet? Lorem ipsum dolor sit amet consectetuer adipiscing elitenean commo doligula eget dolorenean massaIn enim justo, rhoncus ut, imperdiet avene natis vitae justo nullam dictum felis eu. How Does Secuvant's Co-managed Security Model Work? Lorem ipsum dolor sit amet consectetuer adipiscing elitenean commo doligula eget dolorenean massaIn enim justo, rhoncus ut, imperdiet avene natis vitae justo nullam dictum felis eu. What Type Frequency Of Alerts And Notifications Will Receive? Lorem ipsum dolor sit amet consectetuer adipiscing elitenean commo doligula eget dolorenean massaIn enim justo, rhoncus ut, imperdiet avene natis vitae justo nullam dictum felis eu. How Is Our Data Stored And Protected And For How Long? Lorem ipsum dolor sit amet consectetuer adipiscing elitenean commo doligula eget dolorenean massaIn enim justo, rhoncus ut, imperdiet avene natis vitae justo nullam dictum felis eu. GENERAL QUESTIONS FREQUENTLY ASKED QUESTIONS? How Can I Safely Browse The Internet? Lorem ipsum dolor sit amet consectetuer adipiscing elitenean commo doligula eget dolorenean massaIn enim justo, rhoncus ut, imperdiet avene natis vitae justo nullam dictum felis eu. How Does Secuvant's Co-managed Security Model Work? Lorem ipsum dolor sit amet consectetuer adipiscing elitenean commo doligula eget dolorenean massaIn enim justo, rhoncus ut, imperdiet avene natis vitae justo nullam dictum felis eu. What Type Frequency Of Alerts And Notifications Will Receive? Lorem ipsum dolor sit amet consectetuer adipiscing elitenean commo doligula eget dolorenean massaIn enim justo, rhoncus ut, imperdiet avene natis vitae justo nullam dictum felis eu. How Is Our Data Stored And Protected And For How Long? Lorem ipsum dolor sit amet consectetuer adipiscing elitenean commo doligula eget dolorenean massaIn enim justo, rhoncus ut, imperdiet avene natis vitae justo nullam dictum felis eu. OUR MISSION: EMPOWERING COMMUNITIES, TRANSFORMING LIVES At SunSecure, we are driven by a profound commitment to uplifting local communities through targeted support in education, healthcare, and food security. Our mission is to create sustainable change by providing the resources and opportunities needed for individuals and businesses to thrive. Uniquely, we leverage the profits from our cybersecurity services to fund these transformative initiatives. CUSTOMISABLE PLANS FOR YOU BEGINNER BEGINNER FREE /MONTH * 30 Days Product Testing * Upgrade Anytime Protection * 500 Malware Removal * 24/7 Live Assistance * Scan Every 12 Hrs * Configure Software One-time Order Now BUSINESS $39.99 /MONTH * 40 Days Product Testing * Upgrade Anytime Protection * 1000 Malware Removal * 24/7 Live Assistance * Scan Every 13 Hrs * Configure Software One-time Order Now EXCLUSIVE $47.85 /MONTH * 50 Days Product Testing * Upgrade Anytime Protection * Unlimited Malware Removal * 24/7 Live Assistance * Scan Every 14 Hrs * Configure Software One-time Order Now CUSTOMISED PRICING PLAN FOR YOU Annual 50% Discount Annual Monthly Custom pricing Annual 50% Discount ESSENTIAL PLAN AU$666.00 / YEAR * Best suited for families and very small businesses, early starts-ups (up to 5 devices & couple of wireless network devices) * Antivirus and anti-malware protection * Home – Office Network security * Basic email security (phishing protection) * Access to online support resources * Monthly one hour call to provide advice * Support incident reporting Buy Now PREMIUM PLAN AU$15,000.00 / YEAR * Suitable for small businesses (Upto 20 Endpoints & 2 networks ) * All Basic Plan features * Threat Intelligence Sharing * Regular vulnerability assessments * Secure remote access solutions * Incident response support * User training on cybersecurity best practices * Monthly security reports * Cloud Security Assessment * External Scans – 2 apps and 10 infra components Buy Now ENTERPRISE SMB PLAN AU$39,000.00 / YEAR * Upto 100 endpoints & 3 Networks (Home, Office, Cloud) * All Premium Plan features * Advanced threat intelligence sharing and analytics * Annual Pen-test with 1 manual re-test & dev-secops integration* * Compliance management (ISM, SOCI, ISO 27K, Australian Privacy principals etc.) * Fortnightly security briefings * Project security reviews – 2 * Vendor Security Assessment – 1 * Cyber Strategy Review – 1 Buy Now Annual ESSENTIAL PLAN AU$1,332 / YEAR * Best suited for families and very small businesses, early starts-ups (up to 5 devices & couple of wireless network devices) * Antivirus and anti-malware protection * Home – Office Network security * Basic email security (phishing protection) * Access to online support resources * Monthly one hour call to provide advice * Support incident reporting Buy Now PREMIUM PLAN AU$30,000 / YEAR * Suitable for small businesses (Upto 20 Endpoints & 2 networks ) * All Basic Plan features * Threat Intelligence Sharing * Regular vulnerability assessments * Secure remote access solutions * Incident response support * User training on cybersecurity best practices * Monthly security reports * Cloud Security Assessment * External Scans – 2 apps and 10 infra components Buy Now ENTERPRISE SMB PLAN AU$78,000 / YEAR * Upto 100 endpoints & 3 Networks (Home, Office, Cloud) * All Premium Plan features * Advanced threat intelligence sharing and analytics * Annual Pen-test with 1 manual re-test & dev-secops integration* * Compliance management (ISM, SOCI, ISO 27K, Australian Privacy principals etc.) * Fortnightly security briefings * Project security reviews – 2 * Vendor Security Assessment – 1 * Cyber Strategy Review – 1 Buy Now Monthly ESSENTIAL PLAN AU$111 / YEAR * Best suited for families and very small businesses, early starts-ups (up to 5 devices & couple of wireless network devices) * Antivirus and anti-malware protection * Home – Office Network security * Basic email security (phishing protection) * Access to online support resources * Monthly one hour call to provide advice * Support incident reporting Buy Now PREMIUM PLAN AU$2,500 / YEAR * Suitable for small businesses (Upto 20 Endpoints & 2 networks ) * All Basic Plan features * Threat Intelligence Sharing * Regular vulnerability assessments * Secure remote access solutions * Incident response support * User training on cybersecurity best practices * Monthly security reports * Cloud Security Assessment * External Scans – 2 apps and 10 infra components Buy Now ENTERPRISE SMB PLAN AU$76,500 / YEAR * Upto 100 endpoints & 3 Networks (Home, Office, Cloud) * All Premium Plan features * Advanced threat intelligence sharing and analytics * Annual Pen-test with 1 manual re-test & dev-secops integration* * Compliance management (ISM, SOCI, ISO 27K, Australian Privacy principals etc.) * Fortnightly security briefings * Project security reviews – 2 * Vendor Security Assessment – 1 * Cyber Strategy Review – 1 Buy Now Custom pricing CISO AS A SERVICE CUSTOM PRICING * All features of the Enterprise plan* * Dedicated Virtual Chief Information Security Officer (CISO) services * Development of customized cybersecurity policies and procedures * Strategic risk management and compliance oversight * Incident response planning and management * Cybersecurity awareness training for employees * Quarterly board-level security reviews and presentations * Dev-Sec-Ops – Guidance Buy Now Home Users Business Users Home Users YEARLY SUBSCRIPTION BEST VALUE FOR 2–6 PEOPLE CAAS FOR FAMILY AU$139.00 / YEAR * For one to six people to share. * Each person can use on up to five devices simultaneously. * Works on PC, Mac, iPhone, iPad and Android phones and tablets. * Up to 6 TB of cloud storage (1 TB per person). * Additional features in the Family Safety mobile app. Buy Now CAAS FOR PERSONAL AU$109.00 / YEAR * For one person. * Use up to five devices simultaneously. * Works on PC, Mac, iPhone, iPad and Android phones and tablets. * 1 TB of cloud storage. Buy Now MONTHLY SUBSCRIPTION BEST VALUE FOR 2–6 PEOPLE CAAS FOR FAMILY AU$14.00 / MONTH * For one to six people to share. * Each person can use on up to five devices simultaneously. * Works on PC, Mac, iPhone, iPad and Android phones and tablets. * Up to 6 TB of cloud storage (1 TB per person). * Additional features in the Family Safety mobile app. Buy Now CAAS FOR PERSONAL AU$11.00 / MONTH * For one person. * Use up to five devices simultaneously. * Works on PC, Mac, iPhone, iPad and Android phones and tablets. * 1 TB of cloud storage. Buy Now Business Users BUSINESS BASIC CAAS FOR FAMILY AU$ 9.00 USER / MONTH (Annual subscription—auto renews) Prices shown here and on following pages do not include GST. The “Payment and Billing” page will show amounts payable including GST (if applicable) before you purchase. Buy Now MOST POPULAR BUSINESS STANDARD CAAS FOR FAMILY AU$ 18.70 USER / MONTH (Annual subscription—auto renews) Prices shown here and on following pages do not include GST. The “Payment and Billing” page will show amounts payable including GST (if applicable) before you purchase. Buy Now RECOMMENDED BUSINESS PREMIUM CAAS FOR FAMILY AU$ 32.90 USER / MONTH (Annual subscription—auto renews) Prices shown here and on following pages do not include GST. The “Payment and Billing” page will show amounts payable including GST (if applicable) before you purchase. Buy Now APPS FOR BUSINESS CAAS FOR FAMILY AU$ 13 USER / MONTH (Annual subscription—auto renews) Prices shown here and on following pages do not include GST. The “Payment and Billing” page will show amounts payable including GST (if applicable) before you purchase. Buy Now Business Users Business Users BUSINESS BASIC CAAS FOR FAMILY AU$ 9.00 USER / MONTH (Annual subscription—auto renews) Prices shown here and on following pages do not include GST. The “Payment and Billing” page will show amounts payable including GST (if applicable) before you purchase. Buy Now MOST POPULAR BUSINESS STANDARD CAAS FOR FAMILY AU$ 18.70 USER / MONTH (Annual subscription—auto renews) Prices shown here and on following pages do not include GST. The “Payment and Billing” page will show amounts payable including GST (if applicable) before you purchase. Buy Now RECOMMENDED BUSINESS PREMIUM CAAS FOR FAMILY AU$ 32.90 USER / MONTH (Annual subscription—auto renews) Prices shown here and on following pages do not include GST. The “Payment and Billing” page will show amounts payable including GST (if applicable) before you purchase. Buy Now APPS FOR BUSINESS CAAS FOR FAMILY AU$ 13 USER / MONTH (Annual subscription—auto renews) Prices shown here and on following pages do not include GST. The “Payment and Billing” page will show amounts payable including GST (if applicable) before you purchase. Buy Now OUR PROFESSIONAL TEAM ERIC T. PARKER Network Security Lonec pede justo, fringilla vel, aliquet nec vulputate eget arcu. Facebook-square Twitter-square Linkedin SHIRA RUBINOFF Security Executive Donec pede justo, fringilla vel, aliquet nec vulputate eget arcu. Facebook-square Twitter-square Linkedin STEVE MORGAN Security Technologist Ronec pede justo, fringilla vel, aliquet nec vulputate eget arcu. Facebook-square Twitter-square Linkedin LATEST NEWS & BLOG Lorem ipsum dolor sit amet consectetuer adipiscing elitenean commodo ligula eget dolorenean massa. HELLO WORLD! Welcome to WordPress. This is your first post. Edit or delete it, then start writing! SUBSCRIBE OUR NEWSLETTER Subscribe DROP US A MESSAGE FOR ANY QUERY Send Message DROP US A MESSAGE FOR ANY QUERY WHERE WE ARE 121 King Street Melbourne, 3000, Australia PHONE: +1 234 567 89 0 I +1 234 567 89 0 EMAIL: support@redshield.com Send Message Facebook-square Twitter-square Linkedin Pinterest-square QUICK LINKS * Home * Services * What makes us Different * Contact Us SUPPORT * Support * Contact Us * Knowledge Base * About Us * FAQ * Partnerships GET IN TOUCH EMAIL: info@redshield.com PHONE: +1 234 567 89 0 0 FAX: +1 ( 987 ) 654 321 9 9 ADDRESS: King Street Melbourne, * Email : info@redshield.com * Phone : +1 234 567 89 0 0 * Address : King Street Melbourne, 3000, Australia 3000, Australia Copyright ©2023 Sun Secure All Rights Reserved