ZirilioZirilio
  • Assess
  • Protect
  • Manage
  • Products
  • Essential Eight
  • Penetration Testing
  • Why ZIRILIO?
  • Contact

Cybersecurity simplified

We’re with you every step along the way in your cybersecurity journey.

Zirilio Elements
per person, per month
Contact Us
Security for Microsoft 365
A simple package that targets specific security needs
Includes general security notifications from the Zirilio Security Operations Center. Upgrade for assertive alerts and loggingZSOC +
Email security
Monitoring and reporting
Starts at 50 users
Requires E3 or higher
Get it nowGet it now
Zirilio Plus
per person, per month
Contact Us
Firewall + Endpoint
Better protection against ransomware
Includes security alerts and short-term logging of a limited number of devices through the Zirilio Security Operations Center. For advanced logging and direct access to ZSOC, upgrade your planEnhanced ZSOC +
Email security
Web security
Endpoint protection
Managed firewall
Starts at 50 users
Requires E3 or higher
Get it nowGet it now
Zirilio Pro
per person, per month
Contact Us
Powerful Protection
Our most popular package for modern offices and teams
Full ZSOC
All Zirilio Plus features
Enhanced SIEM
Web application firewall
Vulnerability detection
Starts at 50 users
Requires E3 or higher
Get it nowGet it now
Zirilio Complete
design your own
Flex
Comprehensive Cybersecurity
Build your own package to meet your exact needs and complete your maturity level upgrade
Custom ZSOC
All Zirilio Pro features
Full integration support
Detailed migration roadmap
CASB
Custom firewall
Data-Loss Prevention
Secure remote access
Select the add-ons you need
Starts at 50 users
Requires E3 or higher
Get it nowGet it now

Compare packages and get detailed info about features.

Do you have a specific need? See a detailed list of add-ons to our packages that address many common needs.

Comprehensive cybersecurity for all

We combine industry-leading software and hardware with predictable and easily understandable pricing to provide you with confidence and peace of mind that your data is safe.

We can also help you design a custom package to meet the specific requirements of your complex or large organisation. Our highly experienced team of Australia-based cybersecurity engineers have advanced technical capabilities to assess, manage and protect organisations of all sizes — across any industry.

Zirilio

The security operations center of the future

ZSOC is our 24/7, Australia-based SOC that provides you with insights and alerts to keep you safe
lock_clock

24/7 Security

ZSOC combines advanced software with highly-trained, Australia-based cybersecurity engineers who watch over your network
cloud_done

SOC-as-a-service

ZSOC can scale from basic monitoring of a few devices to a fully-managed security solution supporting massive networks
groups

Technical prowess

ZSOC augments and extends your internal security team with advanced analytics to alert you immediately when something is wrong
devices

Easy integration

ZSOC can be integrated with your existing hardware to get you up and running quickly
notification_important

Filter the noise

ZSOC only sends meaningful security alerts and notifications to save you time and free you up to focus on other priorities
security

Industry standard

ZSOC is built using industry standard tools and components to ensure quality and performance
insights

Reports & insights

ZSOC enables powerful reporting and insights to simplify management of your technology infrastructure
checklist

Tremendous value

ZSOC delivers outstanding value through a pricing model that requires minimal upfront investment

More than just a licence

You will sleep better knowing that you are protected by ZSOC and our team — 24/7

Compare our packages

Zirilio Elements Zirilio Plus Zirilio Pro Zirilio Complete

ZSOC

All of our packages include ZSOC, our 24/7 Australia-based Zirilio Security Operations Center platform that has been thoughtfully designed to keep you safe. ZSOC is the ultimate fully-managed SOC, and provides expert monitoring and assessment of threats to give you actionable alerts to stop attacks and keep your network protected.
Basic Enhanced Full Custom

Email security

Active scanning and filtering to help prevent ransomware and phishing attacks that can disrupt your operations.
✓ ✓ ✓ ✓

Web security

Prevent ransomeware, viruses and malware by getting more control over web access. Disable malicious attacks on your network, stop data loss and block inappropriate content with cloud-based web security.
✓ ✓ ✓

Endpoint protection

Replace your legacy anitvirus software with cloud-based security that will protect your network and all of the devices that connect to it. Defend against common ransomware and malware by actively scanning for known threats and using threat intelligence to empower an immediate response that keeps you running smoothly. Endpoint protection can also ensure compliance with security policies at the user level, which helps protect your network from hackers.
✓ ✓ ✓

Managed firewall

We deploy highly configurable and flexible managed firewalls for maximum performance, to keep your data center, edge or branch offices safe. In addition to blocking unwanted traffic and ensuring that valid transactions move smoothly across your network, managed firewalls include VPN, IPS, anti-evasion, encrypted inspection, SD-WAN and mission-critical application proxies.
✓ ✓

SIEM

Our Security Information and Event Management platform allows the detection, capture and logging of critical data related to the performance of your network and ongoing security threats and attacks. This increases visibility into your threat matrix and security posture, while also providing advanced capabilities such as asset discovery, vulnerability assessment, intrusion detection, behavioral monitoring and event correlation. Our SIEM sensors enable more granular and detailed reporting and real-time dashboards for the most sophisticated and demanding security needs.
✓ ✓

WAF

We protect your website and filter our the noise with PCI-compliant, automated security that reduces the risks created by third-party code. Our WAF ensures that your website only receives traffic from visitors you want, and shuts down hackers and bots.
✓ ✓

Vulnerability detection

You can't protect what you can't see. We help you gain insight and visibility into what's happening on your network by checking for vulnerabilities and misconfigurations across assets silently and continuously, using active and passive network analysis combined with software agents that work to detect and report problems in real time.
✓ ✓

Full integration support

We can work with you design a complete cybersecurity solution that integrates gracefully with your existing network and licensing agreements, helping you maximize your budget, save money and reduce waste.
✓

Migration roadmap

We can collaborate with your team to create forward-looking roadmaps and plans to help tell the story and paint the picture of your evolving cybersecurity maturity level and threat posture for your executive leadership team and internal staff. Having a long-term plan and partner can help manage expectations and ensure sufficient budgetary resources to accomplish your internal goals.
✓

Data-Loss Prevention

Prevent reputation and brand damage resulting from data breaches, leaks, exfiltration or unwanted destruction of sensitive data with DLP as part of your package. We can help you protect Personally Identifiable Information and comply with regulations about customer data while guarding intellectual property and the crown jewels of your organisation. With Bring Your Own Device and work from home office environments continuing to evolve and expand, DLP is a must-have component for many organisations to secure the enterprise.
✓

CASB

Our Cloud Access Security Broker helps you manage and analyze usage of cloud apps across your organisation, control access to data resources and discover sources of shadow IT in your organisation. With a CASB as part of your package, you can also evaluate your organisation to monitor compliance, sanction approved cloud apps, prevent leaks and limit access to regulated data.
optional

Custom firewall

We can help you design the perfect firewall to meet your exact use case and need. We can deploy devices that meet your internal high security requirements, including for the most demanding customers in the high technology, financial services and defence industries.
optional

Secure remote access

Let us collaborate with your team to design the perfect Secure Remote Access solution for your organisation. We can help you ensure that your organisation is optimised to support secure work from home and BYOD is configured correctly and aligned with cybersecurity best practices.
optional

Optional add-ons and upgrades

Essential Eight Audit Review
Essential Eight Dashboard Monitoring
Cyber Incident Response
SecureTest Penetration Testing
Vulnerability Assessment
Red Team Campaigns
Dark Web Monitoring
Brand Protection
Data Leakage Detection
Technical Leakage Detection
Attack Surface Monitoring
Advanced Threat Intelligence
Cybersecurity Training
Cybersecurity Executive Briefings
Cybersecurity Crisis Communications and PR

Essential Eight Audit Review

Let us help you with a comprehensive review of your Essential Eight Maturity Level and audit of your security posture. We can help you understand exactly what steps you need to take to properly implement the Essential Eight an important new cybersecurity framework created by the Australian Cyber Security Centre of the Australian Signals Directorate to help improve your readiness and preparation in the event of a cyber attack.
By prioritising the eight most basic mitigation strategies, the ACSC hopes to help organisations protect themselves and avoid disastrous outcomes caused by hacking and cyber attacks. Implementing the Essential Eight now also saves you the pain, time and money of responding to a major cyber security incident on your own.
It is likely that soon all organisations in Australia will be required to disclose their Essential Eight Maturity Level and demonstrate compliance with these most basic preventative measures. Wherever you are in your cyber security journey — whether you are sophisticated and experienced, or just starting out — we can help you level up and improve your security posture.

Essential Eight Dashboard Monitoring

Zirilio Pro and Zirilio Complete package customers can add an Essential Eight Dashboard that provides a real-time summary of your organisation’s compliance with the ACSC Essential Eight framework. This is a powerful add-on that provides an easy-to-understand snapshot of your cybersecurity Maturity Level that can be useful for providing updates to executive leaders within your organisation, insurers and partners.

Cyber Incident Response

When you have a cyber incident you need the best expert support to recover and get back on track. Let us help you quickly pick up the pieces and restore operations while securing your organisation as you move forward. Our team has deep experience in cyber incident response and can assist you in responding to any cybersecurity crisis you may encounter.

SecureTest Penetration Testing

With pricing starting at $3,499, Our Zirilio SecureTest penetration testing product covers the most common needs and scenarios, including:
  • Internal Infrastructure Penetration Testing
  • External Infrastructure Penetration Testing
  • Web Application Penetration Testing
  • Mobile Application Penetration Testing
Don’t risk outsourcing your cyber security overseas. Penetration testing works by intentionally allowing a breach of your network, systems and security to identify weaknesses and security problems. It is not advisable to allow anyone outside of Australia to do this. All of our engineers are based in Australia and have more than 10 years of security experience. We only hire the best local staff and do not outsource your penetration testing like some competitors. We are bound by strict Australian laws and we follow the highest standards.

After gathering technical details about your organisation, our team will confirm pricing for your penetration test. To reduce the possibility of disruptions to your business processes, testing is conducted in accordance with a pre-determined schedule and mutually agreed upon rules and guidelines. A comprehensive report will be produced once testing has concluded, listing vulnerabilities and exploits categorised by risk levels.

Recommendations for mitigation strategies will also be provided according to the cyber-threat landscape of your business, along with guidance on how to address any outstanding issues. We also offer technical and executive management debriefing sessions to share our findings. Once the issues have been rectified by you, we can conduct a complimentary remediation scan. Optionally, our team can remediate all identified issues for you and recommend the right level of ongoing protection through our Zirilio Essentials, Plus, Pro or Complete package.

Vulnerability Assessment

Our vulnerability assessment includes the identification, measurement and ranking of severity of the vulnerabilities in specific systems for your organisation. In addition to providing you with a valuable understanding of your security fabric, this type of assessment can also help you think in a rigorous way about how to intelligently deploy resources to remediate the most serious issues.

Red Team Campaigns

Looking to go beyond a security audit, vulnerability scan or penetration test without hiring new staff?
Hire our external Red Team to design and run the most rigorous information security test available. This add-on, called Zirilio Red is an advanced Red Team campaign centered around testing a specific set of goals that emulate likely attack scenarios for your organisation.
Our Zirilio Red product comes in three distinct flavors to match up with the most common use cases:

Zirilio Red – Advise Your White Team

  • Provide expert oversight to the team overseeing the Blue Team and the Red Team
  • Help refine campaign objectives and rules to increase rigor
  • We are neutral experts, interpreting the final results of the campaign

Zirilio Red – Your External Red Team

  • Our staff serve as the Red Team and attack the client over an agreed upon period of time (14-30 days)
  • Provide detailed info sharing about TTP to help drive improvements
  • We engage creatively and aggressively to find weaknesses

Zirilio Red – Your Purple Team Leader

  • Help facilitate communication and information sharing between Blue and Red Teams
  • Help you build processes and systems to support ongoing sharing
  • We are a trusted expert, fully invested in your long-term security

Dark Web Monitoring

The dark web is often the first place your organization’s breached data lands — from compromised credentials, third party leaks, ransomware dump listings. It also is a source for invaluable threat intelligence — pre-planned attacks or discussion around vulnerabilities and exploits. With our Dark Web Monitoring add-on we can provide you with unparalleled visibility into dark web risks to your organization, enabling teams to take actions on threats before they become cyber incidents.

Brand Protection

Attackers exploit your online brand for phishing schemes, impersonating your brand and executives online to defraud customers, harvest credentials, or spread disinformation. With our Brand Protection add-on, we can proactively identify instances of brand or executive impersonation, allowing you to react faster, launch takedowns and prevent damages to customer trust or loss of account credentials.

Data Leakage Detection

Whether from an attack or human error from an employee, third party, or contractor, data exposure is inevitable. We can help you prevent or contain a data breach online by continuously monitoring the most common sources and marketplaces for stolen data. Get high-confidence coverage with accurate alerting to your exposure.

Technical Leakage Detection

Protect your organisation’s valuable intellectual property and technical data from exposure online through active monitoring across a comprehensive range of websites, including user forums, the dark web, technical sources and closed sources.

Attack Surface Monitoring

As your organisation’s digital footprint continues to expand, so too does your digital risk. New cloud services, more work-from-home network connections, and a growing mobile workforce are increasing the size of your attack surface — and the complexity of protecting it. To defend against a myriad of cybersecurity threats, you need a better handle on what your attack surface looks like, where the greatest risks are and how you can mitigate them.
Our attack surface monitoring technology provides visibility into digital assets, uncovers shadow IT, and helps visualize areas of highest exposure to risk. To accomplish this, our platform enables you to:
1. Monitor endpoints
Use an independent monitoring process to continuously assess endpoints — including physical endpoints like laptops, mobile phones, tablets, and desktops as well as digital environments like services and virtual territory. Monitoring network connections can target threats and risky behavior before they become a problem. And increasing visibility into internal controls can help to stop security attacks by determining which endpoints represent the greatest risk to your attack surface.
2. Visualize vulnerabilities
Simulation and forecasting tools can help to visualize vulnerabilities in your attack surface before malicious actors have the chance to exploit them. Tools that run scenarios through your network and mimic attacks can help identify where vulnerabilities exist and what damage they might represent.
3. Limit human error
Even the most sophisticated attack surface monitoring programs may not protect you from human error. Training employees to avoid falling for the latest phishing scams and social engineering attacks is essential. Limiting the devices employees may use helps reduce risk. Security measures such as two-factor authentication and frequent password changes help limit the ability of attackers to successfully penetrate defenses.

Advanced Threat Intelligence

Today’s threat landscape evolves faster than ever, and security teams need to understand how to best respond to emerging techniques relevant to their organisation, sector, and geography. Let us act as your organisation’s threat intelligence unit, combining the expertise of our world-class threat intelligence research team with advanced analysis. Take your threat intelligence program to the next level with a powerful source for your organisation’s tactical, technical, and strategic intelligence.

Cybersecurity Training

We can provide online or in-person cybersecurity training to your team and staff to improve the security posture within your organisation. We know that end user behavior and culture is a key component to increasing the cybersecurity maturity level of any organisation so our training focuses on helping users understand how to recognize threats and how to change their behavior to protect themselves and the organisation.

Cybersecurity Executive Briefings

We can provide industry-specific executive briefings to your leadership team that focus on the latest cybersecurity threats and trends affecting your organisation. These sessions are a powerful tool for keeping boards, CEOs, CFOs, and other executive leaders fully engaged and aware of your organisation’s cybersecurity maturity level, risk profile and corresponding budgetary resource needs.

Cybersecurity Crisis Communications and PR

Your technical response to a cyber incident is only part of the equation for success. Your organisation’s ability to manage internal and external communications during a crisis can make you or break your reputation, brand and ability to recover. Let us help you prepare a thoughtful and sophisticated communications strategy and plan so that when the time comes and you have to respond you are fully prepared for any scenario.

Let us help you get stronger today.


zirilio-logo
502/55 Lime St
Sydney NSW 2000
1300 652 646
info@zirilio.com

Sydney | Melbourne | Jakarta

Services

  • Essential Eight
  • Penetration Testing
  • Incident Response
  • Vulnerability Assessment
  • Cloud Risk Assessment
  • Endpoint Protection
  • Microsoft 365 – Securing Microsoft 365 Tenant
  • Cloud Web Application Firewall (WAF)

Company

  • About
  • Partners
  • Contact
  • Terms and Conditions
  • Privacy Policy
LinkedIn
© 2022 ZIRILIO. ALL RIGHTS RESERVED. PRIVACY POLICY | TERMS & CONDITIONS