Cloud

  • Cloud Strategy
  • Cloud Discovery
  • Cloud Landing Zone
  • Cloud Migration
  • Cloud Care
  • Cloud App Modernization
  • Data Platforms & Analytics
  • Private & Hybrid Cloud

Modern Work

  • M365 Discovery
  • M365 Migration
  • M365 Management
  • Teams
  • Windows 10

Connectivity

  • NaaS
  • SD-WAN
  • Megaport
  • Transit VPC/VNET

Managed Services

  • Managed Support
  • Managed I.T.
  • Applications
  • Desktop
  • Server Care
  • Networks
  • Cloud Care

Security

  • Cloud Web Security
  • Cloud WAF
  • Public Cloud Security
  • Secure Remote Access
  • Zscaler
Security Intelligence
  • Security Strategy & Consulting
  • Security Intelligence as a Service
  • Vulnerability Management as a Service
  • Network intrusion Detection
  • Endpoint Detection & Response
  • Zero Trust Network Access
security intelligence

Products & Services

Products & Services

Products & Services

Cloud

  • Cloud Strategy Cloud Strategy
  • Cloud Discovery Cloud Discovery
  • Cloud Landing Zone Cloud Landing Zone
  • Cloud Migration Cloud Migration
  • Cloud Care Cloud Care
  • Cloud App Modernization Cloud App Modernization
  • Data Platforms & Analytics Data Platforms & Analytics
  • Private & Hybrid Cloud Private & Hybrid Cloud

Modern Work

  • M365 Discovery M365 Discovery
  • M365 Migration M365 Migration
  • M365 Management M365 Management
  • Teams Teams
  • Windows 10 Windows 10

Connectivity

  • NaaS NaaS
  • SD-WAN SD-WAN
  • Megaport Megaport
  • Transit VPC/VNET Transit VPC/VNET

Managed Services

  • Managed Support Managed Support
  • Managed I.T. Managed I.T.
  • Applications Applications
  • Desktop Desktop
  • Server Care Server Care
  • Networks Networks
  • Cloud Care Cloud Care

Security

  • Cloud Web Security Cloud Web Security
  • Cloud WAF Cloud WAF
  • Public Cloud Security Public Cloud Security
  • Secure Remote Access Secure Remote Access
  • Zscaler Zscaler
Security Intelligence
  • Security Strategy & Consulting
  • Security Intelligence as a Service
  • Vulnerability Management as a Service
  • Network intrusion Detection
  • Endpoint Detection & Response
  • Zero Trust Network Access
Intelligence Intelligence
Contact Us Contact Us
The Instillery The Instillery
Security
Intelligence

We believe that businesses need to go faster than ever in the rapidly changing world of technology. This makes it all the more important to have security services that match the pace of innovation while providing the confidence to execute with velocity.

Our security consultants ensure you receive the black card experience that takes the complexity out of the wickedly technical. Get the top shelf experience paired with the sophisticated security service.

scroll down

Investing in cybersecurity is akin to putting brakes in a car. It doesn’t stop you moving forward, it gives you the confidence to go faster

John Paull
Head of Operations
Milford Asset Management

Security Intelligence

Businesses are reinventing themselves at a relentless pace as both the opportunity and threats of the digital economy emerge. With this velocity of change, we need the confidence that we are securing one of our most valuable assets - our data. Matching speed with safety can be the difference between a digital transformation and a digital disaster.

Security Strategy & Consulting Security Strategy & Consulting

Plan for a safer, more secure future

The first step in building a safe and secure business is shining a light on the current state of your information security. Our expert security team uses best-practice industry frameworks ‘right-sized’ for New Zealand business to assess the security risks facing your business. Our strategy and consulting services are divided into three parts: vulnerability, maturity and test and train services.

For a bird’s eye view of your security maturity, our Information Security Assessment will help you to assess your business’ essential technical security controls, governance and processes, while our Information Security Policy Review service offers a ‘deep dive’ review of your organisation’s security policy documents.

Security Intelligence Security Intelligence

Providing the confidence to match business velocity

Security Intelligence brings together the best technology with a 24x7 security service providing assurance that your security appliances and products are being monitored by security professionals. If your business needs to go fast transforming your IT operations and digital services, we match the speed to be successful in business, with the ability to take evasive action when needed.

Most businesses today have invested in some form of security appliances and products, such as firewalls or endpoint security. These products are in charge of watching and protecting your IT systems, but who watches the watchers? Who is responsible for detecting, assessing and responding to potential threats?

SOC & SIEM

Our Security Operations Centre provides highly skilled security analysts working within our security operations framework. We use leading Security Incident and Event Management software to analyze and correlate data, looking for hidden threats.

For organisations seeking security solutions that go beyond technology to provide business assurance and risk mitigation, Security Intelligence includes monthly consultation with one of our security consultants to make recommendations and implement continuous improvements.

Vulnerability Management Service Vulnerability Management Service

Decrease your attack surface by proactively managing vulnerabilities

Accurate and up-to-date information on all your IT assets and their vulnerabilities provides the basis for managing your attack surface. With the ever-changing environments, periodic scanning no longer provides the immediate and actionable data required to prioritise and manage risks.

Our Vulnerability Management Service provides cloud-managed vulnerability scanning and management, feeding into our Security Intelligence 24x7 service. We will assess and prioritise the vulnerabilities that matter the most, and work with your team to remediate.

Network Intrusion Detection Network Intrusion Detection

Detecting the threats in your network

Protecting your network with a security appliance is important, but equally important is being able to detect when a network or system has already been compromised. With an Intrusion Detection system, every packet across the network is inspected for malicious behaviour, with threats and anomalies being detected for review and remediation.

Delivered as-as-service, we integrate network IDS into our Security Intelligence 24x7 service, ingesting network threat data for analysis and response. This combines an operational framework for addressing threats with best in class technology.

Endpoint Detection & Response Endpoint Detection & Response

Detect suspicious endpoint behaviour and take action

Threats to devices and endpoints are one of the largest challenges security teams face as remote and flexible working grows. As the threats have become more advanced and persistent, the tools to protect ourselves have also changed significantly. Far from signature-based antivirus software, EDR software uses intelligent analysis and machine learning to detect anomalies in behaviour that could indicate a breach.

However, EDR software by itself is far from an answer to this problem, as it requires a security team to analyse and respond to suspicious activity. Delivered as-as-service, our 24x7 Security Intelligence service, will provide a complete EDR solution including leading technology combined with our security response team.

Zero Trust Network Access Zero Trust Network Access

Deliver access to your applications, not your entire network

Provide your people and partners access to your applications from anywhere, at any time, while severely hampering the ability of malicious users or infected devices to scan and access your network.

Zero Trust Network Access (ZTNA) hides your applications behind a trust broker, which verifies identity, considers context (e.g. where a person is and what device they are using) and confirms compliance with designated policies. Once sufficient trust is established, access is allowed to specific applications or resources.

With our cloud-native service, you will avoid appliance management and location or bandwidth limitations and ensure any number of your people can access your applications securely, from anywhere in the world, at any time. We’ll even enable you to measure and monitor the digital experience for every user and identify performance issues, whether they’re due to the device, network path, or application.

Our Process

op desktop op mobile
Prepare & Implement add remove

Prepare and implement your technical, policy and process controls to help prevent attacks.
Security Event add remove

A security event may be identified through manual reports, automatic alerting, systems monitoring or security monitoring.
Investigate add remove

Investigate the event, recording details and performing the initial technical analysis. Declare an incident or resolve and close the issue.
Analyse add remove

Analyse the technical details of the incident to determine the attack vectors, type and scope. Assess the potential business impact and any legal or regulatory requirements. Invoke your comms plan.
Respond add remove

Respond to the incident by first containing the attack, then eradicating the threat. Recover any data or systems, and repair any reputational harm. Address any legal or regulatory requirements.
Review add remove

Review the incident, being sure to cover off the process as well as the technical response and the business outcomes. Identify areas for improvement and create a plan of action to implement any changes.

Latest

Top Shelf Tech

10 Dec 2020

December Security Brief - Top Shelf Tech w/ ZX Security

We're live on Top Shelf Tech for the December Security Brief with ZX Security. Jason Wild and Ian White (General Manager, ZX Security) will be breaking down the latest in #cybersecurity, vulnerabiliti

Top Shelf Tech

12 Nov 2020

November Security Brief - Top Shelf Tech w/ ZX Security

We're live on Top Shelf Tech for the Security Intelligence November Security Brief with ZX Security. Jason Wild and Ian White (General Manager, ZX Security) will be breaking down the latest in #cybers

News

10 Nov 2020

The Instillery launches new security business

Businesses need to go faster than ever in the rapidly changing world of technology. This makes it all the more important to have security services that match the pace of innovation while providing the

Top Shelf Tech

07 Oct 2020

October Security Brief - Top Shelf Tech w/ ZX Security

We're live on Top Shelf Tech for the October Security Brief with ZX Security. Jason Wild and Ian White (General Manager, ZX Security) will be breaking down the latest in #cybersecurity, vulnerabilitie

Blog

23 Sep 2020

Just do your patching!

If your security is exciting, then you've got a problem. Because really, information security is boring. Sure, you should be investing in advanced security like IDS and managed SOC services that give

Blog

10 Sep 2020

Protecting yourself from DDoS (and other targeted attacks)

DDoS attacks can be a somewhat confusing subject. On one hand, volumetric attacks have been around for a long time with a number of solutions. On the other hand, the devil is in the detail with how ef

Get in touch

Careers
  • P. 0800 34 34 34
  • E. support@theinstillery.com
  • Follow us

Privacy Policy. Terms & Conditions. ©2020 The Instillery. All rights reserved.