Tesserent | Cyber Solutions by Thales

web

Ad Details

  • Ad ID: 65711

  • Added: August 22, 2024

  • Location: Australia

  • State: Victoria

  • City: Melbourne

  • Company Name: Tesserent | Cyber Solutions by Thales

  • Keywords: managed security service provider, security as a service, cloud security, siem, sdwan, networking, managed firewall, security consulting, penetration testing, internet connectivity, cybersecurity, splunk, threat hunting, c2m2, red teaming, governance risk compliance, identity access management, security architecture, security operations centre

  • Technologies: NetSuite, Salesforce, Route 53, Outlook, ServiceNow, Microsoft Office 365, Hubspot, Pardot, Linkedin Marketing Solutions, DoubleClick Conversion, reCAPTCHA, YouTube, Google Tag Manager, Google Font API, DoubleClick, Typekit, Incapsula, Mobile Friendly, Nginx, Google Dynamic Remarketing, ASP.NET, Shutterstock, Google Analytics, Android

  • Year: 2002

  • Address: 80 Collins St, Melbourne, Victoria, Australia, 3000

  • Website URL: http://www.tesserent.com

  • LinkedIn URL:

  • Twitter URL:

  • Views: 61

Classiera WordPress theme

Description

Comprehensive Cybersecurity Solutions


Company Overview
Tesserent (ASX:TNT) is an extraordinary home-grown cybersecurity success story. Founded in Melbourne, originally focussing on Managed Security Services and funded almost entirely by local investors, we’ve since grown to become Australia’s #1 ASX-listed cybersecurity provider. Now with over 400 cybersecurity professionals and with offices across Australia and New Zealand, we partner with clients to provide a full suite of cybersecurity services.Partnering with over 1,200 mid-sized to enterprise, government and critical infrastructure clients, Tesserent delivers comprehensive, tailored solutions to prevent, detect and mitigate potential cyber-attacks. We have deep expertise in security advisory (GRC) and consulting, technical assurance and testing, cloud services, 24x7 managed services and monitoring, incident response and forensics and converged/physical security.

Comments

Leave a Comment

Your email address will not be published. Required fields are marked. *

Success! Thanks for your comment. We appreciate your response.
You might have left one of the fields blank, or be posting too quickly