Story image

ThreatQuotient and The Missing Link partner to strengthen threat operations in Australia

02 Jul 2018

Threat intelligence platform company ThreatQuotient today announced a strategic partnership and reseller agreement with The Missing Link, a provider of information technology solutions across infrastructure, security, backup and disaster recovery, mobility, internet and communications, and cloud services.

Driving threat operations throughout Australia, this alliance will aim to empower organisations with a platform purpose-built to accelerate security operations with the understanding to prioritise and act upon the most relevant threats they are facing.

Fostering collaboration between teams and their tools within a company as well as individual organisations is a key piece in securing society’s most critical information.

The Missing Link aims to streamline and transform IT technologies to help businesses achieve more with their current security operations infrastructure.

“ThreatQuotient’s position in the security operations and management market is reinforced by a rapidly increasing ecosystem of partnerships,” says ThreatQuotient APAC regional director Anthony Stitt.

ThreatQuotient works on the assumption that the foundation of intelligence-driven security is people, and has designed threat intelligence platform, ThreatQ, to accelerate security operations.

Leveraging an integrated self-tuning Threat Library, Adaptive Workbench and Open Exchange, ThreatQ has become the cornerstone of security operations and threat management systems across the globe.

In April, ThreatQuotient announced the release of a cybersecurity situation room solution, ThreatQ Investigations, to boost security teams with the context, customisation and prioritisation needed to make decisions, accelerate detection and response, and advance team collaboration.

The Missing Link CISO Aaron Bailey says, “The Missing Link is excited to be partnering with ThreatQuotient to ensure that we can provide managed security services to our clients from our new SOC facility. 

“This also provides us with the skills required to consult and advise our clients who have their own SOC facilities in how to improve and better integrate their teams with their chosen technology stacks. 

“Through ongoing discussions with the new national Joint Cyber Security Centres being created by the Australian Government, we hope to work closely with them to do our part to help increase the country’s cybersecurity resilience.”

Opinion: BYOD can be secure with the right measures
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Sonatype and HackerOne partner on open source vulnerability reporting
Without a standard for responsible disclosure, even those who want to disclose vulnerabilities responsibly can get frustrated with the process.
OutSystems and Boncode team up for better code analysis
The Boncode and OutSystems alliance aims to help organisations to build fast and feel comfortable that the work they're delivering is at peak quality levels.
Nozomi and RIoT to deliver advanced ICS security solutions to Australia
''As a specialised integrator of robust and resilient ICT and IoT solutions within Australia, we are delighted to be partnering with Nozomi Networks."
Nuance biometrics fight back against fraud
Nuance Communications has crunched the numbers and discovered that it has prevented more than US$1 billion worth of fraud from being passed on to users of its Nuance Security Suite.
SIS announces a partnership with Platform 4
“We are looking forward to a strong future in the New Zealand security industry with this global giant as our strategic partner."
Attacks targeting Cisco Webex extension explode in popularity - WatchGuard
WatchGuard's Internet Security Report for Q4 2018 also finds growing use of a new sextortion phishing malware customised to individual victims.
Developing APAC countries most vulnerable to malware - Microsoft
“As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to limit their impact has become an imperative.”