Contact Us

Secure Internet Gateway

The modern Secure Internet Gateway (SIG) for a secure government and enterprise.

Secure Internet Gateway

Purpose Built for Government
Our Secure Internet Gateway has been built from the ground up specifically for government leveraging our over 18 years of providing secure services to Government.
iRAP Assessed
Our environment is iRAP assessed and built following the ASD IT Security Manual (ITSM) ensuring that you too can obtain an iRAP assessment on your environment.
NV1 Personnel
Our Network Operations, Security Operations, Account Management, Service Management and wider leadership teams are resourced with NV1 cleared personnel.
Full Visibility and Control
Through the use of our advanced and modern filtration systems, all traffic is either inspected or blocked preventing the risk of malicious content being embedded within encrypted packets. Real time dashboards and reporting provides you the visibility you need.
Flexibility
Given our Secure Internet Gateway was built from the ground up, we have ensured flexibility (within the confines of what is compliant) is baked in to the solution so that you can tailor the offering to your agencies exact requirements.
Procurement Made Easy
Through our participation in a large number of federal and state based procurement panels, our SIG can be procured easily and tailored to your agencies exact needs.

Cyber security for Users and Applications, regardless of location

Our Secure Internet Gateway (SIG) solution provides protection for users, applications and data from internet-based threats, regardless of the location: whether cloud, remote, office or data centre, we've got you covered.

Trusted by over 40 Government and Enterprise customers nationally

Our Secure Internet Gateway (SIG) features:

Perimeter Protection
Through the use of our globally distributed scrubbing centres, we block DDoS attacks before they reach the Secure Internet Gateway. In addition, we block port and signature attacks with our IPS/IDS protection.
Application Layer Protection
Our Secure Internet Gateway blocks application layer attacks, SQL injections, authentication exploits, cross site scripting and brute force attacks at the source.
Public Cloud Protection
Leverage our Secure Internet Gateway to provide protection for your public cloud services in Microsoft Azure and Amazon Web Services (AWS).
Email Protection
Protect users from SPAM, phishing and other malware through the use of reputation and content filtering, malicious file (antivirus) scanning, optional sandboxing and Data Loss Prevention (DLP).
Web Protection
Provide modern Web protection to your users and IT environment which includes both agency specific policy and whole-of-government blacklists/whitelisting lists.
Secure Remote Access
Enable your users to work remotely whilst still being protected by the Secure Internet Gateway in a compliant manner.

Proactive 24×7 Australian based Security Monitoring and Response

Our Secure Internet Gateways are monitored 24×7 by our Security Operations Centre (SOC) which is resourced with NV1 cleared cybersecurity specialists, based entirely within Australia’s sovereign waters.

For the engineers like us

As an engineering led organisation, we understand that technical people love to understand all of the details upfront.
1,894 direct peers
We peer directly with over 1,894 peers through several peering exchanges including MegaIX, IX Australia, WAIX, PIPE IX, Equinix IX, LINX, NL-IX, Any2 and AMS-IX. In total, we have over 200Gbps of IX peering capacity in our network.
DDOS mitigation
Unlike most other providers that provide optional costed DDOS protection which is simply blackholing technology, we provide, as standard, active scrubbing DDOS mitigation technology which keeps your services online even during a large DDOS attack.
End-to-end quality of service
Given we are a business only network, we offer quality of service from end to end across all of our supported connections. Simply configure group policy or your CPE devices to tag outbound packets with the appropriate DSC markings and our infrastructure will honour these through to our core routers. We cannot guarantee that these markings will be honoured beyond our network.
1:1 connection to the internet
Unlike our competitors, our 1:1 connection guarantee is all the way to the internet given we have soooo much available capacity at our core.
No consumers
Given we are an all for business network, we don’t have any consumer traffic on our network meaning we are able to guarantee our contention speeds 24x7.
Deep monitoring
For managed services, In monitoring your connections, we collect ICMP Ping Responses, jitter, router processor and memory utilisation, NetFlow data and bandwidth utilisation enabling us to proactively respond to alerts across any of these components.
High visibility
We understand that having visibility into your connectivity is critical for your IT Team to be able to be proactive with internal communications. As such, we provide you with the ability to have one or more dashboards that you can use to monitor the connectivity status, packet loss and bandwidth utilisation at each site. You can even use these dashboards on large format displays like TVs.
Aussie-based NOC
In keeping with our values of an all onshore team, our Network Operations Centre personnel are all located within Australia.
Last mile access options
We offer services via Fibre, NBN, Ethernet Access, AirFibre, 4G/5G and even low-orbit satellite technologies ensuring we can connect even the hardest to reach places.
IPv6 enabled
All of our connectivity option are enabled with IPv6 from the onset enabling you to use either or both the IPv4 or IPv6 addresses we assign with your connection.
Low latency
Given our modern infrastructure and high quality inter-connectivity, we typically witness a sub 15ms latency from your CPE to our core routers (with the exception of 4G/5G and low-orbit satellite services).
Market-leading Service Level Agreement (SLA)
In keeping with our obsession for Customer Service, we bundle our connections with a market leading Service Level Agreement which encompasses guaranteed response times and target resolution times.

Protected

Don’t risk your security with just anyone. We are Australia’s most audited and certified Security Provider and we bake in Security by design into every single one of our product and service offerings.
Our core infrastructure, cloud platforms and telecommunications core are irap assessed demonstrating our commitment to security.
When we say protected, we mean PROTECTED. Our data hosting services are certified to the Protected level under the Federal Government’s Hosting Certification Framework.
As a member of the Defence Industry Security Program, we provide Security Cleared Personnel to a wide range of organisations. This means you get a higher level of security, no matter your industry.
We engage third party penetration testers to perform both internal and external penetration testing against our platforms and systems on an annual basis, and we combine this with weekly vulnerability scans which are performed by our team.
We have held the ISO 27001 certification for over seven years and after all that time, these controls are well and truly baked in to our operating standards.

Our certifications and compliance

As a critical partner to our customers, how we operate is of paramount importance to both us and them. That's why we've implemented ISO global best practices in the areas of Quality, Environmental, Data Security, Risk Management, Service Management and Occupational Health and Safety. We are audited against these frameworks and maintain stringent internal practices to ensure we continue to conform.

  • Information Security Management System (ISO 27001) certified
  • Environmental Management System (ISO 14001) certified
  • Quality Management System (ISO 9001) certified
  • Occupational Health and Safety Systems (ISO 45001) certified
  • Information Technology Service Management (ISO 20000) compliant
  • Risk Management (ISO 31000) compliant
Compass Assurance ISO 27001 Info Sec
Compass Assurance ISO 14001 Environment
Compass Assurance ISO 9001 Quality
Compass Assurance ISO 45001 Safety
Compliant with ISO 20000 IT Service Management
Compliant with ISO 31000 Risk Management

Related posts

Innovation vs risk: where does your network sit?

Innovation vs risk: The networking part of the puzzle

With IT taking more of a role in strategic growth and innovation, more companies are looking to technology to innovate and drive the way forward. While 61% of IT leaders believe our networks can enable innovation, reducing IT spending is on the hit list as a top priority for CEOs in 2024. How do you secure funding for an area of the business they want to reduce costs in?
CT Team

Let us help you

We are a passionate team and want to do anything we can to help. Let us know how we can help you by filling out this form.

Telephone
1300 888 918
Email