Location
Melbourne
Links & Contact
Founders

Startup
Operating

UpGuard

The World's First Cyber Resilience Platform

UpGuard discovers the configuration state of every information asset connected to your infrastructure, with or without an agent. Understand the baseline state of your infrastructure for complete awareness of even the most complex enterprise environments. Whether on-premises or in the cloud, configuration monitoring has never been this easy or scalable.

Images
Taken on 2017-07
Jobs
Product Activation Specialist
Solution Engineering, Full-time
Sydney
Posted about 14 days ago
Product Marketing Manager
Product Marketing, Full-time
Sydney
Posted about 28 days ago
Systems Administrator
Corporate IT, Full-time
Sydney
Posted about 29 days ago
Sales Development (SDR) Manager
Demand Generation, Full-time
Sydney
Posted about 1 months ago
Manager - Commercial Contracts
Business Operations, Full-time
Hobart
Posted about 1 months ago
Director - Security and Compliance
Corporate IT, Full-time
Hobart
Posted about 1 months ago
Account Executive
Inside Sales, Full-time
Hobart
Posted about 2 months ago
Account Executive
Inside Sales, Full-time
Sydney
Posted about 3 months ago
System Administrator
Corporate IT, Full-time
Hobart
Posted about 3 months ago
Sales Development Representative
Demand Generation, Full-time
Sydney
Posted about 1 years ago
Blog Posts
26th May, 2020
IDS vs. IPS: What is the Difference?

The main difference between intrusion detection systems (IDS) and intrusion prevention systems (IPS)...

25th May, 2020
What is SOX Compliance? Overview, Requirements, and Controls

The Sarbanes-Oxley Act of 2002 (SOX) was passed by the United States Congress to protect the public ...

21st May, 2020
What is HITECH Compliance?

The Health Information Technology for Economic and Clinical Health Act (HITECH Act) was signed into ...

20th May, 2020
What Is a Vulnerability Assessment? And How to Conduct One

Vulnerability assessment is the process of identifying, classifying, and prioritizing security vulne...

19th May, 2020
Vendor Risk Management Checklist

Vendor risk management (VRM) is a broad category that encompasses all measures that your organizatio...

17th May, 2020
What is Cyber Resilience?

Cyber resilience is your ability to prepare for, respond to, and recover from cyberattacks and data ...

14th May, 2020
What is Continuous Security Monitoring?

Continuous security monitoring (CSM) is a threat intelligence approach that automates the monitoring...

13th May, 2020
What Is an Attack Surface? + Tips to Reduce Your Attack Surface

The attack surface of your organization is the total number of attack vectors that could be used as ...

12th May, 2020
Third-Party Risk Assessment Best Practices

Assessing the cybersecurity risk posed by third-party vendors and service providers is time-consumin...

11th May, 2020
What is DNS Spoofing?

DNS spoofing, or DNS cache poisoning, is a cyber attack where false Domain Name System (DNS) informa...

Investors
Accelerator

500 Startups

Investor

August Capital

Investor

Insurance Australia Group (IAG)

Investor

Pelion Venture Partners

Investor

Square Peg Capital

Investor

Starfish Ventures

Accelerators
2012
Accelerator

StartMate

Other
Accelerator

Citrix Startup Accelerator