UpGuard

The World's First Cyber Resilience Platform
UpGuard
Operating

UpGuard discovers the configuration state of every information asset connected to your infrastructure, with or without an agent. Understand the baseline state of your infrastructure for complete awareness of even the most complex enterprise environments. Whether on-premises or in the cloud, configuration monitoring has never been this easy or scalable.

Videos
Jobs
PR Manager
Brand Marketing, Full-time
Melbourne
Posted yesterday
Third Party Security Risk Analyst
TPRM, Full-time
Sydney
Posted 2 days ago
Sales Development Representative (SDR)
Field Sales, Full-time
Sydney
Posted 8 days ago
Data Engineer
Analytics, Full-time
Sydney
Posted a month ago
Senior Software Engineer
Product Engineering, Full-time
Sydney
Posted 7 months ago
Investors
Accelerator

500 Startups

Investor

August Capital

Investor

Insurance Australia Group (IAG)

Investor

Pelion Venture Partners

Investor

Square Peg Capital

Investor

Starfish Ventures

Accelerators
Other
Accelerator

Cicada Innovations

Accelerator

Citrix Startup Accelerator

2012
Accelerator

Startmate

Images
Taken on 2017-07
Blog Posts
20th July, 2020
What Is the Personal Data Protection Bill 2019?

The Personal Data Protection Bill 2019 (PDP Bill 2019) was introduced to the Lok Sabha by Ravi Shank...

16th June, 2020
Cybersecurity Risk Assessment Tools You Can Rely on Year-round

Traditional cybersecurity risk management remediation efforts start with cybersecurity risk assessme...

15th June, 2020
9 Ways to Prevent Third-Party Data Breaches

The increasing number of third-party data breaches and the sensitive information they expose have ne...

10th June, 2020
The Top Cybersecurity Websites and Blogs of 2020

The information security landscape is constantly evolving, which is why it's so important to stay up...

9th June, 2020
What Is Third-Party Risk Management?

Third-party risk management (TPRM) is the process of analyzing and minimizing risks associated with ...

4th June, 2020
What Is an Insider Threat? Definition, Examples, and Mitigations

An insider threat is a threat to an organization that comes from negligent or malicious insiders, su...

3rd June, 2020
Bitbucket vs GitHub [Updated for 2020]

If you boil it down to the most basic difference between GitHub and GitHub, it is that GitHub is foc...

3rd June, 2020
What Is the Cyber Kill Chain and How to Use It Effectively

You're probably familiar with the defense-in-depth or castle and moat approach to cybersecurity . It...

2nd June, 2020
What is an SMB Port + Ports 445 and 139 Explained

The Server Message Block Protocol (SMB Protocol) is a client-server communication protocol used for ...

1st June, 2020
116 Must-Know Data Breach Statistics for 2020

Data is rapidly becoming one of the most valuable assets in the modern world. The digital giants tha...

 Location
Melbourne
 Links
 People
 Tags
#b2b
#dev ops
#enterprise
#risk management
#software
#testing
 Feedback