Location
Melbourne
Links & Contact
Founders

Startup
Operating

UpGuard

The World's First Cyber Resilience Platform

UpGuard discovers the configuration state of every information asset connected to your infrastructure, with or without an agent. Understand the baseline state of your infrastructure for complete awareness of even the most complex enterprise environments. Whether on-premises or in the cloud, configuration monitoring has never been this easy or scalable.

Videos
Jobs
Account Executive (copy)
Inside Sales, Full-time
Brisbane
Posted 2 days ago
Account Executive
Inside Sales, Full-time
Hobart
Posted 10 days ago
Account Executive
Inside Sales, Full-time
Melbourne
Posted 10 days ago
Office Manager
People Operations, Full-time
Sydney
Posted 12 days ago
Account Executive
Inside Sales, Full-time
Sydney
Posted 15 days ago
Industry Analyst (Cybersecurity)
Content Marketing, Full-time
Sydney
Posted 23 days ago
Senior Software Engineer
Product Engineering, Full-time
Hobart
Posted 23 days ago
Senior Software Engineer
Product Engineering, Full-time
Sydney
Posted 3 months ago
Investors
Accelerator

500 Startups

Investor

August Capital

Investor

Insurance Australia Group (IAG)

Investor

Pelion Venture Partners

Investor

Square Peg Capital

Investor

Starfish Ventures

Accelerators
Other
Accelerator

Cicada Innovations

Accelerator

Citrix Startup Accelerator

2012
Accelerator

Startmate

Images
Taken on 2017-07
Blog Posts
20th July, 2020
What Is the Personal Data Protection Bill 2019?

The Personal Data Protection Bill 2019 (PDP Bill 2019) was introduced to the Lok Sabha by Ravi Shank...

16th June, 2020
Cybersecurity Risk Assessment Tools You Can Rely on Year-round

Traditional cybersecurity risk management remediation efforts start with cybersecurity risk assessme...

15th June, 2020
9 Ways to Prevent Third-Party Data Breaches

The increasing number of third-party data breaches and the sensitive information they expose have ne...

10th June, 2020
The Top Cybersecurity Websites and Blogs of 2020

The information security landscape is constantly evolving, which is why it's so important to stay up...

9th June, 2020
What Is Third-Party Risk Management?

Third-party risk management (TPRM) is the process of analyzing and minimizing risks associated with ...

4th June, 2020
What Is an Insider Threat? Definition, Examples, and Mitigations

An insider threat is a threat to an organization that comes from negligent or malicious insiders, su...

3rd June, 2020
Bitbucket vs GitHub [Updated for 2020]

If you boil it down to the most basic difference between GitHub and GitHub, it is that GitHub is foc...

3rd June, 2020
What Is the Cyber Kill Chain and How to Use It Effectively

You're probably familiar with the defense-in-depth or castle and moat approach to cybersecurity . It...

2nd June, 2020
What is an SMB Port + Ports 445 and 139 Explained

The Server Message Block Protocol (SMB Protocol) is a client-server communication protocol used for ...

1st June, 2020
116 Must-Know Data Breach Statistics for 2020

Data is rapidly becoming one of the most valuable assets in the modern world. The digital giants tha...