UpGuard

The World's First Cyber Resilience Platform
UpGuard
Operating

UpGuard discovers the configuration state of every information asset connected to your infrastructure, with or without an agent. Understand the baseline state of your infrastructure for complete awareness of even the most complex enterprise environments. Whether on-premises or in the cloud, configuration monitoring has never been this easy or scalable.

Videos
Jobs
Project Manager (Creative Operations)
Marketing Creative - Design, Full-time
Melbourne
Posted yesterday
Design Lead
Marketing Creative - Design, Full-time
Melbourne
Posted yesterday
Threat intelligence Analyst
Cyber Research, Full-time
Sydney
Posted 9 days ago
Product Operations Manager
Product Operations, Full-time
Sydney
Posted 10 days ago
Content Marketer
Content Marketing, Full-time
Melbourne
Posted 16 days ago
Revenue Systems Manager
Revenue Operations, Contract
Melbourne
Posted 29 days ago
Executive Assistant to the CRO
Business Operations, Full-time
Sydney
Posted 29 days ago
Senior Software Engineer
Product Engineering, Full-time
Sydney
Posted 1 years ago
Investors
Accelerator

500 Startups

Investor

August Capital

Investor

Insurance Australia Group (IAG)

Investor

Pelion Venture Partners

Investor

Square Peg Capital

Investor

Starfish Ventures

Accelerators
Other
Accelerator

Cicada Innovations

Accelerator

Citrix Startup Accelerator

2012
Accelerator

Startmate

Images
Taken on 2017-07
Blog Posts
20th July, 2020
What Is the Personal Data Protection Bill 2019?

The Personal Data Protection Bill 2019 (PDP Bill 2019) was introduced to the Lok Sabha by Ravi Shank...

16th June, 2020
Cybersecurity Risk Assessment Tools You Can Rely on Year-round

Traditional cybersecurity risk management remediation efforts start with cybersecurity risk assessme...

15th June, 2020
9 Ways to Prevent Third-Party Data Breaches

The increasing number of third-party data breaches and the sensitive information they expose have ne...

10th June, 2020
The Top Cybersecurity Websites and Blogs of 2020

The information security landscape is constantly evolving, which is why it's so important to stay up...

9th June, 2020
What Is Third-Party Risk Management?

Third-party risk management (TPRM) is the process of analyzing and minimizing risks associated with ...

4th June, 2020
What Is an Insider Threat? Definition, Examples, and Mitigations

An insider threat is a threat to an organization that comes from negligent or malicious insiders, su...

3rd June, 2020
Bitbucket vs GitHub [Updated for 2020]

If you boil it down to the most basic difference between GitHub and GitHub, it is that GitHub is foc...

3rd June, 2020
What Is the Cyber Kill Chain and How to Use It Effectively

You're probably familiar with the defense-in-depth or castle and moat approach to cybersecurity . It...

2nd June, 2020
What is an SMB Port + Ports 445 and 139 Explained

The Server Message Block Protocol (SMB Protocol) is a client-server communication protocol used for ...

1st June, 2020
116 Must-Know Data Breach Statistics for 2020

Data is rapidly becoming one of the most valuable assets in the modern world. The digital giants tha...

 Location
Melbourne
 Links
 People
 Tags
#b2b
#dev ops
#enterprise
#risk management
#software
#testing
 Feedback