Location
Melbourne
Links & Contact
Founders

Startup
Operating

UpGuard

The World's First Cyber Resilience Platform

UpGuard discovers the configuration state of every information asset connected to your infrastructure, with or without an agent. Understand the baseline state of your infrastructure for complete awareness of even the most complex enterprise environments. Whether on-premises or in the cloud, configuration monitoring has never been this easy or scalable.

Videos
Jobs
Talent Acquisition
People Operations, Full-time
Sydney
Posted yesterday
APAC SDR Manager
Demand Generation, Full-time
Sydney
Posted 7 days ago
Cyber Risk Analyst
Cyber Research, Full-time
Sydney
Posted 20 days ago
Sales Enablement Manager
Sales Operations, Full-time
Sydney
Posted 28 days ago
Sales Development Representative - Remote
Demand Generation, Full-time
Sydney
Posted 1 months ago
Senior Software Engineer (remote)
Product Engineering, Full-time
Canberra
Posted 1 months ago
Senior Software Engineer (remote)
Product Engineering, Full-time
Brisbane
Posted 1 months ago
Senior Software Engineer (remote)
Product Engineering, Full-time
Melbourne
Posted 1 months ago
TPRM Security Analyst
Analyst Relations, Full-time
Sydney
Posted 2 months ago
Senior Software Engineer
Product Engineering, Full-time
Hobart
Posted 2 months ago
Investors
Accelerator

500 Startups

Investor

August Capital

Investor

Insurance Australia Group (IAG)

Investor

Pelion Venture Partners

Investor

Square Peg Capital

Investor

Starfish Ventures

Accelerators
2012
Accelerator

StartMate

Other
Accelerator

Cicada Innovations

Accelerator

Citrix Startup Accelerator

Images
Taken on 2017-07
Blog Posts
20th July, 2020
What Is the Personal Data Protection Bill 2019?

The Personal Data Protection Bill 2019 (PDP Bill 2019) was introduced to the Lok Sabha by Ravi Shank...

16th June, 2020
Cybersecurity Risk Assessment Tools You Can Rely on Year-round

Traditional cybersecurity risk management remediation efforts start with cybersecurity risk assessme...

15th June, 2020
9 Ways to Prevent Third-Party Data Breaches

The increasing number of third-party data breaches and the sensitive information they expose have ne...

10th June, 2020
The Top Cybersecurity Websites and Blogs of 2020

The information security landscape is constantly evolving, which is why it's so important to stay up...

9th June, 2020
What Is Third-Party Risk Management?

Third-party risk management (TPRM) is the process of analyzing and minimizing risks associated with ...

4th June, 2020
What Is an Insider Threat? Definition, Examples, and Mitigations

An insider threat is a threat to an organization that comes from negligent or malicious insiders, su...

3rd June, 2020
Bitbucket vs GitHub [Updated for 2020]

If you boil it down to the most basic difference between GitHub and GitHub, it is that GitHub is foc...

3rd June, 2020
What Is the Cyber Kill Chain and How to Use It Effectively

You're probably familiar with the defense-in-depth or castle and moat approach to cybersecurity . It...

2nd June, 2020
What is an SMB Port + Ports 445 and 139 Explained

The Server Message Block Protocol (SMB Protocol) is a client-server communication protocol used for ...

1st June, 2020
116 Must-Know Data Breach Statistics for 2020

Data is rapidly becoming one of the most valuable assets in the modern world. The digital giants tha...