Loop Technology shares insights for security success

By on
Loop Technology shares insights for security success
Patrick Butler

We speak with general manager Patrick Butler.

What IT security brands and services do you specialise in?

Our primary vendor partnership is with Intel Security because of the broad range of security controls it offers. We also have partnerships with focused vendors such as RSA and Entrust, Palo Alto Networks and Forcepoint, Proofpoint, Tenable and Metricstream.

When did your company first get involved in this area?

Loop was involved in terminal emulation security in the 1980s, introduced RSA multi-factor authentication to Australia in the early 1990s and over the past decade evolved into a focused, managed security services provider and cybersecurity consulting firm.

What are your security credentials?

Our cybersecurity consulting team has certifications ranging from global security standard ISO 27001/2 lead auditor/implementer to certified information systems security professionals and certified information security manager. We are also a qualified security assessor certified by the Payment Card Industry. Our penetration testing team,  managed security services team and CSOC engineers also have a wide range of certifications. 

Heard about any cool trends in the security space recently?

The huge improvements in virtual or augmented reality from companies like Facebook (Oculus Rift) and Microsoft (HoloLens), means the day is fast approaching when our cyber security operations centre will leverage these systems to improve security monitoring.

Can you tell us about a recent security deployment you have done?

A recent security deployment focused on deploying Loop Event Log Collectors (ELCs) at a customer’s primary and secondary data centres. This involves aggregating, encrypting and forwarding event logs to our cloud security event monitoring service so it can monitor them 24 hours, seven days a week. 

What is driving customers’ security projects?

Increasing board and executive awareness that responsibility for security does not lie just with the IT team, and that business must adopt a risk-based approach to dealing with security strategy, compliance and third-party risk.

Security is…

A state of being confident that you understand and are in control of the cyber security risks to your business assets.

 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © nextmedia Pty Ltd. All rights reserved.
Tags:

Log in

Email:
Password:
  |  Forgot your password?