Sovereign by design
Platform hosted on AWS Australia with Australian-based analysts and IRAP-assessed tooling. All data, personnel and playbooks remain onshore, subject only to Australian law.
Sovereign Australian XDR powered by nine global SOCs, AWS Australia hosting and 24x7 human-verified response.
Vectra Managed XDR combines the Ensign InfoSecurity global SOC footprint - nine 24x7 operations centres - with a sovereign Australian data plane hosted on AWS Australia. All telemetry, playbooks and personnel remain onshore and subject only to Australian law. AI-driven triage and SOAR-automated playbooks cut dwell time; human analysts make the call on every escalation. The platform is vendor-agnostic: we operate on your existing EDR, SIEM and cloud stack, or stand one up and run it for you as a single-vendor service.
Deep dive into the capabilitiesThe same named team stays with you from kick-off through delivery. Engagements are shaped to your risk profile, not our template library.
Platform hosted on AWS Australia with Australian-based analysts and IRAP-assessed tooling. All data, personnel and playbooks remain onshore, subject only to Australian law.
Pre-integrated best-of-breed detection from Qualys, Tenable, Check Point, CrowdStrike and the wider tier-one vendor mesh - not a single-vendor lock-in.
Part of Ensign InfoSecurity, APAC's largest pure-play cybersecurity firm. Threat intelligence from nine global SOCs applied to your Australian estate.
Per-asset monthly rate covering people, platform, playbooks and escalation. No per-alert metering, no surprise licence bills, no surge fees.
Every engagement follows the same six-step CREST-aligned methodology. You get visibility into every phase and an audit trail of every action taken by the test team.
Platform-agnostic telemetry pipeline normalises EDR, identity, cloud, network and SaaS logs into a single sovereign data plane.
24x7 behavioural analytics cross-reference your baseline with Ensign global threat intelligence from nine SOCs.
Pre-approved SOAR playbooks contain in minutes. Every escalation is named, tracked and auditable end-to-end.
Monthly detection review, quarterly threat-model refresh, annual red-team assumption test. The baseline never stays still.
No tiered upsells, no "platinum" package. What you see is what you get - one contract, one team, one number to call.
24x7 visibility across endpoint, identity, cloud and network telemetry, correlated in one platform by one team.
Managed Sentinel, Splunk, Chronicle, Elastic or DEVO. We own the platform, content, tuning and workflow; you own the value.
Data ingestion normalisation, noise reduction and detection rules tuned against your baseline - not a generic ruleset.
Automated triage and response playbooks reduce mean time to resolve from hours to minutes.
Analyst-validated alerts with full context, chain-of-evidence and suggested containment action ready for approval.
Audit trails, evidence packs and executive summaries aligned to APRA CPS 234, SOCI Act, IRAP and Essential Eight.
Every engagement runs through a unified portal. Scope, schedule, consume findings and measure the program across years of history - without a single PDF attachment hitting your inbox.
Every escalation reaches a named analyst. No auto-closed tickets, no "possible threat" verdicts, no dashboard-only products.
DEVO SIEM correlates behavioural baselines with global threat intelligence to surface anomalies signature-based tools miss.
Pre-approved playbooks isolate hosts, revoke sessions and quarantine identities within minutes of confirmation.
Flat escalation model - your team speaks directly to the analyst working the incident, not tier-one triage staff.
Mean time to detect under 60 seconds for the threats customers actually face. Mean time to contain under four minutes.
Monthly business-context reports for execs, weekly detection-tuning reports for engineers. Ready for APRA, SOCI, IRAP.
Measurable, reportable, auditable - every outcome tracks to a control in your compliance framework.
Mean time to detect under 60 seconds for the threats your environment actually faces
Analyst-validated escalations with full context, chain-of-evidence and recommended containment action
Containment playbooks executable from the portal with full audit trail for APRA CPS 234, SOCI Act and Essential Eight reporting
Direct-line escalation to the senior IR team - no call-tree, no tier-one screening
Sovereign data plane on AWS Australia - telemetry never leaves the jurisdiction
Can't find the answer here? The team responds to scoping queries within one business day - usually faster.
Ask the team directlyBoth. We're platform-agnostic and will operate on top of CrowdStrike, Microsoft Sentinel, SentinelOne, Splunk, Chronicle, Elastic or DEVO. If you don't have a stack we'll recommend one that fits your environment and budget.
Adelaide, Sydney, Melbourne, Perth and Brisbane - part of a nine-SOC global Ensign footprint. All Australian citizens, all background-checked, clearable to AGSVA Baseline or higher on request.
Yes. The SIEM data plane sits inside AWS Australia (ap-southeast-2 / ap-southeast-4). Telemetry, playbooks and personnel remain onshore, subject only to Australian law.
Four to six weeks for a full production cutover with incremental detection coverage. We can stand up an emergency monitoring capability in 72 hours for active incidents.
Per-asset monthly pricing for a predictable run-rate, with a one-time onboarding engagement. No per-alert or per-incident metering - it encourages the wrong incentives.
Plenty of customers run hybrid. We handle 24x7 coverage and off-hours response while your team owns business-hours investigations and detection engineering. Named IR escalation still reaches the shared queue.
Containment starts within minutes via SOAR, with a named senior analyst leading the investigation. Full forensic capture, eradication and written post-incident review included - not a status-only update.
Talk to an engineer - not a call centre. Most Vectra conversations start with a 30-minute technical briefing and end with a written plan.