This is the top of the page.
Displaying present location in the site.
  1. Home
  2. Solutions & Services
  3. Security and Public Safety
  4. Security
  5. Cyber Security
Main content starts here.

Cyber Security - Overview

A full range of services built on specialist expertise, industry leading technologies alongside key strategic partnerships.

Cyber hero

Global cyber security threats have evolved dramatically over the last decade, driven by the increased adoption of cloud computing and take up of mobile devices. This has created a dynamic landscape where organisations require a range of mitigation strategies to effectively protect digital assets and meet increasing compliance obligations.

Cyber attacks against enterprise and Government IT systems often cost millions of dollars to recover from and these costs are rising with the massive adoption among enterprise of smart technologies and connected devices that make up the Internet of Things (IoT).

Responding to these challenges, NEC Australia has established a Global Security Intelligence Centre (GSIC). Complementing NEC’s investment in Austria, Brazil, Japan, Singapore and the United States of America, the state-of-the-art facility develops, delivers and extends NEC Australia’s cyber security capabilities - providing a rich and ever expanding suite of cyber security services.

Our cyber security framework focussed on People, Process, Technology and Organisation to ensure that our customers effectively manage their exposure to cyber attack. We offer a broad range of security solutions and services, from consulting and integration through to managed security services and ‘as a service’ security services.

Cyber Framework

While the IT systems of critical infrastructure providers face the same level of risk from cyber attacks as do other enterprises in the private and public sectors, a cyber attack on critical infrastructure can have much broader and deeper consequences for society and the economy. This puts added pressure on IT decision makers and influences how they design, implement and maintain their cyber-defences.

Accepting the fact that the threats are both constant and, in terms of the means and methods, constantly evolving, the key to successful mitigation is the development of a proactive strategy of monitoring and detection. This includes close collaboration with all stakeholders in critical infrastructure operations and the involvement of senior leadership in driving strategy. A report by The Economist analyses the results of a global survey of 200 executives with responsibility for supporting and managing critical infrastructure IT systems. Read the report here.


Top of this page