Cyber crime is big business and you're an easy target
Reduce cyber attacks and gain benefits from Cyber Insurance
Take a stand, manage your cyber risk and protect your business without breaking the bank.
What our customers and partners say
Helps us meet our compliance requirements
"Amplify Intelligence provides a comprehensive service that helps us to meet the strict contractual requirements of our clients. We are now able to make informed decisions and prioritising actions, to improve our business’s security.”
Director, Regional Business (Property Valuer)
Lets us see our risks and simple changes to improve it
“Amplify Intelligence's service lets us see our risks, allows us to set benchmarks and measure them over time. It helps us make practical changes to our IT setup by highlighting the issues and providing practical fixes.”
CFO, not-for-profit organization
Combine Amplify Intelligence's cyber safety service with cyber insurance and stop hackers in their tracks
How our service works
With a cyber attack taking place once every 39 seconds, standard anti-virus software or a firewall won't keep your business safe. Amplify Intelligence’s Cyber Safety Service is the result of 20 years’ experience building cyber defences for banks and government agencies around the world, and can help you keep tabs on your online security, like the big corporations.
Manage cyber risk across all your connected mobile devices and laptops, as well as Internet-Of-Things (IoT) hardware devices. Give your business bank-like defences.
Security Expert Advice
Identify and fix security issues within your IT systems using practical steps from security experts that are tailored to your industry, sector, and your business.
Meet and maintain compliance with international standards such as ISO 27001 & SOC 2 using approved enterprise-grade security policies and controls.
Awareness and Training
Stay up-to-date on the latest scams and attacks with company-specific education and advice to your staff, to help them stay safe at home and work.
Tailored cyber risk management for small businesses
Amplify Intelligence’s all-in-one Cyber Safety Service helps you:
Four bank-grade capabilities supported by global security experts rolled into one Cyber Safety Service:
Get bank-grade cybersecurity
Protect customer and staff Personal Identification Information (PII), commercial Secrets, and intellectual property. Meet your compliance obligations and prevent cyber interruptions to your business.
Send us a message:
Here you can find the most frequent asked questions.
The brAIn-box forms one part of a distributed system for high-grade passive security monitoring (Intrusion Detection System), active vulnerability scanning, as well as remote analysis through threat intelligence. It looks at all the vulnerabilities in the computer systems and mobile devices in the business and all the connections they make to the internet.
Vulnerabilities are defects in software that impact the security of the software and or the host system it is running on. Some defects can be determined by interacting with the software --typically by actively sending to it and receiving from its messages (bytes). The brAIn-box contains a large knowledge base of software, vulnerabilities, and the sequence of messages required to determine the existence of the particular vulnerability on the particular host.
There is always a risk that any scanning will cause vulnerable software to fail, potentially hanging up the host so that it needs to be reset. The brAIn-box scans are set to be least aggressive so as to reduce that likelihood. However, this may mean that not every vulnerability will be found. For example, some network printers can hang on being scanned -- when the brAIn-box encounters a printer in a detailed scan (see below), it does the lightest scanning possible for that device.
The brAIn-box has a two-tier scanning system. A light-weight radar-like sweep-scan of all devices it can see on the local network -- to provide a list of target hosts for further investigation. A focused, more thorough, vulnerability scan that provides detailed information about the vulnerabilities discovered, their severity, and potential remediations (if remediation is known).
All scanning activities can be triggered by a remote interface. As well as being remotely triggerable, the sweep-scan is automatically run after a reboot of the brAIn-box. All other scans need to be triggered remotely.
Requested scans are only performed during normal office hours. This is to ensure the maximum number of devices are visible for scanning. Each scan produces a technical report.
The physical brAIn-box is a network device constructed from solid state components. Network connectivity from any computer or device is provided by connecting the current business network through a performant network switch with port mirroring capabilities. The processing of monitored traffic and vulnerability scanning is performed on a dedicated hardware module. Network availability is paramount -- both the switch and the processing module are designed for high availability. The switch will maintain network traffic in the unlikely event of the processing module failure.
We utilise over fifty of the best global threat intelligence capabilities. These consist of the latest information on all the latest 0-day vulnerabilities, ransomware, banking malware, phishing sites, command and control servers. We have can tailor our service based on your business locations and employ relevant intelligence of specific campaigns targeting organisations in those regions. This is checked against every connection that each computer in your network and whether they may already be compromised.
The Cyber Safety Service is a processor of network security data. It is not a processor of personal data; does not contain reasonably extractable personally identifiable information.
Data in transit: Data recorded by the brAIn-box (both passively collected, and actively triggered) is transferred periodically to the cloud-based environment. The transfer of each data file is encrypted using SSL. For each SSL connection, the destination SSL certificate is verified before data is transferred.
Data at Rest: Data stored in the cloud is encrypted using AES256. Access to data is strictly controlled through strong access controls. The access controls are provided by the AWS hosting environment.
Data location: The data stored is stored in one of two physical regions -- Australia or the United Kingdom. If the brAIn-box is located in Australia, then the data it generates will be transmitted and stored in the Australian data centre. If the brAIn-box is located in the United Kingdom, then the data it generates will be transmitted and stored in the United Kingdom data centre.
The passive security monitoring provided by the brAIn-box is processing the network traffic from each computer in your business constantly. The brAIn-box data is used to generate a report for each type of network traffic. We also log this securely to provide forensic data for determining your GDPR or Mandatory Breach notification obligations as well as determining impact to assist recovery in either an incident or day to day clean-up of security risks.
Data collected by the brAIn-box is periodically transferred to secure cloud storage. Amplify Intelligence’s cloud provider is Amazon Web Services.
The brAIn-box does not set out to collect and record personally identifiable or other sensitive data. However, some of the summary data it records could possibly contain such data. For example, if a user is searching the internet for their own name, this name will be recorded in the URL of the web search.
On cessation of using the Service, all recorded data from the respective brAIn-box is deleted from the data store to which it is connected. As we do not install any software on any of your computers it is simple to remove our service.