CIOAdvisor Apac

  • Home
  • Vendors
  • News
  • Conference
  • Whitepapers
  • Newsletter
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Ad Management
      • Application Security Testing
      • Artificial Intelligence
      • BPO
      • Contact Center
      • Data Analytics
      • Deep Learning
      • Digital Marketing
      • Digital Transformation
      • Disaster Recovery Services
      • Disinfection and Sanitization
      • E-Invoicing
      • Ecommerce
      • Govt Tech
      • HubSpot
      • Human Resource
      • ICT
      • IoT
      • Laser and Photonics
      • Leadership Development
      • Logistics
      • Machine Learning
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • SDN
      • Telecom
  • Digital Transformation
  • Logistics
  • IoT
  • Payment And Card
  • Artificial Intelligence
Specials
  • Specials

  • Ad Management
  • Application Security Testing
  • Artificial Intelligence
  • BPO
  • Contact Center
  • Data Analytics
  • Deep Learning
  • Digital Marketing
  • Digital Transformation
  • Disaster Recovery Services
  • Disinfection and Sanitization
  • E-Invoicing
  • Ecommerce
  • Govt Tech
  • HubSpot
  • Human Resource
  • ICT
  • IoT
  • Laser and Photonics
  • Leadership Development
  • Logistics
  • Machine Learning
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • SDN
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading

THANK YOU FOR SUBSCRIBING

  • Home
  • Cyber Security
  • Vendor
  • ES2
Featured Vendors (1 - 4 )
left
MVI Technologies: Innovative, Future-proof Financial and Payment Switching

Say Juan Foo, CEO, MVI Technologies

DATAMARK: Process Driven Solutions in Action

Bill Randag, President, DATAMARK

IMACREA: Shaping the Future of Teleworking

Shingo Suzuki, CEO, IMACREA

PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment

Erwin Ernesto J. Manansala, President & Founder and Apple Esplana-Manansala, Vice President for Business Development, PuzzleBox BPO, Inc

Digital Education Technology: Transforming Learning through Adaptive Content

Alexander Yuryev, CEO, Digital Education Technology

SAP Litmos: Where Learning Innovation is The Name of The Game

Bill McDermott, CEO, SAP Litmos

Dell Technologies: Transforming the Present for the Future

Michael Dell, Chairman & CEO, Dell Technologies

NetApp: Powering Data-Driven Organizations to Succeed

George Kurian, CEO, NetApp

right
Previous
Next
https://www.es2.com.au/

ES2: The Proactive Security Dynamos

CIO VendorFrederic Drouin, MD
It was just another day in the ES2’s offices. On the wall, a giant graffiti mural including the iconic Hacktivist ‘Guy Fawkes’ from V for Vendetta figure gazing down over the ES2 Security Testing Team. Frederic Drouin, MD of ES2, congratulates two of the team members for passing their Offensive Security Certified Professional (OSCP) exams. “This is a considerable personal achievement for each of them and increases the already impressive list of qualifications for the Security team as a whole,” says Frederic.

Being Australian Cyber Security experts, ES2 doesn’t only help organizations in securing their information but also emphasizes the support needed to help their employees succeed, grow, and be comfortable. “We have created the coolest office in Australia. Our aim is to give the best work environment to our employees such that it resonates in the services and solutions that we deliver to our clients,” adds Frederic. Through their services and solutions, ES2 help organizations in managing, reporting, and securing their essential data. The ES2 approach to client, security and solution challenges is ‘top-down’ where it focuses on strategy, governance, and architecture which then drives the technical outcomes.

Organizations invest profoundly on solutions, process, governance, and policies, but are not oblivious to the possibility of losing their data. “If they miss one inner link somewhere that is all an attacker needs to exploit a vulnerable system,” adds Frederic. Through their proactive and flexible delivery approach, ES2 endeavors to be that missing link in an organization’s security process. ES2 guides organizations through classifying their information, which will help their clients to understand which of their information needs the most protection.
ES2 also offers many Outsource Security Services inclusive of real-time monitoring, correlation, and expert analysis of security-related activity across client networks thereby improving the effectiveness of security investment by actively analyzing the logs and alerts from client systems security information. ES2’s experienced and qualified Security Analysts provide the context needed to eliminate false positives and respond to the true threats targeting client critical IT systems. ES2 also provides cloud assessment services to help organizations to identify and measure the risk associated with their data and educate them on how to protect that data in the cloud. According to Drouin, ES2 looks at the architecture from a network security point of view to help clients transform themselves into more segregated yet agile style of architecture. “We provide business-aligned and vendor-agnostic security architecture and solution design,” he says.

Managed Security Services are yet another service offered by ES2 to support customers’ Security and Solutions streams. ES2 caters primarily to two types of clientele, organizations asking for ES2 to implement a technology and those organizations that want to rationalize their departments. For the first type of client, ES2 implements technology as part of a project, and once implemented, the technology is transitioned over to the organization for them to manage and monitor internally. The other type of clients is looking for a different type of support; ES2 is able to take over the day-to-day management and administration of their security systems on their behalf. The BAU process is removed from the customer, but the solution stays with them. For instance, ES2 assisted WA Super in performing a holistic review of their Technical and Functional Security Controls as well as their Security Governance model. ES2 provided WA Super with a roadmap to ensure compliance with relevant legislation whilst mitigating risks to WA Super employees, members, and partners.

In addition, Security Awareness Training combined with Social Engineering is a unique service offered by ES2 to create heightened Security Awareness and resilience among all levels of their client organizations. Frederic also recommended that a Social Engineering engagement should take place before an organization begins a Security awareness training campaign. As the Social Engineering engagement would reveal existing vulnerabilities and identify key areas where an organization needs to upskill, train staff to change their behavior, and become aware of security weak points. ES2 are the first Security company in Australia to launch a 24x7 Incident Response Hotline.

ES2 have established a firm position in Australia and has plans to expand into the Asian market.

Previous
Next

Read Also

Digital Education Technology: Transforming Learning through Adaptive Content

Alexander Yuryev, CEO, Digital Education Technology

SAP Litmos: Where Learning Innovation is The Name of The Game

Bill McDermott, CEO, SAP Litmos

Dell Technologies: Transforming the Present for the Future

Michael Dell, Chairman & CEO, Dell Technologies

NetApp: Powering Data-Driven Organizations to Succeed

George Kurian, CEO, NetApp

ON THE DECK

Cyber Security 2018

Top Vendors

Cyber Security 2017

Top Vendors

Previous Next

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2025 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://cyber-security.cioadvisorapac.com/vendor/es2-the-proactive-security-dynamos-cid-267-mid-28.html