Business Solutions


We work with leaders in the fields of data protection, authentication and perimeter security to protect your organisation and manage any threats with the most effective security systems.


We lead in the field of network analysis and supervision, and wireless products to find innovative solutions to improve your technology infrastructure.

Professional Services

Our Professional Services Team, Kaon SecurITy, has extensive industry experience and provides a range of IT security services within New Zealand and Australia.

Security Business Solutions Infrastructure Business Solutions Professional Services

Problem Solved

Business Problem Solved By:

Wordsmiths Wanted

Writing effective IT policies can be a challenge (sometimes referred to as standards) - if this is not something one does on a frequent or permanent basis. Once written policies then need to be maintained to stay relevant or current.

What are some of the more common pitfalls associated with writing and maintaining IT policies?


Gemalto’s Three Step Approach

Every company has a Plan A for how to stop cyber criminals from getting into the network and stealing data. Build a wall around the data with next generation super-duper firewalls, throw in some AV and IDS, and sprinkle it all with some SIEM. It is a plan that has not changed much in the past 10 years.


The Borderless Enterprise

While the term “Borderless Enterprise” has a wide-range of definitions based on who is asked, the core component is tied to the seismic shift of how new applications or services are supplied today compared to legacy approaches.