We Help You Stay Ahead of the Hack

World Leading Partners in IT Security


ThreatDefence is a Unified Security Management Platform with Managed Detection and Response Service

Intuitive, Affordable, Scalable - deploys in minutes.

While similar solutions require months of configuration by security experts, ThreatDefence is like a Security Operations Centre in a box.

It works as soon as you plug it into your network, INSTANTLY giving you visibility across all the vulnerabilities, threats, anomalies and attacks on your network, in REAL TIME.

With this comprehensive security tool, you can monitor your network 24x7, as well as analyse and report on the security of all of your devices.

Catch attacks and intrusions as they occur, allowing you to secure your networks against cyber-attacks and security incidents that could comprise your environment.

The ThreatDefence solution consists of three independent services: Detection, Analysis and Remediation. You can select any or all of the services that suit your business.

ThreatDefence can be deployed either as an on premise or fully managed service, both deployment can be customised to meet your requirements. Click here for more information.


15 Ways To Protect Your Business From a Cyber Attack


Layer 8 Security

75% of all cyber security breaches are the result of Human Error.

Humans are the frontline of defence for Cyber Security, can’t replace Human Intuition and Insight.

SoftGen is teaming with Layer 8 Security to offer a complete suite of Cyber Security Awareness Programs that leverage progressive training techniques to effectively improve human response against cyber-attacks.

The Layer 8 Security, Cyber Security Awareness programs are the most advanced in the world, most of our programs are undertaken online and focus on short fun experiences to ensure the short courses achieve the maximum benefits for our customers.

All Layer 8 programs are customisable and can include an Assessment and a dedicated Education program.

These programs are suitable for organizations of all sizes from 10 to thousands of employees.

Interactive cyber security awareness training methods help users absorb and appropriately recall the knowledge and tactics necessary to be aware of the tactics used by cyber criminals and then subsequently, avoid the attack.

"Tell me and I forget

Teach me and I may remember

Involve me and I learn"

- Benjamin Franklin

We know the value of a balanced, thoughtful approach that draws on proven principles. That’s why our framework, which employs a cyclical model of assessment, reinforcement, and measurement, has helped our customers change behaviours within their organisations and reduce the effects from cyber criminals, malware infections and successful phishing attacks by up to 90%

For more information click here

Click on the video to learn more

People Working in Open Office

Rapid 7

In these rapidly changing times, you shouldn’t have to worry about your security program. Rapid7 is here to help you reduce risk across your entire connected environment so your company can focus on what matters most. Whether you need to easily manage vulnerabilities, monitor for malicious behaviour, investigate and shut down attacks, or automate your operations — we have solutions and guidance for you.

Click on the video and learn more


VIPRE - Endpoint

Grow Your Business

The most comprehensive endpoint security solution for known and unknown threats with leading technology like cloud-enabled Advanced Active Protection to help prevent ransomware infections, Advanced Browser Protection, removable device control and encryption, and more. Plus, VIPRE Endpoint Security software still manages to work quicker than ever without slowing down PCs.


Start a Trial


Watch the video below and learn more

Business Conference

VIPRE - Security Awareness Training

VIPRE Security Awareness Training (SAT) is an easy to use, cloud based learning solution that builds practical, cost effective security awareness for an organisations employees.

The content featured in each VIPRE SAT course has been developed to teach users to keep security top of mind in everything they do and to empower them to be the best defence of their company’s cyber security infrastructure.

Choose from Essentials, Advanced or Enterprise packages that best fit your organisation’s needs.

VIPRE (SAT) provides an automated deployment with Integrated Phishing and Enterprise quality content for organisations of all sizes.


Click on the video below to learn more

VIPRE - Email Security

Virtually ALL organisations large and small, rely on email as the primary business application for communicating both internally and externally.

Most organisations employ a basic form of email scanning backed up by an endpoint security solution. Unfortunately, with today's complex security climate, passive scanning is not enough protection.

VIPRE offers layered email security solutions to combat today's worst malware threats, offering the latest in machine learning technology.

VIPRE's unique modular architecture of VIPRE Email Security allows businesses to choose the exact components needed to provide maximum email security in any specific environment both today and when future threats emerge.

Read more about VIPRE Email Security Cloud

Read more about VIPRE Email Security Server


More information on VIPRE Email Security Cloud Add-on 

VIPRE Endpoint Web Access Control

Protects your organisations from web-based threats. Gives you control over what your employees do online and protects your organisation from web-based threats.


Enforce web usage policies for all users regardless of location. An easy to use central management console lets you define your usage polices that can be applied to your entire organisation, specific teams or individuals, regardless of where your users are located.


VIPRE Web Security sits between your users and the internet, inspecting every byte of traffic across multiple security techniques, even within SSL.


VIPRE Send Safe

Prevent sensitive emails from being sent to the wrong person.

Have you ever mistakenly sent an email to the wrong person? VIPRE SafeSend is an Outlook add-in that prevents misaddressed email. It requires users to confirm external recipients and attachments to prevent inadvertent autocomplete email mistakes.

All settings in SafeSend are configurable using Windows Group Policy and can be specified on a per-group basis.


You can also add DLP functionality to automatically scan outgoing emails and attachments to ensure sensitive data does not leave your organisation.


Corporate branding (including your logo) and the ability to include custom text with a link to your email/security policy, your users will be reminded that your organisation cares deeply about security.


Click on the video to learn more

Modern Laptop

GFI Kerio Control 

Unified Threat Management

Kerio Control keeps networks, users and assets safe and secure with a powerful all-in-one security solution. Kerio’s NG series of
hardware appliances combine Kerio’s award winning Kerio Control software with specially matched hardware to create a complete network security solution for small to mid-sized organizations. Hardware appliances arrive with the latest version of Kerio Control software and use the same proprietary Linux-based operating system found in the software appliance. Kerio Control hardware appliances bundle all of Kerio’s available security technologies including Kerio Antivirus and Kerio Control Web Filter w/ application awareness.


Related articles: GFI  KerioControl White Paper

Click on the video to learn more


GFI Kerio Connect 

Kerio Connect is an award-winning messaging and collaboration solution, Kerio Connect, meets the needs of small and mid-sized businesses while offering a robust feature line-up. Business users enjoy support for their favourite email client and easy web-based access. Kerio Connect is highly stable-so you can focus on the business rather than unexpected downtime and recovery.

Read more ...

GFI LanGuard

GFI LanGuard is a network security scanner and patch management tool that provides network mapping and risk analysis. You install the software on a single Windows machine, which then scans the network to discover all devices (servers, workstations, laptops, mobile devices, virtual machines, routers, switches, and printers) and interrogate them regarding security issues. Once discovered, the devices can be managed with or without an agent; using an agent will give IT administrators deeper results. While no security tool is a silver bullet, GFI LanGuard is attractive because it's notably more mature than many security tools popping on the market and so has a feature depth you won't find in many other platforms.


In addition, it enables complete Patch Management of security and non-security patches to Microsoft operating systems, MAC OS X, major Linux distributions and third party applications. It can also automate patching for all major web browsers.


Click on the video to learn more



Identity based network security

Cyberoam's identity based network security has changed the rules of the security game. Now you can have centralised security across distributed networks. You can log and report network activity to provide higher levels of security, data confidentiality and regulatory compliance. 



Actiance enables the safe and productive use of Unified Communications, collaboration and Web 2.0, including blogs and social networking sites. Formerly FaceTime Communications, Actiance’s award-winning platforms are used by 9 of the top 10 US banks and more than 1600 organizations globally for the security, management and compliance of unified communications, Web 2.0 and social media channels. Actiance supports all leading social networks, unified communications providers and IM platforms, including Facebook, LinkedIn, Twitter AOL, Google, Yahoo!, Skype, Microsoft, IBM and Cisco


Click on the video to learn more



Acunetix are the pioneers in automated web application security testing using innovative technologies.


The Acunetix Web Vulnerability Scanner (WVS) crawls your website, it automatically analyzes your web applications and finds perilous SQL injection, Cross-Site scripting and other vulnerabilities that expose your online business. Concise reports identify where web apps need to be fixed, thus enabling you to protect your business from impending hacker attacks!


As many as 70% of websites have vulnerabilities that could lead to the theft of sensitive corporate data. Credit card information, customer lists, personal health information, student records and intellectual property are all high priority targets.

Hackers concentrate their efforts on web-based applications – shopping carts, forms, login pages, dynamic content and so on because they are lucrative targets. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases.


Acunetix Web Vulnerability Scanner helps you audit your website and as a result, uncover vulnerabilities hackers could use to compromise your sensitive data.

Firewalls, SSL and Locked-Down Servers Are Futile Against Web Application Hacking.


Web application attacks go straight through the firewall, past the operating system and network level security.  They get right into the heart of your application and corporate data. Tailor-made web applications are often insufficiently tested, have undiscovered vulnerabilities and hence, are easy prey for hackers.

Find out if your website is secure before hackers do


Click on the videos to leanr more



Leading the Way in Innovative Developer and Database Solutions - RAD Studio, Delphi, C++ Builder

With the explosion of innovations in software and database development tools, methods, and processes, it can be daunting to keep up with the changes. And, it's not just keeping up with the many database platforms. "Keeping up" means creating Web apps to run your business more efficiently. It means ensuring that your code is streamlined and does what it was written to do. Chances are your users demand even more functionality and ease of use than ever before. You need flexible, high-productivity development and database tools to solve today's toughest IT application challenges

Click on video to learn more.

Softgen Australia Pty Ltd Logo



(02) 9416 0416


828 Pacific Highway
Gordon NSW 2072


  • LinkedIn Social Icon
  • facebook