Advanced Search
  • Security in the Age of Digital Disruption
  • Security Training
  • Overview
    • Security

      Build security into the fabric of your digital enterprise. Our industry-leading security solutions help you predict attacks, proactively respond to threats, ensure compliance, and protect data, applications, infrastructure and endpoints.

      arrow point down
      DXC Technology CTO Dan Hushon discusses cyber resilience in 2018 trends report.

      Journey-focused Innovation: 6 IT Trends for 2018

      About Us


      • 4,000+ global security professionals
      • Vendor-agnostic advisor
      • Prime security integrator
      • Around-the-clock management and monitoring
      • AISA Corporate Sponsor Australian Information Security Association

      Cisco logo

      We are one of the few companies in the world that can provide end-to-end security solutions — from expert advisory services to fully managed security operations.

      Take this online assessment and get a better understanding of the readiness and capabilities of your security program.

      Each year, DXC Technology’s team of global security advisors, technologists and architects analyses emerging trends to help security organisations plan and set priorities.

      Connect with our experts to see how we can help you transform your business with next-gen technology and business solutions.

  • Australian Specialised Services
    • Australian Specialised Services

      In Australia and New Zealand, the constant evolution of cyber security threats and shortage of cyber security skills has made it increasingly challenging for organisations to secure their businesses.

      DXC Technology has worked closely with clients to protect their businesses by developing strategies, processes and solutions. We provide end-to-end security solutions — from expert advisory services to fully managed security operations and even have specialised services only available in Australia.

      Contact Our Experts

      Navigate the complex operating environments in the defense industry through our export and security compliance services.

      CSO’s lead the client in security discussion making sense of the market, current threat landscape, all the time optimising security approaches to tackle the present and future.

      In-house, off-site and on-line training delivered by instructors who are able to draw upon their considerable hands-on industry experience.

      Manage and protect critical organisation data with a trusted independent organisation.

      Our teams use manual and automated methodologies to provide thorough evaluations of your assets and to provide risk prioritisation and mitigation recommendations.

      We help in identifying potential data breaches or compromise through the use of threat hunting techniques targeted at uncovering indicators of intrusion and exfiltration by a malicious actor.

      Implementing the capabilities of Defence Industry Security as a Service (DISEC) will strengthen and counter the ever-growing, evolving and persistent threat of cyber-attacks.

  • Services & Solutions
    • Services & Solutions

      We are one of the few companies in the world that can provide end-to-end security solutions — from expert advisory services to fully managed security operations. We can implement an integrated, enterprise-wide approach to protecting your enterprise, systems, endpoints, users, processes, applications and data effectively.

      We provide greater choices in implementing digital technologies, including cloud, mobility and advanced analytics.

      Our consultancy-led IT security services assess risks and define and implement business-aligned strategies to optimise your security readiness.

      Our Intelligent Security Operations Services provide tailored solutions to support the digital enterprise, enabling you to monitor and respond to the evolving threat landscape.

      Secure virtual environments for cloud and Infrastructure as a Service, giving you full visibility into traditional and next-generation platforms.

      Ensure remediation of security threats through penetration testing, vulnerability scanning, social engineering and attack simulations.

      Meet your unique security requirements through design, installation and integration of perimeter, network, endpoint and advanced threat-protection solutions.

      We help identify your cyber risks, document a go-forward plan and carry out your remediation projects.

      Access a variety of identity solutions - from provisioning and access governance to strong authentication and Public Key Infrastructure (PKI) to protect the enterprise.

      Protect critical data and help enterprises understand the use of critical content, all while meeting constantly increasing privacy requirements.

  • Insights
  • Success Stories