recon remain staunchly vendor agnostic so we can offer our customers the best technology for their individual needs. Our internal reconlab constantly reviews and tests to determine their application and effectiveness within the evolving landscape. 

Choosing and reviewing the right security technology should be an “always-on” priority for every enterprise. 

Because recon are at the leading edge of developing security software, we can provide up-to-date advice and relevant guidance on the best technology options for your business.

cloud service

recon 4 step method

Review the technology capabilities at the root level

We assess the technology on its core functions.

Many technologies offer multiple security capabilities, recon reviews both capabilities as well as the underlying functional layer to ensure robustness.

Ongoing technology development

At recon we work with the vendor to understand the current and future state of the solution. Understanding the commitment to the solution platform from the vendor defines the potential future state of the technology

Test the technology (before you buy it)

There are many technologies that provide amazing capabilities on their datasheets, although delivering on this capability may require significant change or ongoing development.

Ease of management

recon reviews technology with the business and operator in mind. Having a tool that is best of breed is great, but if it requires 3 people to operate it 24 x 7, is it worth it? Our technologies are built to minimise resource usage and faster business value.

Our practice methodology

We utilise practices from NIST1The National Institute of Standards and Technology is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. Its mission is to promote American innovation and industrial competitiveness., ISO2The International Organization for Standardization is an international standard-setting body composed of representatives from various national standards organizations. Founded on 23 February 1947, the organization develops and publishes worldwide technical, industrial and commercial standards., TOGAF3TOGAF is an enterprise architecture framework that helps define business goals and align them with architecture objectives around enterprise software development. … The Open Group developed TOGAF in 1995, and in 2016, 80 percent of Global 50 companies and 60 percent of Fortune 500 companies used the framework. and ACSC4The Australian Cyber Security Centre (ACSC) is the Australian Government’s lead agency responsible for national cyber security. It operates under the Australian Signals Directorate (ASD), which is an Australian government foreign intelligence collection agency responsible for signals intelligence and information security. as our base prefaces for our consultancy practice. Unlike the templated approach other providers offer, we provide practical delivery that is tailored to your organisation’s ICT practices.

Ask recon about a cyber security solution for you

Download our current vendor support listing and contact us to find out what solutions are the best for your issues.