Secure Managed Gateway

Cyber Security Threats are Dynamic and Ever-Changing

Malicious security threats come in many forms including: malware, viruses, worms, trojans and bots, spyware, phishing, DDoS attacks and social media attacks. The key challenge for service providers is to remain vigilant through constant filtering, monitoring and reporting. Sliced Tech not only protects but effectively defends, by quickly identifying incidents and threats then responding with counter-measures.

The Sliced Tech Compliant Gateway Controls and Defends

Sliced Tech offers a geographically redundant, highly available gateway service to the Australian Government, certified by the Australian Signals Directorate (ASD) for use with PROTECTED data and systems under the ISM.

Multiple Security Layers

Multiple security layers within Compliant Gateways include multiple levels of ASD Certified firewalls, multiple service providers for ISP connectivity and IPS for active/automated responses to attacks at the border of the gateway and the client firewall.

Information Security Incident Detection

We have developed and implemented tools, procedures and incident response plans to address security incidents. Centralising logs from evaluated firewalls, Intrusion Prevention Systems, proxies and other devices, we correlate and monitor events across the gateways, supported by a 24×7 team, to respond to suspicious activity.

Why Certification Matters

Australian Government Security Management Benchmarking

Sliced Tech complies with the Information Security Manual (ISM) which meets the Protective Security Policy Framework (PSPF) requirements for physical, personnel and information security to manage security risk.

ISO/IEC 27001:2013 Industry Best Practice

The ISO/IEC 27001 aligns Sliced Tech with an international standard of security management best practice used across industry to maintain and continuously improve cyber resilience.


Sliced Tech owns and operates multiple Compliant gateways out of Australian data centres that meet PSPF physical security requirements, enabling us to provide a geographically redundant, fit-for-purpose data centre capability in line with government practice for disaster recovery. All systems are implemented on a minimum of N+1 in infrastructure redundancy to ensure that in the event of an attack, a single point of failure will not affect contracted SLAs.

24x7 Security Incident Management

We provide 24×7 monitoring of environments. Alerts are directed to Sliced Tech’s 24×7 service desk to action as required.

Tailored Security Services

Sliced Tech can tailor protection to specific application and security requirements within dedicated client firewalls.

Data Sovereignty

Gateway systems and all customer data is secured in Australia, within Australian data centres. 24×7 support is provided on-shore in Australia.

Secure Access

All Sliced Tech staff hold a minimum of a Baseline Security Clearance.

Proxy architecture

We provide industry leading proxy technologies to improve security and support customers to leverage proxy capability within their network.