Delivering future security technologies to
enable Australian Defence and Government.

Secure Mobility AltoCrypt

Enabling and modernising the future of work for Government and Defence


Providing advanced deception technology and open source intelligence (OSINT)


Sovereign technologies – enabling future missions

Penten is an Australian owned, multi-award winning, cyber technology business.

We offer unique, sovereign capability to deliver new defence and security technologies for the future fight. Our advanced hardware and software products and services support government and defence clients with Secure Mobility, Applied AI and Tactical Communications Security solutions.

  • Our Aim

    Our aim is to deliver world-leading security technologies to realise digital advantage for the nation

  • Our Customers

    Our customers are mostly defence and government clients

  • Our Work

    Our work is dedicated to enabling the modern warfighter and policy maker with information to deliver advantage

Penten wins Emerging Exporter at Australian Export Awards

26 November 2021 | News

Last night Austrade hosted the 59th Annual Australian Export Awards to recognise excellence in Australia’s export industry for 2021. David Koch was the Master of Ceremonies and finalists and supporters […]


Securing Sovereign Intuition

The symbiotic nature of information flowing between humans and intuitive machines will necessitate digital sovereignty to authenticate a message’s binary characteristics. View the full article at


Guardians of the new galaxies

Why not apply the same intellect and wisdom that created this wondrous cyberspace and its data galaxies to empower our appointed guardians to protect our information with the tools they […]


Trusting information: it's a jungle out there

Trust in information and trust in people are shaped by the co-existence of competition and cooperation. View the full article at


Why Information Security Matters

Questions often arise about the confidentiality, integrity and availability of information when it’s communicated from one party to another, especially in the presence of a potentially untrusted third-party. View the […]