Delivering future security technologies to
enable Australian Defence and Government.

Secure Mobility AltoCrypt

Enabling and modernising the future of work for Government and Defence


Providing advanced deception technology and open source intelligence (OSINT)


Sovereign technologies – enabling future missions

Penten is an Australian owned, multi-award winning, cyber technology business.

We offer unique, sovereign capability to deliver new defence and security technologies for the future fight. Our advanced hardware and software products and services support government and defence clients with Secure Mobility, Applied AI and Tactical Communications Security solutions.

  • Our Aim

    Our aim is to deliver world-leading security technologies to realise digital advantage for the nation

  • Our Customers

    Our customers are mostly defence and government clients

  • Our Work

    Our work is dedicated to enabling the modern warfighter and policy maker with information to deliver advantage

Canberra cyber companies team together

01 November 2022 | News

Canberra-based technology companies Penten and WorldStack are excited to announce a new working partnership, providing open-source intelligence (OSINT) solutions into the market. This is an evolution for both companies, taking WorldStack’s internet and […]


Penten opens WA office with Minister Matt Keogh

14 October 2022 | News

Penten has officially opened a new office in Osborne Park, Perth, Western Australia. Joined by Minister for Veterans Affairs & Defence Personnel, Matt Keogh to cut the ribbon, Penten’s permanent […]


Penten wins Emerging Exporter at Australian Export Awards

26 November 2021 | News

Last night Austrade hosted the 59th Annual Australian Export Awards to recognise excellence in Australia’s export industry for 2021. David Koch was the Master of Ceremonies and finalists and supporters […]


Securing Sovereign Intuition

The symbiotic nature of information flowing between humans and intuitive machines will necessitate digital sovereignty to authenticate a message’s binary characteristics. View the full article at


Guardians of the new galaxies

Why not apply the same intellect and wisdom that created this wondrous cyberspace and its data galaxies to empower our appointed guardians to protect our information with the tools they […]