PLACEHOLDER
OPENING HEADLINE 
GOES HERE

Delivering solutions to scale cyber, Open-Source intelligence and Electronic Warfare capabilities to gain advantage

Penten delivers world-leading security technologies to realise digital advantage for the nation and its allies. We offer unique capability to deliver new defence and security technologies. Our advanced hardware and software products and services support government and defence clients with Secure Mobility, Applied AI and Innovation and Technology Services solutions.

Leading the Way in Applied AI Solutions

Step into the forefront of cybersecurity innovation

Penten uses Artificial Intelligence and Machine Learning (AI/ML) to provide highly credible emulations of combat radio, computer data and computer network activity, which can be applied to significantly enhance battlefield survivability, active cyber defence operations and cybersecurity training. Merging state-of-the-art technology with extensive industry expertise, Penten stands as your partner in securing a smarter and safer digital future.

CBG is a powerhouse AI simulator of computer networks, data and associated user behaviours, including local and online network activity. Populate your cyber range or honeynet with live, vibrant, interacting devices and documents. CBG's AI users interact with the IT environment, performing actions such as reading emails, editing documents and chatting to other users, delivering greater realism for cyber training and deception. The CBG content creation interface guides you through the process of planning and deployment, supporting a range of customisations for tailored, realistic content and user behaviour.

• Dramatically reduces time and cost of creating content and behaviour
• Improves ROI of existing cyber training and deception investments
• Produces realistic content and user behaviour
• Customisable content and behaviour
• Cloud or on-premises solution

CONTACT US >CONTACT US >

HoneyTrace allows you to track your sensitive data inside and outside your network perimeter, so you can understand where your data goes and if it’s at risk of a data leak. HoneyTrace works in the cloud and in places beyond your control. It’s ideal for verifying how your partners and employees are managing your data.
 
HoneyTrace combines multiple tracking techniques into one solution.

 
• Simple to use and integrates seamlessly into your existing cybersecurity systems
• No need to install or manage additional software packages
•Detect and trace data leaks throughout every department and beyond
 

TrapRadio is an AI powered electronic decoy system that provides highly realistic mimics of friendly force communications. The mission planning application boosts battlefield asset survivability by disrupting enemy intelligence sensors, causing confusion, distrust, and delays in their decision-making process. It simplifies Radio Frequency (RF) signature manipulation, enabling non-technical personnel to manage and conceal their signals, much like physical camouflage.
Intuitive, AI powered mission planning software enables Electronic Deception mission at the push of a button.

 
• Present RF signature of force element in different location
• Manipulate RF signature of force element to look like a different force element
• Intuitive and nontechnical mission planning and deployment
• AI enabled RF modeling for enduring non-repetitive RF signatures
• Simple and on the fly, mission updates to support dynamic operational environments

CONTACT US >

Delivering future security technologies to enable Australian Defence and Government.

Get in touch

Leave your details below and our team will be in touch.

Data loss detection beyond your network boundary

Elevating Cyber Training and Active Defence

Gain the advantage with intelligent radio decoys

LEARN MORE >

Where security meets mobility

The AltoCrypt Suite is at the forefront of digital transformation. It secures government and private sectors through tailored software and hardware solutions, providing secure access to classified and sensitive data across multiple form factors and use cases. The suite provides advanced secure mobility solutions, and champions mobility, convenience, and security, safeguarding sensitive data in today’s dynamic world.

Access without compromise.

AltoCrypt Stik is a portable, user-friendly secure mobility device for wireless classified network access, anytime, anywhere.AltoCrypt Stik simplifies access to classified networks by integrating crypto, routing, and security appliances into one self-contained, compact USB device. This reduces the size, weight and power requirements for the user.

Utilising either enterprise Wi-Fi or the Internet, AltoCrypt Stik integrates with existing access gateways and cryptographic infrastructure. It is accredited and meets the requirements for handling the most classified data required by mobile users.

Features:

  • Easy to use 
  • Discreet and lightweight
  • Government approved encryption  
  • No briefcases or powerpacks
  • Enables secure, remote network access
CONTACT US >

Secure by design

The AltoCrypt Phone is a secure, versatile mobile device, facilitating seamless communication and data access across sensitive networks, anytime, anywhere. In today's mobile world, accessing classified data when and where you need it can be a challenge. While commercial technology has made work more flexible, many government systems are still only accessible on fixed desk infrastructure. This leaves you dislocated from your data during meetings and on the go around the office, reducing situational awareness and collaboration.

AltoCrypt Phone offers a modern solution, providing a hardened iPhone® with advanced features for mobile users to access classified information. It’s user-friendly, supports peer to peer collaboration via voice, video, chat, and email, and grants-controlled data access across the enterprise.

Features: 

• Hardened iPhone®
• Secure Peer-to-Peer Collaboration
• Controlled Data Access
• Familiar User Experience
• Layered Assurance

CONTACT US >

Stay connected without compromise.

The AltoCrypt pBox is a portable container designed to prevent mobile phones from eavesdropping on sensitive and classified conversations. Today’s phones are designed to continually listen. We don’t always know what software is on them and what they are doing. We can’t always be sure who has access and control of the camera and microphones.

These risks prevent mobile phones from being taken into important meetings and secure facilities. The challenge is that our phones are part of our work and life. We need to be contacted, we need situational awareness, we need to manage our lives.

The AltoCrypt pBox solves this problem by delivering a portable phone enclosure that actively suppresses the phone’s ability to eavesdrop and collect video.

Features: 

  • Prevent eavesdropping
  • Secure visibility of your device
  • Portable and easy to use
  • Keeps you connected
CONTACT US >

We help plan, tailor and deploy cyber solutions to maximise their impact. Get in touch today.

CONTACT US >