Live Events
Risk and Resilience: Strategies for innovation focused businesses
You’re invited to join us at the Crayon Connect - Risk and Resilience in Sydney, taking place in 13th February 2025.
Partners, get your Bond on! Our Cyber Operatives Field Guide breaks down five cybersecurity missions to foil would-be cybercriminals.
Much like the high-stakes world of international superspies, modern businesses must navigate a landscape rife with digital threats that can spell disaster.
To truly master the cyber domain requires more than just cutting-edge technology. You’ll need strategies that ensure you can bounce back in the face of persistent attack types. Resilience is your best response.
Our latest eBook ‘The Cyber Operatives Field Guide’ offers detailed hypothetical attack briefings drawn from real world events to help you identify and counter common scenarios across data, identity, endpoints, and cloud platforms.
You’ll meet a host of devious archetypes and learn how partners and their customers can unite to combat them at every turn. Each mission breaks down the techniques, tools and practices of attackers, along with response parameters for partners and customers and the must-haves to include in every technical go-bag.
PLUS: a raft of quotes and references to the best of the best in the crime fighting world. See how many you can spot!
Here’s a sneak peek at what each mission entails:
Cyber adversaries often rely on social reconnaissance and pretexting to manipulate employees into unwittingly divulging sensitive information. Find out how cool-as-ice Izzy Salander weeds out an invasive element that’s using open-source intelligence to craft convincing personas and run spear-phishing attempts.
A hacker for hire that never sleeps, exists on Red Bull, chocolate-coated coffee beans and the thrill of illicit financial gain has cracked open an LDAP server. Unauthorised access to a treasure trove of organisational data is within his grasp. Will Miracle Max uncover the exploit and foil this threat actor?
From public charging stations to attempting to exploit MSP environments to tunnel through to customers, endpoints are prime targets for malware and ransomware attacks. In this mission, our agents are up against the coordinated efforts of a state-sponsored hacking group and must stop them from exfiltrating and ransoming high-value intellectual property via a software supply chain attack.
A devious threat actor has launched a Magecart attack to target e-commerce platforms and web browsers, targeting $32 million in payment transactions. Effective Level 3 resilience parameters will be needed to deny this crook a huge payload.
A poor cybersecurity culture leaves a back door open to malicious outsiders who will take advantage of any opportunity to find your weakest link. Human behaviour has the potential to render even the most comprehensive cyber resilience strategy worthless. Find out how to help your customers make every employee an allied agent in the cybersecurity mission.
These missions, should you choose to accept them, can help you learn to take on cybersecurity threats with the finesse of the best technical wizards in Q branch.
Good luck and remember… building true operational and cyber-resilience is your best response.
Live Events
You’re invited to join us at the Crayon Connect - Risk and Resilience in Sydney, taking place in 13th February 2025.
Webinars Series
Our latest webinar provides a technical deep dive into the advanced security features of Microsoft 365 E5.
Insights
Microsoft has announced price increases for the SPLA licensing program. Find out which products are affected and how Crayon can help you adapt before new prices take effect in January, 2025.
Vendor Announcements
Microsoft has announced price increases for the SPLA licensing program. Find out which products are affected and how Crayon can help you adapt before new prices take effect in January, 2025.
Training
Walk through the features of VMware Cloud Foundation and why it is a key tool for Crayon’s cloud partners.
Webinars Series
Tune into our latest CSP Updates session for important changes to pricing, promotion and discount offers and a focus on Secure Productivity with MDR ContraForce.
Training
Find out how our in-house Azure expertise helps you to leverage the full potential of the Azure Migrate and Modernise program.
Training
Which Wasabi consumption model is the right fit for various scenarios? We explore the options.
Case Studies
Cytrack Intelligence Systems founder, Nick Milan talks through why the Crayon ISV Innovation Hub program is the right fit for his business objectives.
Guides and eBooks
Dive into the detail of planned cloud adoptions for SMBs across the APAC region and where they need help from their tech service partners.
Podcast
Dr. Joe and his guests discuss how high-performance culture helps partners to position on value, earn trust and build stronger customer relationships.
Sales and Marketing
Pricing models, service definitions and competitive accelerators. Our latest webinar breaks down how to build a successful MSSP business.
Blogs
From scrappy start-up to part of a global cloud powerhouse, disruption is in our DNA.
Blogs
An explosion in ransomware attacks has fueled a nationwide review of the issue, as concern rises that secret payoffs add increased fuel to the cybercrime fire.
Press Release
Podcast
Cybersecurity experts from Crayon, SMX and Red Sift cover the realities of the complex threat landscape and how partners can respond.
Company Announcements
Press Release
Empowering Partners, MSPs and ISVs with best-in-class protective DNS security solutions
Top 5 most common problems low-code solves for SMBs, what the low-code revenue growth potential for MSPs is, and why now is the time for MSPs to enter the low-code market.
Our latest Cloud Horizons eBook looks at a robust review of cloud tech's past, present, and future, value generation insights, and pathways to cloud profit for MSP’s.
Our APAC channel business is now part of a global organisation. That means there is a whole new world of value on offer for our partners. We can help you to tap into all of it.