Join A Leader In

GuardWare

Data-Centric Security Platform

GuardWare gives organisations direct control of their sensitive information by binding encryption and usage policy to the data itself. It finds and labels critical and regulated content, tracks how it moves across teams and suppliers, and keeps it protected at rest, in transit, and while in use—so you can grant, limit, or revoke access on demand with verifiable evidence for assurance and audits. Vectra partners with GuardWare to help defence, utilities, and critical infrastructure lift Essential Eight maturity: we design and run rapid pilots, architect policies, harden configurations, and deliver production deployments with ongoing tuning and licensing support.

What is GuardWare?

GuardWare is a data-centric security platform that binds encryption and usage policy to the information itself. It discovers and classifies sensitive data across IT/OT, monitors how it moves internally and with suppliers, and enforces persistent protection—at rest, in transit, and while in use. Teams can grant, limit, or revoke access on demand, automate hardened baselines, and generate tamper-evident evidence for audits and board reporting. The result: provable control of critical information, even outside your perimeter.

  • Discover & classify sensitive data across M365/SharePoint, file shares, CAD/PLM, email and OT paths—automatically.
  • Persistently protect data with encryption and usage policy that travels with the file (at rest, in transit, and in use).
  • Control beyond your perimeter: share safely with suppliers/contractors and revoke access on demand with watermark/no-copy/no-print options.
  • Prove compliance & governance with tamper-evident logs, drift detection, and ready evidence for audits and board reporting.
  • Hardened by design: supports Essential Eight uplift and configuration governance to reduce insider, ransomware, and supply-chain risk.

“Developed with Australia’s defence ecosystem to protect official-sensitive data across the supply chain—with data-in-use encryption, instant revoke, and audit-ready evidence.”

GuardWare is built and proven with Australia’s defence ecosystem, focusing on securing official-sensitive data across the entire supply chain. Recent Defence Trailblazer announcements highlight PROTECT’s data-in-use encryption and remote revocation to keep designs and mission data under control—even off-network and with partners.

Why this matters

  • Designed for defence supply chains: engineered to protect sensitive information end-to-end across primes, subs, and contractors.
  • Backed by university–industry collaboration: partnership work with UNSW via Defence Trailblazer to strengthen sovereign capability.
  • Operational credibility: used in Australian environments to monitor and control sensitive content with audit-ready evidence.

GuardWare Discover

GuardWare Discover is the visibility engine of the platform: it finds your sensitive information wherever it lives, fingerprints it, and maps who can access it and how it moves—across M365, file shares, CAD/PLM, email, and OT data paths. It turns scattered files into a clear exposure picture and a prioritised hardening plan, ready for operations, audits, and board reporting.

  • Auto-discovery & fingerprinting of crown-jewel data across IT/OT repositories.
  • Smart classification & labelling (e.g., PROTECTED/CONTROLLED) with policy hooks.
  • Exposure mapping of locations, permissions, external shares, and egress (USB/cloud).
  • Risk scoring & remediation plan aligned to Essential Eight and configuration baselines.
  • Evidence on demand: baseline reports, drift alerts, and board-ready metrics.

GuardWare Assessor

GuardWare Assessor is the rapid-assessment module that measures how well your environment protects sensitive data today—and what to fix first. It evaluates configurations, access paths, and control coverage across M365, file shares, CAD/PLM and OT interfaces, then benchmarks results against Essential Eight and your internal policies to generate a clear, prioritised hardening plan.

  • Configuration & control audit: baselines encryption, sharing, DLP/IRM, and endpoint controls; flags gaps and misconfigurations.
  • Access & exposure review: maps who has what, where data flows (internal/external), and high-risk egress like USB or unsanctioned cloud.
  • Benchmarking & scores: aligns findings to Essential Eight and governance standards with measurable maturity scores.
  • Prioritised remediation plan: quick wins, owner/action dates, and sequenced tasks for policy, configuration, and process fixes.
  • Board-ready reporting: concise dashboards and evidence packs to demonstrate risk reduction and track drift over time.
 
Expose Hidden Data Risks Across Every Channel

Covers all channels and eliminates blind spots.

GuardWare Insight

GuardWare Insight is the live telemetry and analytics layer that turns discovery data into operational awareness. It continuously tracks how sensitive files are accessed and moved, detects abnormal behaviour and policy drift, and surfaces the “so what” in clear dashboards and alerts. Insight plugs into your SIEM/SOAR and ticketing tools so the right team sees the right signal—fast—and action is captured for assurance and audits.

  • Real-time activity monitoring: who accessed what, from where, with what device—inside and across suppliers.
  • Anomaly & drift detection: flags unusual access, privilege changes, unapproved sharing, and configuration regressions.
  • Impactful dashboards & KPIs: exposure trends, time-to-contain, policy coverage, and Essential Eight alignment at a glance.
  • Open integrations: push events to Devo/Google SecOps/Microsoft, trigger SOAR playbooks, and open tickets in ServiceNow/Jira.
  • Evidence & reporting: tamper-evident timelines and executive reports to prove control, demonstrate reduction, and satisfy audits.

GuardWare Protect

GuardWare Protect is the enforcement engine that binds encryption and usage policy to the data itself—so control stays with you anywhere the file goes. It applies least-privilege rules (view-only, watermark, block copy/print/export), enforces data-in-use encryption, and lets you revoke or time-limit access on demand across internal teams, contractors, and suppliers.

  • Persistent protection: strong encryption + policy travels with the file (at rest, in transit, and in use).
  • Granular usage control: view-only, watermark, no copy/print/save-as, offline grace, geo/time limits, and “kill switch” revoke.
  • Supply-chain ready: maintain control on unmanaged devices and third-party portals; revoke instantly if risk changes.
  • Seamless workflow integration: M365/SharePoint, file shares, email, CAD/PLM and OT hand-offs—minimal user friction.
  • Operational assurance: tamper-evident audit trails, key escrow/rotation, and policy templates aligned to Essential Eight.

GuardWare
Overview

Key Capabilities

  • Auto discovery & classification across M365/SharePoint, file shares, email, CAD/PLM and OT paths.
  • Persistent, data-in-use encryption with policy bound to the file (view-only, watermark, no copy/print, revoke/expire).
  • Live insight & drift detection for access, sharing, and configuration changes—streamed to your SIEM/SOAR.
  • Supply-chain control on unmanaged devices and third-party portals without relying on their security.
  • Compliance evidence on demand with tamper-evident logs, baselines, and board-ready reporting.

Benefits

  • Stop data theft and misuse even if files leave your network or are exfiltrated.
  • Reduce exposure fast with a prioritised hardening plan and phased policy enforcement.
  • Enable secure collaboration with contractors and suppliers without slowing the work.
  • Prove governance & uplift Essential Eight with measurable coverage and audit-ready artefacts.
  • Lower operational load via automation, clear dashboards, and integrations with existing tools.

GuardWare Frequently Asked Questions

Traditional DLP focuses on stopping certain movements; once a file leaves, control is largely gone. GuardWare binds encryption and usage policy to the file itself—so even off-network and on supplier devices you can enforce view-only, watermark, no copy/print, expire, or revoke. It complements M365/IRM and CASB by adding persistent, data-in-use protection and supply-chain control.

No. We start monitor-only to map behaviour, then phase in policy (warn → enforce) where it won’t block the work. GuardWare integrates with M365/SharePoint, file shares, email, CAD/PLM and common OT hand-offs, so teams keep their tools while you gain control and visibility.

Yes. Controls travel with the file, not the network. You can set geo/time limits, offline grace windows, and revoke access instantly if risk changes (e.g., device fails posture checks, user off-boarded, incident declared). Tamper-evident logs show who opened what, where, and when—for primes, subs, and contracto

We run a rapid pilot to baseline exposure (GuardWare Discover/Assessor), integrate events to your SIEM/SOAR (Insight), then move to phased enforcement (Protect). Success is tracked via KPIs: reduction in uncontrolled shares/copies, time-to-revoke, policy coverage, and drift findings closed—mapped to ASD Essential Eight and your governance targets. Key management can be customer-managed or hosted escrow to meet compliance and residency requirements.

GuardWare supports customer-managed keys (your KMS/HSM, with separation of duties) or hosted key escrow in your chosen region. Policies ensure keys can be rotated, revoked, and audited, and protected content stays encrypted wherever it travels. Telemetry is minimised to what’s needed for assurance, with options for in-region processing and strict access controls to meet defence and critical-infrastructure requirements.

Encrypt Everything, Expose Nothing - GuardWare & Vectra