Request a Demo

The Noggin Platform

The world’s leading platform for integrated safety & security management.

Learn More
Find Your Solution
  • Crisis management Crisis Management
  • emergency Management Emergency Management

Apply best practices to plan for, respond to, and manage critical events and exercises. Built on ISO standards, you can respond faster with better collaboration using plans and playbooks, smart workflows, and real-time dashboards and insights, to ensure better incident response, decision-making, and continuous improvement.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo
  • Safety Management Safety Management
  • Employee Health & Wellbeing Employee Health & Wellbeing
  • Governance Risk & Compliance Governance, Risk & Compliance (GRC)
  • Asset Management Asset Management
  • Contractor Management Contractor Management
  • Visitor Management Visitor Management
  • emergency Management Emergency Management

All the tools needed to automate your safety management system in one easy-to-use platform, following ISO standards. Increase efficiency with powerful automation capabilities and provide real time insights to all levels of your business. Configurable notifications, workflows, analytics, and mapping empower your safety personnel to make better decisions wherever they are.

Learn More
Request a Demo

Maintain a comprehensive view of the wellbeing of your workers, their needs, and the wellbeing initiatives conducted in your organization. Through various assessments, checks, analytics, and resources you can easily manage both the physical and mental wellbeing of personnel across various locations and programs.

Learn More
Request a Demo

A suite of tools to collect risk data from across your organziation from a range of stakeholders, in real time, and based on ISO standards. Fully customisable, with everything from a simple pre-task assessment though to an organisational risk register, we make it easy to capture risk data and provide the analytics to derive rich insights, to keep your organisation safe and compliant.

Learn More
Request a Demo

Track all your assets from your vehicle fleet, fixed or mobile plant and equipment though to your critical infrastructure using our range of tools. Plan maintenance ahead of time and by collecting lead indicator data from checklists and assessments on any mobile device, then enable users to update the status of your assets to track utilisation, share documentation and report issues.

Learn More
Request a Demo

Save time and money by enabling contractors to self-register and progress through a customizable workflow, to check documentation before becoming an approved contractor. Contractors can then be automatically followed up using workflows and notifications to keep their organziation compliant.

Learn More
Request a Demo

Streamline visitor sign-in using a QR code on a form tailored for your organisation. Visitors can complete inductions, answer questions and acknowledge content then have notifications triggered to their host based on their responses. Once on site, manage visitor cards, broadcast notifications and understand visitor trends to optimise your processes.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo
  • Physical Security Physical Security
  • Cyber Security Cyber Security
  • Visitor Management Visitor Management
  • Critical Infrastructure Protection Critical Infrastructure Protection
  • Emergency Management Emergency Management
  • Governance Risk & Compliance Governance, Risk & Compliance
  • Asset Management Asset Management
  • Contractor Management Contractor Management

Proactively manage all aspects of physical security operations from anywhere, on any device. Based on ISO standards, streamline your operations using workflow automations to guide information capture, enrichment, follow up tasks, and notifications. Validate threats and risks to drive better investment of your resources.

Learn More
Request a Demo

Manage cyber threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions, and drive continual improvement review cycles.

Learn More
Request a Demo

Streamline visitor sign-in using a QR code on a form tailored for your organisation. Visitors can complete inductions, answer questions and acknowledge content then have notifications triggered to their host based on their responses. Once on site, manage visitor cards, broadcast notifications and understand visitor trends to optimise your processes.

Learn More
Request a Demo

Consolidate the threat and risk picture across all your assets, easily demonstrate compliance with security obligations, and gain an ‘all threats’ perspective encompassing physical, cyber, personnel and supply chain. Address and manage cyber threats without having to implement costly new ICT systems and drive continuous improvement and review cycles.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo

Manage cyber, emergency and security threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions and drive continual improvement review cycles.

Learn More
Request a Demo

Track all your assets from your vehicle fleet, fixed or mobile plant and equipment though to your critical infrastructure using our range of tools. Plan maintenance ahead of time and by collecting lead indicator data from checklists and assessments on any mobile device, then enable users to update the status of your assets to track utilization, share documentation and report issues.

Learn More
Request a Demo

Save time and money by enabling contractors to self-register and progress through a customizable workflow, to check documentation before becoming an approved contractor. Contractors can then be automatically followed up using workflows and notifications to keep their organziation compliant.

Learn More
Request a Demo
  • Business Continuity Planning Business Continuity Planning
  • Crisis Management Crisis Management
  • Governance Risk & Compliance Governance, Risk & Compliance (GRC)
  • Continuity of Operations Continuity of Operations (COOP)

Follow ISO standard approaches to determine disruption impacts and develop plans & recovery strategies to address risks. Track gaps, dependencies and tests, capture exercises, and manage insurance details. Scale up to any incident and back down to business as usual as quickly as possible and drive continuous improvement.

Learn More
Request a Demo

Apply best practices to plan for, respond to, and manage critical events and exercises. Built on ISO standards, you can respond faster with better collaboration using plans and playbooks, smart workflows, and real-time dashboards and insights, to ensure better incident response, decision-making, and continuous improvement.

Learn More
Request a Demo

Manage cyber, emergency and security threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions and drive continual improvement review cycles.

Learn More
Request a Demo

Ensure preparedness across your organisation. Conduct business impact assessments and quickly identify essential functions. Assess hazard and threat risks. Identify technology, assets, facilities, and critical personnel. Gather and assemble essential information and documents. Develop, test and maintain your COOP plans. From readiness and preparedness to reconstitution, manage all four phases of the Continuity of Operations Plan to minimize business loss and disruption.

Learn More
Request a Demo
A guide to developing your covid-19 return to work plan
Whitepaper

Developing Your COVID-19 Return to Work Plan

Access the Guide

Who We Are

The world’s leading platform for integrated safety & security management.

Learn More
Featured Article

NSW government’s big bet on local tech is a good move to combat lazy ERP purchasing

Written By James Boddam-Whetham for
logo-themandarin

Article originally published in The Mandarin, original article available here.

The deteriorating cyber threat environment of 2020 hasn’t gotten any better in 2021. Indeed, it just might be getting worse.

In Australia, the federal response has been muscular. Important amendments to the Security of Critical Infrastructure Act are wending their way through parliament to harden cyber security resilience obligations for a broader swathe of Australian businesses.

What about the states? In NSW, the state government committed to updating its 2018 Cyber Security Strategy. It also allocated $240 million to opening a cybersecurity vulnerability management centre in Bathurst.

The biggest news yet has been the announcement of the $1.6 billion Digital Restart Fund. The state government initiative is an ambitious attempt to make NSW the digital capital of the southern hemisphere, and it is being touted as the single largest cybersecurity investment in the nation’s (let alone the state’s) history. For local IT vendors, that initiative is bearing fruit today.

What’s going on? The funding pool is earmarked for protecting existing systems, deploying new technology, and building out the state’s cyber workforce, with the aim to boost service access and improve service delivery.

Nor has resilience been neglected. In particular, the state is making a big bet on Australian small and medium enterprises (SME).

First, a state government taskforce looked into the question of ramping up SME participation in government procurement. The ICT/Digital Sovereign Procurement Taskforce was explicitly set up to find ways to diversify the state’s ecosystem of IT suppliers — perhaps even creating “measurable targets” for sovereign IT. Well now, we have those targets. Just a few months ago, the state announced that it had set an aspirational spending target of 30% of the annual $2.5 billion IT procurement budget with local SMEs. In addition, the state government has also set an expectation that procurements valued over $3 million will redirect 25% of indirect IT spending to SMEs.

It’s hard to overstate the importance of such “buy local” measures. Clearly, part of their intent is to accelerate the growth and recovery of the country’s SMEs. Primary drivers of economic growth, the nation’s SMEs have been battered by the pandemic. Therefore, revving up that economic engine is critical for the country’s long-term financial health.

That’s not all, though. Both state and federal governments are working on solutions that enhance critical sovereignty and data security of vulnerable assets.

Proposals for achieving technology sovereignty aren’t new. Nevertheless, the COVID-19 crisis has given that important drive much needed momentum.

It was clear to all that during the pandemic, digital technologies helped the country’s citizens immeasurably. Diverse technologies kept schools and businesses open, ensured groceries were delivered, kept us seeing medical professionals, and facilitated payments.

The increased reliance on digital technology systems didn’t go unnoticed by state and private actors — hence the sharp spike in cyber threats.

In NSW, the local IT sector provides an important measure of cyber resilience against these very threats. Used to competing against bigger, entrenched Enterprise Resource Planning (ERP) vendors, we must innovate for our daily bread.

Some of the big, bureaucratic incumbents can often be complacent, reliant on legacy architecture. That reliance can lead to inefficient, costlier solutions that take longer to build and test.

On the other hand, we can’t afford to be big, complacent, and more costly, like many other local vendors. We have to solve problems quicker, using truly agile development approaches that enable us to add new capabilities to respond to unexpected customer needs — like novel pandemics. We have greater risk tolerance, which makes us better able to innovate with each new product and release.

In turn, those innovations, especially in data security, privacy, and availability, then get passed on to our customers in the state and private sectors, redounding to the benefit of the nation’s citizens and critical sovereignty objectives.

Since we put in the hard work, now it’s the governments turn to put their money where their mouth is, by starting to look for truly innovative solutions. Although there hasn’t been a lot of procurement during the pandemic, lazy ERP purchasing was previously more the rule than the exception. Smaller players were fighting an uphill battle for consideration and opportunities.

Don’t just take my word for it. Early last year, Gartner analysts did a write-up on buyer preferences. The report indicated most buyers preferred known vendors, with only 13% open to any vendor with an interesting solution that meets their needs.

In contrast, 22% of buyers admitted they would only consider approved or known vendors for new purchases, while 25% would only consider approved or known vendors for replacement purchases.

Around two-thirds of buyers have preference for approved or known vendors, either for new purchases (65%) or replacements (63%). If that’s not bad, the reasoning is worse. Buyers don’t want to buck the lazy purchasing trend, because of “tech debt” and “sunk costs”.

When it comes to innovation that protects critical infrastructure and enhances community resilience, tech debt and sunk costs just won’t cut it.

So that’s why, as the CEO of a local tech SME, Noggin, I’m pleased to the see the NSW state government acknowledge all the great digital technology in its own backyard.

Putting a metric on local IT procurement is an important first step. However, it still needs to be matched with a proactive procurement approach that ensures the best critical infrastructure protecting innovations get a fair shake so that our people, places, and key assets remain safe.

Image source: Adobe/Blue Planet Studio 

New call-to-action