Skip to content

Advantage secures LogRhythm Security Services Authorisation in an NZ first

Managed security services provider Advantage has become the first New Zealand company to achieve LogRhythm Security Services Authorisation.

Gaining the certification makes Advantage one of the only authorised partners in New Zealand and only the second in Australia.

To qualify, Advantage underwent extensive and in-depth training, while also employing at least two LogRhythm Security certified analysts and two LogRhythm Support certified engineers.

Simon Howe, LogRhythm’s VP Sales APAC, says the authorisation is a credit to Advantage.

“It’s a great indication of their skill set around LogRhythm, which is great for customers,” he says. “They’ve committed to significant training and exams to achieve it.”

Advantage MD Brad Pearpoint says the authorisation has been something the team had been working towards for a while.

“It underpins the security services we provide to our customers,” he says. “We’re excited to have our capability recognised.”

Client Kris Pawson, Security Officer at Scales Corporation, sees this achievement as building on Advantage’s already outstanding service.

“It adds even more confidence that they’re always striving to improve their knowledge and professionalism,’ he says. “It shows they’re committed to maintaining a high level of professionalism and knowledge in their services.”

That work has paid off, with Advantage again winning LogRhythm’s MSSP partner of the year. It’s for the second year in a row which, says Simon, “is a testament to the ongoing strength of the business and the relationship with LogRhythm.”

“It’s a relationship we really value and together we’re delivering a lot of value to customers.”

As one of New Zealand’s oldest IT companies, Advantage has been recognised for its capacity to evolve with constantly changing IT environments using tools based on Gartner’s SOC Visibility Triad to Protect, Detect and Respond.

LogRhythm Services Authorized Partners

Contact us

Facebook
Twitter
LinkedIn

Related Posts

No defence is perfect. From phishing and ransomware to insider misuse and cloud misconfigurations, security incidents are an unavoidable reality of doing business. What sets resilient organisations apart is how quickly and effectively they respond.
In our increasingly digital and interconnected world, it is easy to view cybersecurity as a battle fought by machines—artificial intelligence, cutting-edge software, and automated tools working tirelessly to defend our organisations. Yet, amid this technological arsenal, one element stands out as irreplaceable: human expertise.
Sometimes the first step in a cyberattack isn’t code. It’s a click. A single login involving one username and password can give an intruder a front-row seat to everything your business does online. This guide looks at how to make life much harder for would-be intruders. The aim isn’t to drown you in tech jargon. Instead, it’s to give IT-focused small businesses a playbook that moves past the basics and into practical, advanced measures you can start using now.