Skip to content

Cyber Security, Halo @ Australian Sentinel

Workflow automation, done differently

Temporary access to the Halo platform(s) will be provided for the Australian Sentinel consultant(s), with cyber security remaining a top priority.

  • Access to the Halo platform is strictly limited to the named consultant, who is a verified employee covered under Australian Sentinel insurance policies. Access is granted solely for the agreed engagement period—typically one week before and after the Assessment Workshop—unless otherwise mutually agreed.
  • Australian Sentinel follows a rigorous access withdrawal process aligned with the Assessment Completion milestone and conducts quarterly audits to ensure unnecessary access is promptly removed.
  • All employees undergo comprehensive onboarding that includes training on key policies such as the Information Systems Access Policy, Acceptable Use Policy, and Password Policy. Policy compliance is revisited annually as part of our People and Culture programme.
  • We also fully comply with the Client’s password and security policies, ensuring that all authentication, access, and data handling practices meet the Client’s standards.

When the Australian Sentinel Halo expert logs into your Halo platform(s) to review for Australian Sentinel leading Practice and feature adoption, the process typically involves a structured evaluation across several key areas. Australian Sentinel leading Practice includes but not limited to

  • Verify core configuration and system implementation
  • Review access controls
  • Assess workflow automation
  • Evaluate feature adoption
  • Check CMDB maturity
  • Inspect security practices
  • Review environment management
  • Identify gaps
  • Recommend improvements

Request a Halo Assessment

Please fill out some basic information below and we will reach out to schedule your Halo Assessment.