About Us

Satalyst is an Australian-based Gold Microsoft Partner specialising in cloud, security, and data.

Our innovative solutions transform business processes and productivity. We leverage Microsoft and open source technology to modernise, secure, and support IT and data environments.

We support clients at every stage of their technology journey.

Learn More

Certified Microsoft Cloud Solutions Provider

Satalyst is a
Microsoft Cloud Solutions ProviderTM
Purchase Microsoft Cloud Services direct from us

Find out more

Upcoming Satalyst Events

25 Feb
2021

Azure Immersion Workshop: Windows Virtual Desktop

Satalyst and Microsoft invite you to a deep-dive, interactive exploration of architecting and deploying a Windows Virtual Desktop infrastructure. This Windows Virtual Desktop Workshop provides you with both the knowledge and skills to accelerate designing and implementing a virtual desktop infrastructure on Azure. The workshop covers deployment options, architecture best practices, management plane options, user profiles and data, along with 3rd party tools and licensing considerations. In the labs you will create your first Windows Virtual Desktop architecture, create Active Directory groups, assign users, create a master image and then connect to a virtual desktop. In the second lab you will dig into operationalizing your virtual desktop infrastructure with monitoring, scaling and image management. In our workshop, you will better understand: Windows Virtual Desktop architecture best practices Pooled or single VM host choices Available Management Control planes Security considerations Image management and scaling The workshop runs for a full day with a 1-hour break for lunch. Reserve your place today!   Presented by¬†

Visit this event

Satalyst Blog

22.02.21 By Daniel Maddern Categories:

5 critical steps to network penetration testing

Somewhere between updating your Disaster Recovery plan and setting up multi-factor authentication, you probably recall that it’s time you conduct penetration testing for your network. If you have the skills and the time internally to do this, I recommend that you make sure that your pen test covers the following 5 key steps. These steps work regardless of whether you are completing a small-scale web application pen test or a full network pen test for a global organisation. Penetration Testing your Network Footprinting / Reconnaissance Footprinting or Reconnaissance is the initial intelligence gathering performed on a target organisation. This involves identifying firewalls, routers and building a map of the network. During this step, the security tester gathers important company information. This could include org charts, company policies, physical addresses, current events and details of key personal such as email addresses, CVs and phone numbers. Once the security tester gathers this information, they can then identify key targets, potential vulnerabilities and attack vectors. Scanning Scanning adds a lot of information to your network map. It is about uncovering more detailed host information. It might consist of Operating System information and versions, hosted applications, open ports and network ranges. This information expands...
Visit our blog

Trusted partner for your modern IT solutions