Abstract
The consumerisation of Information Technology increases cyber vulnerability for any organisation that holds valuable private data where advanced high-level protection is required. This chapter is to present and analyse an entrepreneurial journey of three Australian-based information security experts who seized the opportunity, foresaw the potential for the demand of customised solutions, and endeavoured with their expertise and ingenuity to create Airlock Digital; a company and a brand that offers quality software and cyber-security solutions. For over 6 years the company has grown incrementally with the product having found its product-market-fit across the globe. Airlock Digital has now expanded outside of Australia and is transitioning from a startup to a scaleup.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
‘Seats’ is the terminology used to indicate how many software licenses are required.
- 2.
SANS is the largest information security training resource in the world www.sans.org.
- 3.
Value Proposition seeks to solve customer problems while satisfying needs (Osterwalder and Pigneur 2010).
- 4.
Customer Segments include what type of market is served (Osterwalder and Pigneur 2010).
- 5.
Key Resources include the assets required to offer and deliver the product or service from the idea stage (Osterwalder and Pigneur 2010).
- 6.
99designs is a global community of online graphic designers: https://99designs.com.au.
- 7.
A full stack developer engineers both client and server software technology with the use of programming language on multiple platforms.
- 8.
Ries (2011) coined this term MVP and uses it akin to ‘prototype’, except that the point of a MVP is to test a businesses’ hypothesis.
- 9.
Key Activities are the number of actions performed such as reaching their market (Osterwalder and Pigneur 2010).
- 10.
AustCyber is the Australian Cyber Security Growth Network supported by the Australian Government, Department of Industry, Innovation and Science.
- 11.
Black Hat (2019) is considered the most technical and relevant information security event series in the world.
- 12.
Channels are how the solution would be delivered to customers via communication, distribution and sales (Osterwalder and Pigneur 2010).
- 13.
Customer Relationships are established and maintained within each customer segment (Osterwalder and Pigneur 2010).
- 14.
Key Partnerships include outsourcing activities and acquiring resources outside of the firm (Osterwalder and Pigneur 2010).
- 15.
Revenue Streams are the result of meeting the Value Propositions successfully offered to customers (Osterwalder and Pigneur 2010).
- 16.
Cost Structure refers to business elements that influence the business model (Osterwalder and Pigneur 2010).
References
AusCERT. (2019). Protecting organisations from cyber threats since 1993. Retrieved from https://www.auscert.org.au
Australian Signals Directorate. (2019). Essential Eight Explained. Australia: Australian Government. Retrieved from https://www.cyber.gov.au/sites/default/files/2019-03/Essential_Eight_Explained.pdf
Black Hat. (2019). Black Hat: About Us. Retrieved from https://www.blackhat.com/about.html
Carlopio, J., & Andrewartha, G. (2012). Developing management skills. A comprehensive guide for leaders. 5th ed. Australia, Pearson
Christensen, C. M., Raynor, M. E., & McDonald, R. (2015). What is disruptive innovation? Harvard Business Review. Retrieved from http://pedrotrillo.com/wp-content/uploads/2016/01/Whatisdisruptiveinnovation.pdf
Cropley, D. H., & Oppert, M. L. (2018). The fuzzy front-end? How creativity drives organizational innovation. In R. Reiter-Palmon, V. L. Kennel, & J. C. Kaufman (Eds.), Individual Creativity in the Workplace (pp. 35-51). London: Academic Press
Gartner. (2019). Gartner. Retrieved from https://www.gartner.com/en
Gray, P. (2018). Snake Oilers 6 part: Insight from Rapid7, whitelising with Airlock Digital and testing your SOC personnel with AttackIQ. Risky.Biz [Audio podcast].Retrieved from https://risky.biz/snakeoilers6pt1/
Mazzarol, T. (2015). Startup nation: the rhetoric and the reality. Retrieved from https://theconversation.com/startup-nation-the-rhetoric-and-the-reality-48011
McLeod, C. (2017). Why are Australian start-ups failing? Retrieved from https://pursuit.unimelb.edu.au/articles/why-are-australian-start-ups-failing
Osterwalder, A. (2004). The Business Model ontology - a proposition in a design science approach (Doctoral dissertation), University of Lausaane. Retrieved from http://www.hec.unil.ch/aosterwa/PhD/Osterwalder_PhD_BM_Ontology.pdf
Osterwalder, A., & Pigneur, Y. (2010). Business model generation: A handbook for visionaries, game changers, and challengers. New Jersey: John Wiley & Sons Inc
Ries, E. (2011). Build Measure Learn. Inc, 33(8), 56–63
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Oppert, M.L., Haines, T. (2020). Airlock Digital—Australian Information Security Systems Startup to Scaleup—Where Trust is a Must. In: Wang, J., Kosaka, M., Xing, K., Bai, H. (eds) Entrepreneurship in the Asia-Pacific: Case Studies. Springer, Singapore. https://doi.org/10.1007/978-981-32-9362-5_8
Download citation
DOI: https://doi.org/10.1007/978-981-32-9362-5_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-32-9361-8
Online ISBN: 978-981-32-9362-5
eBook Packages: Business and ManagementBusiness and Management (R0)