Our Government cloud is certified by the Australian Signals Directorate (ASD).

Built for Protected (classified).

Built for DLM (Official).

Availability zones in Canberra and Sydney owned data centres.

Diverse connectivity via ICON.

200+ engineers security cleared to government standards.

Easy to buy. Easy to deploy. Easy to use.

Macquarie Data Centres.

Macquarie Cloud.

Macquarie Telecom Services.

The first and only Australian Sovereign Cloud Provider to supply and manage Government Cloud Services, Data Centre and Secure Internet Gateway Services all under one umbrella.

Australian map, dotted image

Secure government cloud specialists.

  • We understand government.

    From digital transformation to secure government cloud services, we’re leaders in the field.

    Read more
  • Our own Canberra-based data centre.

    We built Intellicentre 4 Bunker for the most secure needs of government. It's local and ICON-connected.

    Read more
  • Used and trusted by 42% of agencies.

    With 15 years of experience, we’ve got the government cyber security expertise you need

    Read more

Got question? Talk to us.

We are always here to answer your enquiries.

1800 004 943

We'll be in touch with you soon.

Thank you for contacting us.

Built for government. For your agency.

We start with the needs of your agency and our 15 years of experience in government, then we develop the solutions you need. That’s why so many agencies look to us for their security and government cloud services.

 

Partners | Macquarie Government

Easy to buy. Easy to deploy. Easy to use.

  • Government panels.

    It's simple to buy from us through existing procurement frameworks and contracts.

    Read more
  • VMware by Broadcom automation.

    You use VMware by Broadcom. We use VMware by Broadcom. You already know how to use our cloud.

    Read more
  • Local support.

    Our security-cleared engineers are here for you. Highly trained, proudly local.

    Read more

Get in touch.

Leave us a message and our Macquarie Government consultants will soon be in touch.

From our Blog

Safeguarding Against Cyber Supply Chain ...

The recent cyber-attack on XZ Utils, a popular software used for file compression, underscores the escalating threat landscape targeting sof...

Read More

Navigating the Labyrinth: The Threat Lan...

Large Language Models (LLMs) are the new kid on the block and as businesses race to train and utilise these models to gain competitive advan...

Read More

Beyond the Essential Eight (E8) – wher...

As the Australian government moves towards its next phase of the Cyber Security Strategy and consults industry to make legislative refo...

Read More