
Scan Your
Google Workspace
Automated Google Workspace security scan for Australian small businesses aligned to Essential 8 and ACSC recommendations. Discover shadow IT, MFA failures, and configuration risks instantly.
Traditional IT Consultant
per engagement
- Takes 1 to 3 weeks to schedule and deliver.
- Relies on manual sampling and human verification.
- Often requires creating a temporary admin account for a third party.
- High friction and ongoing billable hours.
Southern Node Scanner
Special launch pricing for our first customers. (One-Time Scan)
- Delivered instantly in 60 seconds.
- 100% automated coverage using Google Admin APIs.
- Zero Standing Privileges — access tokens destroyed instantly.
- Includes step-by-step Essential Eight remediation links.
Are you an MSP or IT Consultant? Contact us for volume pricing and revenue-share partnerships.
Enterprise Security Architecture
Built from the ground up to protect your sensitive configuration data.
Australian Data Sovereignty
Developed, hosted, and executed entirely within GCP Australia. Your data never leaves the australia-southeast1 region.
Strict Read-Only Access
We only request the scopes necessary to view your settings. Our code cannot write, alter, or delete any of your Workspace data.
Zero Standing Privileges
The moment your PDF report is generated and emailed, our database permanently destroys the OAuth access tokens. We retain zero access to your environment.
Ephemeral Containers
Every scan runs in its own isolated container that is destroyed after execution. No two customers ever share a runtime environment.
How It Works
Three simple steps to secure your cloud infrastructure.
Authenticate
Log in securely via Google Workspace using a Super Admin account.
Automated Audit
Our backend analyzes your environment against our configured baselines.
Actionable Report
Receive a comprehensive PDF report with remediation recommendations.
Frequently Asked Questions
Why do you need Super Admin access?
Google's API requires Super Admin privileges to view global security policies, Chrome device management, and multi-factor authentication enforcement. Standard users cannot read these organizational settings. We only request READ ONLY access.
Do you read our emails or Google Drive files?
Absolutely not. We only audit system configurations and metadata (like sharing policies). We do not have the technical API scopes required to read the contents of your emails or documents.
What happens if I want to cancel?
This is a point-in-time scan, not an ongoing subscription. You pay once, get your report, and our access is automatically destroyed. There is nothing to cancel.