All 8. At Maturity Level 2.

We deliver the Protected-level solutions you need to achieve and sustain compliance and reporting for ASD Essential 8 Maturity Level 2.

Dayle,
CTO

We get you there and keep you there.

We deliver solutions to meet all of the mandated controls for Essential 8 Maturity Level 2, working hand-in-hand with your IT team. Whether it’s a comprehensive compliance program or closing critical gaps, we have the expertise you need.

We do the heavy lifting.

We’ve created solutions addressing the more difficult aspects of achieving, maintaining and reporting on ML2, reducing the risk of non-compliance. As Essential 8 is further developed and refined, we’ll be there to keep you complaint.

Fast and effective. Start your journey to compliance here.

We’ve mapped the required controls to solutions, giving you a roadmap to success. So whatever gaps you have in your Essential 8 Maturity Level 2 compliance, it’s covered!

Select a Mitigation Strategy. See our solution.

government-icon-small-arrow

Application Control

Control applications to prevent the execution of malicious software.

government-icon-small-arrow

Hardening user applications

Protect your end-user systems from exploitation and malware.

government-icon-small-arrow

Patching applications

Ensure that your applications are securely maintained and vulnerabilities are mitigated.

government-icon-small-arrow

Patching operating systems

Keep your internet-facing services secure by regularly updating and addressing vulnerabilities.

government-icon-small-arrow

Multi-factor authentication

Keep your internet-facing services secure by regularly updating and addressing vulnerabilities.

government-icon-small-arrow

Restricting admin privileges

Establish secure approaches to administering and managing your technology environment.

government-icon-small-arrow

Microsoft Office macro settings

Strengthen Microsoft Office macros to prevent them being maliciously abused.

government-icon-small-arrow

Perform regular backups

Ensure your systems can be restored and important data recovered after a cyber incident.

Patching Mission Critical and Legacy systems.

Agencies struggle to maintain Essential 8 ML 2 controls for applying critical patches within 48 hours, especially for Mission Critical and Legacy systems. Virtual Patching blocks specific exploits, enabling immediate protection against vulnerabilities for public facing services.

Delivering Maturity Level 2 mandated MFA controls.

Few agencies are able to implement Essential 8 Maturity Level 2 MFA controls for external users of online systems. With our Application Protection solution external users can be re-directed via a WAF MFA page for compliant authentication.

Five pillars of our Essential 8 solution.

government-icon-small-arrow

Security Operations

Our SOC monitors security events and uses their expertise and data analytics to identify patterns and detect threats.

government-icon-small-arrow

Secure Core Networking

Establish secure links between your core network and public cloud services, maintaining speed and performance.

government-icon-small-arrow

User Protection

A unique mix of SASE expertise, Protected-level security services, and a team of NV1+ cleared engineers based in Australia.​

government-icon-small-arrow

Application Protection​

Layered security for public facing web applications, customized to threat profiles, compliance needs, and budget.

government-icon-small-arrow

Cloud and Colocation

Our cloud and colocation services sit behind physical and logical defence-in-depth layers, in our ultra-secure, high capacity datacentres.

Why the essential 8?

Why another set of guidelines? There are any number of cyber security approaches that can secure networks. These essential 8 mitigation strategies have been developed specifically to provide Australian government agencies with a baseline of security operations that, if implemented and tied together, can protect networks, users, applications and data from all but the most persistent threats. The following points illustrate why these mitigation strategies make sense.

 
Defence in-depth

Defence in Depth

These strategies are designed to work together. Individually they are all powerful tools to protect individual components and operations of your network. Together they represent a multi-level approach that provides comprehensive protection, even if adversaries do manage to break one of the defensive measures.

Accessibility

Accessible to All.

None of these strategies is ‘state-of-the-art’ nor bleeding edge. They are all tried and true. There is virtually no risk in adopting these strategies if implemented correctly. Indeed, performing back-ups for important data has been an essential rule for IT managers since day one. The real benefit of the ASD Essential 8 is that they provide a baseline cyber security posture and provide a quantifiable benchmark to meet ASD recommendations.

Cost effective

Cost-effective.

The essential eight strategies can go a long way into protecting your agencies from security breaches and potentially damaging malware for a comparatively modest financial investment. While implementing these strategies will entail an investment of staff time and possible hardware/software upgrades, the costs involved will be considerably lower than cleaning up in the wake of a compromise.

Deployment

Deployment.

Whilst your agency can implement these mitigation strategies in an ad hoc manner, basing your security posture on a single comprehensive framework has many benefits. With a comprehensive security fabric, you would be able to manage most of the strategies – such as whitelisting, patching, admin privileges – from a centralised console. Additionally, you’ll be able to apply consistent and appropriate enforcement of policy across all users, applications and devices whether on premise, remote, cloud or hybrid cloud.

Automation

Automation.

Many of these mitigation strategies can be automated to reduce management overheads whilst ensuring compliance. Most security solutions can be set up with thresholds and alerts to monitor network traffic so that any anomalous activity can be quickly identified and investigated. Massive unauthorised downloads, such as the Panama Papers leak, wouldn’t have happened with the right mitigation strategies in place.

Built for government. For your agency.

We start with the needs of your agency and our over 15 years experience protecting government, then we develop the solutions you need. That’s why so many agencies look to us for their cybersecurity and government cloud services.

government-partner-logos

Book a Meeting with our Essential 8 Trusted Advisors.

We are always here to answer your enquiries.

1800 004 943

We'll be in touch with you soon.

Thank you for contacting us. Our specialists will get in touch with you shortly.