All 8. At Maturity Level 2.
We deliver the Protected-level solutions you need to achieve and sustain compliance and reporting for ASD Essential 8 Maturity Level 2.
Dayle,
CTO
We get you there and keep you there.
We deliver solutions to meet all of the mandated controls for Essential 8 Maturity Level 2, working hand-in-hand with your IT team. Whether it’s a comprehensive compliance program or closing critical gaps, we have the expertise you need.
We do the heavy lifting.
We’ve created solutions addressing the more difficult aspects of achieving, maintaining and reporting on ML2, reducing the risk of non-compliance. As Essential 8 is further developed and refined, we’ll be there to keep you complaint.
Fast and effective. Start your journey to compliance here.
We’ve mapped the required controls to solutions, giving you a roadmap to success. So whatever gaps you have in your Essential 8 Maturity Level 2 compliance, it’s covered!
Select a Mitigation Strategy. See our solution.
Application Control
Control applications to prevent the execution of malicious software.
Hardening user applications
Protect your end-user systems from exploitation and malware.
Patching applications
Ensure that your applications are securely maintained and vulnerabilities are mitigated.
Patching operating systems
Keep your internet-facing services secure by regularly updating and addressing vulnerabilities.
Multi-factor authentication
Keep your internet-facing services secure by regularly updating and addressing vulnerabilities.
Restricting admin privileges
Establish secure approaches to administering and managing your technology environment.
Microsoft Office macro settings
Strengthen Microsoft Office macros to prevent them being maliciously abused.
Perform regular backups
Ensure your systems can be restored and important data recovered after a cyber incident.
Patching Mission Critical and Legacy systems.
Agencies struggle to maintain Essential 8 ML 2 controls for applying critical patches within 48 hours, especially for Mission Critical and Legacy systems. Virtual Patching blocks specific exploits, enabling immediate protection against vulnerabilities for public facing services.
Delivering Maturity Level 2 mandated MFA controls.
Few agencies are able to implement Essential 8 Maturity Level 2 MFA controls for external users of online systems. With our Application Protection solution external users can be re-directed via a WAF MFA page for compliant authentication.
Five pillars of our Essential 8 solution.
Security Operations
Our SOC monitors security events and uses their expertise and data analytics to identify patterns and detect threats.
Secure Core Networking
Establish secure links between your core network and public cloud services, maintaining speed and performance.
User Protection
A unique mix of SASE expertise, Protected-level security services, and a team of NV1+ cleared engineers based in Australia.
Application Protection
Layered security for public facing web applications, customized to threat profiles, compliance needs, and budget.
Cloud and Colocation
Our cloud and colocation services sit behind physical and logical defence-in-depth layers, in our ultra-secure, high capacity datacentres.
Why the essential 8?
Why another set of guidelines? There are any number of cyber security approaches that can secure networks. These essential 8 mitigation strategies have been developed specifically to provide Australian government agencies with a baseline of security operations that, if implemented and tied together, can protect networks, users, applications and data from all but the most persistent threats. The following points illustrate why these mitigation strategies make sense.
Defence in Depth
These strategies are designed to work together. Individually they are all powerful tools to protect individual components and operations of your network. Together they represent a multi-level approach that provides comprehensive protection, even if adversaries do manage to break one of the defensive measures.
Accessible to All.
None of these strategies is ‘state-of-the-art’ nor bleeding edge. They are all tried and true. There is virtually no risk in adopting these strategies if implemented correctly. Indeed, performing back-ups for important data has been an essential rule for IT managers since day one. The real benefit of the ASD Essential 8 is that they provide a baseline cyber security posture and provide a quantifiable benchmark to meet ASD recommendations.
Cost-effective.
The essential eight strategies can go a long way into protecting your agencies from security breaches and potentially damaging malware for a comparatively modest financial investment. While implementing these strategies will entail an investment of staff time and possible hardware/software upgrades, the costs involved will be considerably lower than cleaning up in the wake of a compromise.
Deployment.
Whilst your agency can implement these mitigation strategies in an ad hoc manner, basing your security posture on a single comprehensive framework has many benefits. With a comprehensive security fabric, you would be able to manage most of the strategies – such as whitelisting, patching, admin privileges – from a centralised console. Additionally, you’ll be able to apply consistent and appropriate enforcement of policy across all users, applications and devices whether on premise, remote, cloud or hybrid cloud.
Automation.
Many of these mitigation strategies can be automated to reduce management overheads whilst ensuring compliance. Most security solutions can be set up with thresholds and alerts to monitor network traffic so that any anomalous activity can be quickly identified and investigated. Massive unauthorised downloads, such as the Panama Papers leak, wouldn’t have happened with the right mitigation strategies in place.
Built for government. For your agency.
We start with the needs of your agency and our over 15 years experience protecting government, then we develop the solutions you need. That’s why so many agencies look to us for their cybersecurity and government cloud services.

Book a Meeting with our Essential 8 Trusted Advisors.
We are always here to answer your enquiries.