fbpx

Managed Cyber Security

We provide managed cyber solutions for your security.

Evolution IT Cyber Protect plans were designed to provide your business with advanced cyber security solutions with our technical expertise to protect your business from threat actors.

Allowing your business continuity and security against todays evolving cyber landscape.

Our Cyber Protect plans are designed
with several key areas in mind

ACSC Essential 8 Maturity Levels 1-3

Automated Threat Response & Remediation

Automated Patching

Endpoint Monitoring

Business continuity and redundancy with our BCDR Solutions

Vulnerability Assessments

Microsoft 365 Cloud protection

What is the essential 8?

While no set of mitigation strategies are guaranteed to protect against all cyber threats, organisations are recommended to implement eight essential mitigation strategies from the ACSC’s Strategies to Mitigate Cyber Security Incidents as a baseline. This baseline, known as the Essential Eight, makes it much harder for adversaries to compromise systems.

The mitigation strategies that constitute the Essential Eight are: application control, patch applications, configure Microsoft Office macro settings, user application hardening, restrict administrative privileges, patch operating systems, multi-factor authentication and regular backups.

Implementing the Essential Eight proactively can be more cost-effective in terms of time, money and effort than having to respond to a large-scale cyber security incident.

The Essential Eight Maturity Model is designed to assist organisations to implement the Essential Eight in a graduated manner based upon different levels of adversary tradecraft and targeting.

The different maturity levels can also be used to provide a high-level indication of an organisation’s cyber security maturity.

Application Control

Application Control

To control the executions of unauthorised software.

Patch Applications

Patch Applications

To remediate known security vulnerabilities.

Configure MS Macro Settings

Configure MS Macro Settings

Configuring microsoft office macro settings to block untrusted macros 

User Application Hardening

User Application Hardening

To promote against vulnerable functionality.

Restrict Admin Privilege

Restrict Admin Privilege 

To limit powerful access to systems. 

Patch Operating Systems

Patch Operating Systems 

To remediate known security vulnerabilities. 

Multi Factor Authentication

Multi Factor Authentication

To protect against unauthorised access.

Regular Backups

Regular Backups 

To maintain the availability of critical data.

What makes up the essential 8?

Firstly, these controls act as a baseline of defence and assist organisations in uplifting their security posture.

Implementing them in a proactive way is more cost effective than responding to large scale cyber security incidents in a reactive manner. For that reason, these controls are listed in a suggested implementation order, starting with Application Control and ending with Daily Back Ups

Application Control

Secure your IT Environment with application control / whitelisting

Patch Applications

All Cyber Security solutions include automated patching of Operating Systems, applications and firmware.

Configure MS Macro Settings

Stop the abuse of macro-based malware and payloads

User Application Hardening

Allow only specific applications to perform certain processes and executions and be opened.

Restrict Admin Privilege

Remove admin privileges from users in your environment. Remove local admin accounts

Patch Operating Systems

All Cyber Security solutions include automated patching of Operating Systems, applications and firmware.

Multifactor Authentication

Implement Multi-Factor authentication to prevent unauthorized access into your business systems

Regular Backups

Highly Resilient, Cloud-based secure backups for all systems supported

The perfect solution for all protection

Our flexible pricing plans

Standard Cloud Protect

Essential 8 Cyber Security Controls Maturity Level 1

$15

Per Device | Per Month ex GST

Required Systems

SaaS Cloud Backup (Mailbox only)

Endpoint Detection Response

24/7 Monitoring & Automated Patching

* Additional SaaS Mailboxes will be $4.00 exc gst per month 

Deluxe Cloud Protect

Essential 8 Cyber Security Controls Maturity Level 1

$20

Per Device | Per Month ex GST

Required Systems

Everything Included in the Standard Package 

DNS Filtering

* Additional SaaS Mailboxes will be $4.00 exc gst per month

Premium Cloud Protect

Essential 8 Cyber Security Controls Maturity Level 2

$40

Per Device | Per Month ex GST

Required Systems

Everything Included in the Deluxe Package 

Workstation Backup 

Software Audit

* Additional SaaS Mailboxes will be $4.00 exc gst per month

Ultra
Cloud Protect

Essential 8 Cyber Security Controls Maturity Level 3

$55

Per Device | Per Month ex GST

Required Systems

Everything Included in the Premium Package 

Monthly Security Check 

24/7 Monitored Security 

* Additional SaaS Mailboxes will be $4.00 exc gst per month

Server Cloud protect

$48

Per Device | Per Month ex GST

EDR Protection Software

RMM Patch Management 

Server Backup

  • Standard Cloud Protect
  • Deluxe Cloud Protect
  • Reccommended
    Premium Cloud Protect
  • Ultra Cloud Protect
  • Cloud Protect
Standard Cloud ProtectDeluxe Cloud Protect
Reccommended
Premium Cloud Protect
Ultra Cloud ProtectCloud Protect
$15
/month
$20
/month
$40
/month
$55
/month
$48
/month
Application Control
Patched Applications
Confiqure Microsoft Office Macro Settings
User Application Hardening
Restrict Administrative Priveleges
Patched Operating Systems
Multi-Factor Authentication
Data Backup Scans
Contact usContact usBuy NowBuy Now
Required System Enhancements
Required System Enhancements
$15
/month
$20
/month
$35
/month
$55
/month
$48
/month
DNS Filtering
Zero Trust Administration
SaaS Cloud Backup
SOC/SEIM - 24/7 Monitored Security Operations Centre
PIM/PAM - Privleged Access Management
Token / Key Biometric Access
Contact usContact usBuy NowBuy Now

Explore our services

We are here to help

One of our technicians will be with you shortly.