Fully Managed Essential Eight
Empower your organisation with Approved Systems’ comprehensive Essential Eight framework.
We take care of the technical heavy lifting—allow‑listing, patching, hardening, privileged access management and more—so you can focus on running your business securely and efficiently.
Essential Eight Controls
Add‑Ons & ISM Coverage
Pricing Tier
Essential
$45 per user/month
- Essential Eight compliance
- ThreatLocker allow‑listing
- Patch management
- Remote support
Professional
$75 per user/month
- Everything in Essential
- Advanced monitoring & SIEM
- Identity & access management
- Quarterly security reviews
Enterprise
POA
- Custom security posture
- Dedicated account management
- On‑site services & projects
- Unlimited support hours
Frequently Asked Questions
What is the Essential Eight?
The Essential Eight is the Australian Cyber Security Centre’s prioritised list of mitigation strategies designed to protect businesses from common cyber threats. It covers areas such as application control, patching, macro security and more.
How quickly can we implement the framework?
Implementation time varies depending on the size and maturity of your environment, but most SMEs reach Maturity Level 3 compliance within 4–6 weeks with our structured onboarding.
Do you provide on‑site support?
Yes. While most issues are resolved remotely, our Canberra‑based team can provide on‑site support for projects, installations and critical incidents.
How do backups work?
We start by protecting your data with daily automated backups to secure Australian-based cloud storage that meets data sovereignty and regulatory requirements. Your data is encrypted in transit and at rest, and stored in an isolated backup vault that cannot be tampered with, even in a ransomware attack. This provides reliable offsite protection and ensures your business can still recover even if your local systems are lost or compromised.
For businesses that need higher resilience, we offer upgrade paths. The first option adds local backup with Business Continuity and Disaster Recovery (BCDR) capability — this means if a server fails, we can boot a virtual copy of it locally and keep you working within minutes. The second option adds offsite disaster recovery with the ability to spin up your entire network in a secure cloud environment if your site becomes unavailable (fire, flood, cyberattack, etc). This creates a stand-up cloud network, allowing your team to continue operating remotely while your primary systems are restored.
