CYBER SECURITY SERVICES
Essential 8 managed services
The assurance of best practice security, supported by cyber experts
About the Essential 8
The Australian Cyber Security Centre (ACSC) developed a series of prioritised mitigation strategies to help organisations protect against cyber threats. The most effective of these strategies is the Essential 8.
Essential 8 mitigation strategies include:

Implement application control

Patch applications

Configure Microsoft Office macro settings

Harden user applications

Restrict administrative privileges

Patch operating systems

Use multi-factor authentication

Conduct regular backups
They are not a compliance requirement but a guide for best practices in security, and can be used to establish a security baseline and plan for improvement. This gives you assurance that you have in place the most important features and controls needed to protect your organisation.

Virtuelle – By your side at every stage of your cyber security journey
Virtuelle works with your key stakeholders to identify a target maturity level suited to your environment. We then progressively implement controls and improvements until your organisation reaches its target.
Our goal is to help you:
- minimise risk
- set the right foundations
- grow your business with confidence
Choose an Essential 8 managed services package that meets your needs
At Virtuelle, we know every organisation is different. This is why we offer a tiered approach to Essential 8 managed services, select the package that suits your requirements:
ACSC Essential 8 Compliance
Endpoint Detection & Response
Patch Management OS & Third Party Apps
Security Awarness Training
Incident Response Guidance
Email & Web Security
Cyber Security Strategy Guidance
Policy Guidance
Managed Detection & Response (MDR/SOC)
Log Analysis & Management (SIEM)
Data Loss Prevention (DLP)
Endpoint Encryption
Incident Response
Cyber Maturity Reporting
Web Vulnerability Scanning
Dark Web Monitoring
Developer
ESSENTIALS
Maturity Level 1
• Security Policy
4hrs
PREMIUM
STANDARD
Maturity Level 2
Cyber Security Strategy Guidance
• Security Policy
• Acceptable Use Policy
• Access Control Policy
• MDM Policy
• Remote Access Policy
8hrs
ENTERPRISE
ENTERPRISE
Maturity Level 3
Cyber Security Strategy Tracking & Roadmap
• Security Policy
• Acceptable Use Policy
• Access Control Policy
• MDM Policy
• Remote Access Policy
• Data Backup Policy
• Incident Response Management
• Document Asset management Policy
20hrs
5 domains
Looking to outsource more of your cyber security activities so your team can focus on driving your business forward?
We offer these optional add-ons to our Essential 8 managed services packages:
- Microsoft365 Hardening
- Public Cloud Security Hardening (Azure, AWS, Google)
- Penetration Testing
- PCI Compliance
- ISO Compliance
Why essential 8 managed services with Virtuelle?
Why essential 8 managed services with Virtuelle?

Assessment to identify your security posture

Set a baseline and maturity level for your organisation to achieve

Prioritised plan and steps to address relevant threats

Identify mission critical assets and what needs protecting

Maximise your ROI across prevention and response

Expert remediation advice

Up-to-the-minute guidance so you’re always following best practice

Risk-based approach for cost effective and intelligent use of your security budget
Virtuelle Cyber security services
Virtuelle Cyber security services

Cyber security Strategy
Understand your security posture, identify gaps, and develop a proactive cyber security roadmap.

Governance, Risk and Compliance
Cyber Security Awareness Training
Establish an organisation-wide understanding of phishing, ransomware and business email compromise.
