An End to End Support Solution To Optimise Your
Operations, Reduce Cost and Manage Risk
Chamonix Managed Services provides access to a highly skilled team to provide your platform with the support it needs in a robust, scalable, and relevant IT support solution with expertise in Essential Eight, Environment, Application and Integration as a Service and Intelligent Automation.
The Essential Eight Maturity Model was developed to help organisations mitigate potential cyber security incidents. The Essential Eight provides a roadmap for organisations seeking to reduce their cyber security attack surface by detailing a minimum standard of mitigations organisations can put in place to reduce the risk of a cyber-attacks and to minimise the exposure in the event a cyber attack does occur.
Cyber attacks can impact an organisation in many ways including:
The Australian Cyber Security Centre recommends all organisations target Maturity Level Three. The varying levels give organisations a pathway enabling them to achieve a recognised level of compliance on their journey to Level Three.
Application Control or whitelisting is the practice of specifying a list of approved software applications that are permitted to be present and active on a computer system. Whitelisting is designed to protect computers and networks from potentially harmful applications.
Application Control or whitelisting is the practice of specifying a list of approved software applications that are permitted to be present and active on a computer system. Whitelisting is designed to protect computers and networks from potentially harmful applications.
Most common threats use known vulnerabilities in applications, using a robust application patching strategy mitigates these risks. End of life applications (those not receiving vendor support) should be updated or replaced with supported applications
Most common threats use known vulnerabilities in applications, using a robust application patching strategy mitigates these risks. End of life applications (those not receiving vendor support) should be updated or replaced with supported applications
Macros allow users to group together multiple commands into a single action to complete tasks automatically. While this can be a convenient way automatically complete tasks, they are also used to execute malicious code. Strict controls should be applied to control how macros execute
Macros allow users to group together multiple commands into a single action to complete tasks automatically. While this can be a convenient way automatically complete tasks, they are also used to execute malicious code. Strict controls should be applied to control how macros execute
Web browsers are hardened against common intrusions such as ads, unmanaged extensions, and flash content. Microsoft Office is hardened against intrusion from plugins, objects and embedded packages.
Web browsers are hardened against common intrusions such as ads, unmanaged extensions, and flash content. Microsoft Office is hardened against intrusion from plugins, objects and embedded packages.
Ensuring the principal of least privilege is applied. Administrative access is limited to only those users who require it. Administrative credentials are only used when performing administrative functions and have additional controls in place to prevent the exposure of administrative accounts to common attack vectors such as email and web browsing.
Ensuring the principal of least privilege is applied. Administrative access is limited to only those users who require it. Administrative credentials are only used when performing administrative functions and have additional controls in place to prevent the exposure of administrative accounts to common attack vectors such as email and web browsing.
Operating systems patching must be implemented to ensure identified security vulnerabilities are not left open for exploitation. End of life operating systems must be updated or replaced with vendor supported alternatives
Operating systems patching must be implemented to ensure identified security vulnerabilities are not left open for exploitation. End of life operating systems must be updated or replaced with vendor supported alternatives
Operating systems patching must be implemenaMulti-factor Authentication (MFA) provides an additional layer of security protecting your accounts from being compromised with the use of two (or more) authentication methods. Examples of MFA include biometrics, software, and hardware tokens – when used in combination with a password.ted to ensure identified security vulnerabilities are not left open for exploitation. End of life operating systems must be updated or replaced with vendor supported alternatives
Ensuring important information is backed up in a secured manner and for a sufficient period with a high enough frequency to minimise the risk of permanent data loss. Restoration processes must be in place and tested regularly to ensure data restoration is reliable.
Ensuring important information is backed up in a secured manner and for a sufficient period with a high enough frequency to minimise the risk of permanent data loss. Restoration processes must be in place and tested regularly to ensure data restoration is reliable.
Chamonix Managed Services works with organisations to:
Chamonix specialises in the implementation of technical security controls. We work closely with security advisors to assist in the development of the statement of applicability. We then work with security advisors and auditors as we design, implement, test and audit the technical controls required to meet the statement of applicability.
As ACSC (Australian Cyber Security Council) Partners, we have a track record of implementing and maintaining secured environments, providing implementation of technical controls to improve security posture and achieve compliance with a number of security standards.
Our services are designed to work across various maturity levels and we commonly work with the following frameworks and programs:
ACSC Essential Eight
IRAP – Information Security Registered Assessors Program
DISP – Defence Industry Security Program
SACSF – South Australian Cyber Security Framework (formerly ISMF)
CIS Benchmark – Centre for Internet Security
ACSC ISM – Information Security Manual
Australian Digital Transformation Agency (ADTA) Blueprint
In the table provided we have listed some of the more common systems and services we work with.
For organisations looking to transition to a modern mobile way of working, our Environment as a Service offering provides a highly responsive solution that enables mobile workforces whilst maintaining a high level of security. Our team has deep experience in implementing and migrating environments, working with organisations of all sizes. We apply a strong security focus in delivering high quality, modern outcomes for our customers.
Our services include:
Cloud Migration
Management of On-Prem and Hybrid environments
Management of cloud-based environments
End user device management
IT Service Desk (Incidents, Problems, Changes, Service Requests)
Architectural advice
In the table provided we have listed some of the more larger number of systems and services we work with
For organisations looking to maximise value and increase employee satisfaction whilst reducing reliance of heavily manual processes, our RPA as a Service offering provides a solution to generate value quickly and cost effectively. We work with businesses to identify repetitive tasks that could be automated, analyse processes, design and implement RPA based automation solutions and manage and maintain RPA processes.
Chamonix delivers Robotic Process Automation using two primary platforms:
Automation Anywhere
UI Path
For organisations needing assistance creating or supporting integrations, our Integration Management and Enhancement as a Service offering ensures they remained aligned to the changing needs of the business. Our team can provide guaranteed availability of skilled personnel to support integrations on a basis to suit requirements.
Our services include:
Management and monitoring
Maintenance
Service Desk (Incidents, Programs, Changes, Service Requests)
Enhancements
Chamonix supports the following integration platforms:
Azure Integration Services
BizTalk
WSO2
AWS Application Integration
WebMethods
Designed for organisations needing access to a development capability, our Application Management and Enhancement as a Service offering provides both support and enhancement services. From smaller requirements through to larger, more complex projects, we assist customers in keeping application and platform functionality aligned to evolving needs.
Our services cover:
Scope, Design and Build solutions
Leveraging existing platforms or build custom solutions
Management of applications and platforms
Health Checks and architectural reviews
Enhancements
Security assessments
The Managed Services application team is capable of supporting a wide variety of applications and platforms. We have listed our most common platform and technical stacks.