IronSights
All insights

security awareness

How IronSights Fortify Differs From Other Managed Security Service Plans

The Australian managed security market has filled with subscription services that look similar on paper. Fortify is built differently — assessment-led, Microsoft-first, governance-aware, and structured around your Essential Eight maturity rather than a fixed product stack.

By Ryan Balloot, Managing Director4 November 20254 min read

The Australian managed security service market has expanded rapidly. Most offerings now read similarly on a proposal: 24/7 monitoring, EDR deployment, threat intelligence, incident response, monthly reporting. The difficulty is not finding a provider — it is identifying which providers actually deliver what their proposals describe. Fortify was built deliberately differently. The differences matter most after the contract is signed.

Fortify Is Assessment-Led, Not Product-Led

Most managed security plans start with a fixed product stack. The provider installs the same tools at every client, configures them to a standard baseline, and bills monthly. Fortify starts with a structured assessment of your environment against the Essential Eight Maturity Model. The remediation plan, the controls deployed, and the priorities pursued are calibrated to your actual gaps — not to what the provider already deploys at every other client.

The practical difference: a Fortify engagement at one client might focus heavily on identity and access controls because that is where the gaps are. At another client, application control and patching maturity might be the focus. The same monthly fee delivers different work, because the work is determined by what actually reduces risk in your environment.

Microsoft-First, Not Microsoft-Only

Most Australian SMBs are running Microsoft 365. The security capability built into Microsoft's stack — Entra ID, Conditional Access, Defender for Business, Intune, Purview — addresses the majority of what most businesses need. Fortify is built around making that stack work properly rather than layering third-party products on top of it. This keeps the cost contained, reduces tool sprawl, and means the controls being deployed are ones your IT team can also understand and maintain.

Where third-party tools genuinely add value — independent backup for Microsoft 365 data, specialist email security in high-risk sectors, network segmentation hardware — they are added deliberately. They are not added by default to inflate the monthly fee.

Governance-Aware, Not Just Technical

Most managed security services produce technical reports — alert counts, patching statistics, vulnerability findings. These reports are useful to a CIO but unintelligible to a board. Fortify reporting is structured for the audience that actually makes investment decisions: maturity progress against the Essential Eight, material incidents and what they revealed, the threat environment relevant to your sector, and the planned work for the next quarter with its expected risk reduction. The intent is reporting that informs governance, not reporting that fills a page.

A Clear Pricing Logic

Fortify pricing is based on the size and complexity of your environment, not on the number of products deployed. There is no incentive within the engagement model to add tools you do not need. Where additional licensing — Microsoft 365 Business Premium, a backup tool, an EDR upgrade — is genuinely required to address an identified gap, the cost is transparent and the rationale is documented.

The Accountability Structure

Each Fortify client has a named principal account contact at IronSights. The person who explains the assessment, presents the quarterly review, and is responsible if something goes wrong is the same person from quarter to quarter. The day-to-day technical work happens within a team, but the accountability does not move. This is deliberately different from the model where senior staff sell the engagement and junior staff manage it.

When Fortify Is the Right Fit

Fortify suits Australian businesses that want their security program to be calibrated to their actual risk profile rather than a vendor template, that already run Microsoft 365 as their primary environment, that are facing client, insurer, or procurement questions about Essential Eight or cyber maturity, and that want a partner who is accountable for outcomes rather than reactive to tickets.

When Fortify Is Not the Right Fit

We are not the cheapest option in the Australian market. Businesses optimising primarily for lowest monthly fee will find lower-cost providers. We do not deploy tools we do not believe are warranted, which means we will not match proposals offering a long list of products at an unrealistic price point. And we are selective about engagements — clients we cannot serve well, we do not take on.

How does a Fortify engagement start?

With a structured initial assessment — a review of your current environment, your business context, and the security expectations you are facing. The output is a clear picture of where you sit against the Essential Eight, what the priority remediation activities are, and a proposed Fortify engagement scope and price calibrated to that picture. The assessment is a paid engagement but the value stands alone — even if you choose not to proceed with Fortify, you leave with a credible roadmap.

Can we talk to existing Fortify clients?

Yes. We are happy to arrange reference conversations with current clients in comparable situations. We prefer to do this once we have a clear picture of your environment, so the references we provide are relevant to what you actually need to understand.

Keep reading

More from the IronSights team.