Managed Detection and Response

To minimise cyber security risk, being able to rapidly identify and respond to attacks is essential. We supply the people, technology and cyber intelligence required to hunt for specific threats across your organisation’s networks and endpoint devices to ensure they are configured properly.

We can provide ongoing monitoring and management of your threat detection.

MDR versus ISP

Many businesses enlist the help of an Internet Service Provider (ISP), however they find that the company provides little value beyond IT management, does not adapt quickly enough to the evolving cyber threat landscape that impacts the network, and is too slow to protect the business.

PDSS is a Managed Detection and Response (MDR) provider that, through an outcome-focused approach, delivers the actionable insight organisations need to proactively detect current and emerging cyber threats and respond rapidly to incidents.

Assessment services

PDSS’ cyber security assessment services are designed to uncover vulnerabilities across your organisation, validate the effectiveness of security controls and processes in place, and provide the support and advice required to address security risks.


Businesses have to work within a heavily regulated landscape and are under pressure to meet increasingly complex compliance requirements.

Operating in a competitive tender environment for bank, government and other large businesses, we guide you to stand out against the rest.

We work with you to meet your responsibilities and to demonstrate that you are taking action to protect your business, customers, stakeholders and partners in an increasing hostile cyber security environment.

PDSS understand the need to meet multiple standards are able to map and create an integrated system for your business s\o that you do not have multiple systems to manage. Integrations include:


To support General Data Protection Regulation (GDPR) and Australian Privacy Principles (APP) compliance, PDSS’ cyber security solutions help organisations to safeguard personal data by identifying vulnerabilities, proactively monitoring threats and facilitating a swift response to incidents.

ISO 27001

Learn how PDSS’ penetration testing advice and incident management services can help you to improve your information security to ISO 27001 standards.


We reduce the cost and complexity of meeting the lengthy list of requirements that affect any organisation needing to process, transmit or store credit and debit card payment information. We can show you ways to use 3rd parties to reduce your risk.

Other Regulations that may affect your industry.

Banking and FinanceAPRA CPG 235 /CPS 235 and CPG 234 / CPS 234, relevant sub sections of each section
RGI04 of AFSL license obligation (RG 104.93 and RG 104.96). Additionally, recommended to follow ISO 2700 l/2 and COBIT 5.
Federal GovernmentAustralian Government Protective Security Policy Framework (PSPF) and Information Security Manual (ISM)
Healthcare ProvidersRoyal Australian College of General Practitioners (RACGP) Computer and Information Security Standards, National Health and Medical Research Council’s “The regulation of health information privacy in Australia”. Additionally, recommended to follow ISO 27001/2 and COBIT 5.
Internet Service ProvidersCommunications and Media Authority’s “Australian Internet Security Initiative” (ACMA, 2015), Telecommunications Providers
(Interception) and Listening Device Amendment Act.
Additionally, recommended to follow ISO 27001/2. and COBIT 5.
MiningNone. Recommended to follow ISO 27001/2, ISO 27019 and COBIT 5
RetailersNone. Recommended to follow ISO 27001/2 and COBIT 5
State GovernmentVictorian Protective Data Security Framework (VPDS). Where Victorian organisations handle information of national interest, the Protective Security Policy Framework (PSPF) requirements remain mandatory and supersede any obligations set out in the VPDSF.
Telecommunications (Interception) and Listening Device Amendment Act, Australian Communications and Media Authority’s “Australian Internet Security Initiative” (ACMA, 2015). Additionally, recommended to follow ISO 2700112, and COBIT 5.
Utilities CompaniesNone. Recommended to follow ISO 27001/2, ISO 27019 COBIT 5, and NERC-CIP V5