Mission Critical: Enabling Powertech to Secure Defence-Grade Clients
Background
Powertech is an engineering and technical services company with deep roots in electrical systems. Established in 1998, the company now employs over 300 specialists across Australia and Southeast Asia. Their projects span mining, oil and gas, renewables, infrastructure, and defence.
After recognising gaps with their previous managed service provider (MSP), Powertech sought a strategic ICT partner capable of elevating their technology environment to support their evolving operational and compliance demands.
Powertech was drawn to Austin Technology’s client-first approach and demonstrated expertise in ICT infrastructure, cyber security, compliance, and IT governance. The partnership was formed to align Powertech’s ICT with best practices and support ongoing growth and defence-readiness.
Challenges
Powertech was working within a legacy IT environment that lacked alignment with modern compliance frameworks and cyber security standards. These limitations affected their ability to meet client requirements and created challenges in visibility, control, and policy enforcement.
Previous attempts with other MSPs failed to address these gaps effectively, leaving Powertech without a viable pathway forward.
Solution
Austin Technology proposed a security-focused transformation strategy, tailored to the specific needs of an engineering firm operating in regulated industries. Key components included:
- Alignment with the ACSC Essential 8 framework, Maturity Level 2.
- Progress towards the Defence Industry Security Program (DISP).
- Progress towards ISO 27001 certification.
Best-of-breed technologies were deployed through the custom Austin Security Shield program, including:
- ThreatLocker
- Huntress
- Microsoft conditional access
- BitLocker
- Security awareness training
Supporting documentation such as acceptable use policies and user guidelines was also developed to embed governance at a practical level.
Project Implementation
The engagement began with a full ICT audit, infrastructure assessment, and stakeholder interviews to understand Powertech’s operating model and compliance goals. Solutions were piloted with select users before full deployment, ensuring minimal disruption.
Throughout the rollout, communication was prioritised with regular updates, feedback sessions, and stakeholder briefings. This approach helped maintain alignment and fostered internal buy-in.
Results
Post-implementation, Powertech achieved marked improvements in Microsoft 365 Secure Score and overall device-level security. The environment became more secure, streamlined, and compliance-ready.
A marked achievement was that the enhanced cyber security posture enabled Powertech to meet the security requirements of a potential new client. Upon submission of supporting documentation and technical evidence, Powertech was approved to commence work with the client, validating the success of the ICT transformation.
Key Success Factors
- Enabled Powertech to secure a new client through compliance validation.
- Significantly enhanced Powertech’s Microsoft 365 Secure Score.
- Strengthened endpoint protection across the organisation with modern security tools.
- Achieved alignment with ASD Essential Eight Maturity Level 2.
- Delivered an agile, security-focused private cloud migration from AWS.
- Established governance through enforceable ICT policies and user guidelines.
- Improved visibility and control across Powertech’s IT environment.
- Empowered staff with increased cyber security awareness.
- Created a future-ready IT architecture designed for scalability and compliance.
- Developed a trusted, ongoing partnership model with regular strategic check-ins.
Future
Austin Technology continues to support Powertech with weekly engagements, ensuring ongoing alignment with best practice security standards. The partnership is built on proactive collaboration, transparency, and a shared commitment to operational excellence.
Future initiatives include progressing toward ISO 27001 certification and fine-tuning ICT policies to remain adaptive to changing compliance landscapes.