fbpx

Cybersecurity Assessment 

It is designed to assess a client’s cybersecurity posture and reduce their exposure to risks using advanced Microsoft tools, such as Microsoft Defender Vulnerability Management, Secure Score, and Microsoft Purview for information protection. This process, which requires approximately 1.5 days of work from the partner, is conducted in the client’s production environment. It includes evaluating the current level of cybersecurity maturity, identifying and addressing vulnerabilities in clients and servers, and assessing risks related to data security and internal threats. At the end of the analysis, recommendations and guidelines are provided to enhance the cybersecurity posture and mitigate the identified risks. 

For the Cybersecurity Assessment Engagement to be considered complete, a partner is required to deliver the following activities: 

1. Analyze the customers’ production environment and their current cybersecurity maturity level based on v8 of the CIS Critical Security Controls. 

  • For the assessment tools to work properly and for POE approval, customer must have 500-5000 active Windows devices. * 

2. A vulnerability assessment using: 

  • Microsoft Defender Vulnerability Management 
  • Microsoft Secure Score 

3. A data security assessment using: 

  • Microsoft Purview Information Protection Content Explorer 
  • Microsoft Purview Insider Risk Management Analytics  

4. An optional Cloud Application discovery using Microsoft Defender for Cloud 

5. Provide recommendations and next steps: 

  • Map the engagement findings to common threat scenarios, allowing the customer to see their cybersecurity maturity in relation to common cybersecurity threats. 

Threat Protection

The Threat Protection Engagement is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products, including but not limited to Microsoft Defender XDR and Microsoft Sentinel. The Engagement is expected to require about a three-day partner effort. 

Threat Protection Engagement is delivered in a customer’s production environment by discovering real security threats and vulnerabilities. 

For the Threat Protection Engagement to be considered complete, a partner is required to deliver the following activities: 

1. Identify customer’s key security objectives & priorities. 

2. Conduct discovery of threats and vulnerabilities in customer’s production environment. 

3. Use customer’s existing licenses or product trials of the engagement products to perform discovery and exploration of threats and vulnerabilities in customer’s production environment. 

4. The Threat Protection Engagement includes following mandatory modules: 

  • Microsoft Defender Portal – (Microsoft Defender XDR) 
  • Cloud Identity Protection – (Entra ID Protection, Entra Conditional Access) 

5. The Threat Protection Engagement includes following selectable modules where at least three (3) must be completed: 

  • Unified SecOps Platform – (Microsoft Sentinel) 
  • Email Protection – (Microsoft Defender for Office 365) 
  • Endpoint and Cloud Apps Protection – (Microsoft Defender for Endpoint, Microsoft Defender Vulnerability Management, Microsoft Defender for Cloud Apps) 
  • Microsoft Copilot for Security Demonstration 

6. Provide recommendations and next steps. 

Microsoft Intune Suite Piloten

It is designed to help current Intune customers test advanced endpoint management and security solutions in their production environment. As technology evolves and employees work both in the office and remotely, challenges arise in endpoint security and management, as well as cost management. 

The Intune Suite offers an integrated experience that simplifies endpoint management by combining advanced data and device protection solutions, all at a lower total cost of ownership. This is achieved by consolidating endpoint management and security vendors, thereby optimizing performance across all devices. 

The pilot allows customers to experience how these advanced solutions can streamline management, enhance security, and improve user satisfaction, helping to maintain workforce productivity. 

  • Present how the Intune Suite’s advanced solutions enable your customer to reduce their total cost of ownership by eliminating the need for multiple point solutions and expensive integration projects. 
  • Understand a customer’s endpoint management and security challenges, goals and objectives. 
  • Present the Intune Suite advanced solutions and make design decisions for the pilot based on customer needs. 
  • Pilot selected Intune Suite solutions in the customer’s production environment, focusing on simplified IT management, enhanced security and exceptional user experiences for a selected group of users. 

Discover if your organization is eligible for our exclusive Microsoft-sponsored programs!
If you would like to verify your eligibility for these programs, please provide us with the following information:

piezas_rompecabezas