It is designed to assess a client’s cybersecurity posture and reduce their exposure to risks using advanced Microsoft tools, such as Microsoft Defender Vulnerability Management, Secure Score, and Microsoft Purview for information protection. This process, which requires approximately 1.5 days of work from the partner, is conducted in the client’s production environment. It includes evaluating the current level of cybersecurity maturity, identifying and addressing vulnerabilities in clients and servers, and assessing risks related to data security and internal threats. At the end of the analysis, recommendations and guidelines are provided to enhance the cybersecurity posture and mitigate the identified risks.
For the Cybersecurity Assessment Engagement to be considered complete, a partner is required to deliver the following activities:
1. Analyze the customers’ production environment and their current cybersecurity maturity level based on v8 of the CIS Critical Security Controls.
2. A vulnerability assessment using:
3. A data security assessment using:
4. An optional Cloud Application discovery using Microsoft Defender for Cloud
5. Provide recommendations and next steps:
The Threat Protection Engagement is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products, including but not limited to Microsoft Defender XDR and Microsoft Sentinel. The Engagement is expected to require about a three-day partner effort.
Threat Protection Engagement is delivered in a customer’s production environment by discovering real security threats and vulnerabilities.
For the Threat Protection Engagement to be considered complete, a partner is required to deliver the following activities:
1. Identify customer’s key security objectives & priorities.
2. Conduct discovery of threats and vulnerabilities in customer’s production environment.
3. Use customer’s existing licenses or product trials of the engagement products to perform discovery and exploration of threats and vulnerabilities in customer’s production environment.
4. The Threat Protection Engagement includes following mandatory modules:
5. The Threat Protection Engagement includes following selectable modules where at least three (3) must be completed:
6. Provide recommendations and next steps.
It is designed to help current Intune customers test advanced endpoint management and security solutions in their production environment. As technology evolves and employees work both in the office and remotely, challenges arise in endpoint security and management, as well as cost management.
The Intune Suite offers an integrated experience that simplifies endpoint management by combining advanced data and device protection solutions, all at a lower total cost of ownership. This is achieved by consolidating endpoint management and security vendors, thereby optimizing performance across all devices.
The pilot allows customers to experience how these advanced solutions can streamline management, enhance security, and improve user satisfaction, helping to maintain workforce productivity.
Discover if your organization is eligible for our exclusive Microsoft-sponsored programs!
If you would like to verify your eligibility for these programs, please provide us with the following information:
©2020 Synergy Advisors LLC. ALL RIGHTS RESERVED.