PowerProtect is an engagement lead solution that helps you understand, implement, and monitor your security posture for Cloud, hybrid or on-premise environments.
It includes a documented review of your current security posture and prioritised, sometimes emergency, recommendations that will immediately improve your security posture when implemented.
At this stage, we’ll undertake a comprehensive security design approach aligned to your organisation, including reviews and implementations such as;
Conditional Access Policies (CAP) – Helping you lock down the basics and enforce contributory security measures such as Multi-Factor Authentication (MFA), BitLocker and total Antivirus (AV) coverage before allowing anyone access to your tenant
Azure Policies – implement and measure your organisation constantly against predefined or custom policies; this would include common frameworks such as NIST, CIS and ISO27001
Azure Identity Protection (AIP) – Ensure your identities are secured, and dependent on your license scenario, enable additional functionality such as risky user monitoring
Azure Information Protection (Unified Labelling) – ensuring all the content held by your business is correctly labelled
Privileged Identity Management (PIM) &ndashl; RBAC controls to ensure only the correct levels of people have access at the right time and only when authorised
Data Loss Prevention (DLP) – Ensuring that your business content is tracked and that nothing leaves your business without consent
Windows Defender – Full setup and configuration of the Enterprise antivirus variant
Endpoint protection – Setup, control, imaging and packaging for specific devices alongside control over those devices in the modern workplace
Azure Sentinel – Full setup and implementation of Microsoft’s leading SIEM solution
The above solutions and functions are discussed, assessed, and prioritised based on your organisation’s security appetite and current licensing model.
Where required, Sundown can extend the above Microsoft capabilities with our SQL Firewall and Patented encryption products. Particularly relevant for business sectors that need to meet rigorous regulation and compliance standards requiring additional risk mitigation.