Cloud Control – Security
Security in and through the cloud
What do we protect?
At the center of the Modern Workplace and Azure datacenter services are Identities. These are protected with inbuilt capabilities like Identity Protection and Conditional Access.
Azure itself is secured through Azure Security Center, Azure Firewall and a variety of security solutions within the features.
In the Modern Workplace, we additionally secure the endpoints through Defender ATP and Intune and keep data safe with Unified Labeling, DLP and Cloud App Security.
To make the data centrally available to us, we use both Azure Sentinel and the MS Security Graph API to create an interface to our SOC where you environment is monitored by both intelligent automated systems and the watchful eye of our analysts, 24×7.
How do we keep you secure?
At the start of our journey together, we’ll perform an assessment of your current security posture, after which we’ll jointly develop a roadmap of what features and solutions need optimization or need to be implemented.
2. Protect – Detect – Respond
After the roadmap has been defined, we’ll implement and optimize your environment within a period of approximately 3 months. For this we use a variety of baseline policies which we have developed in-house and combine them with specific configuration parameters –unique to your environment. By investing heavily in the protection of your environment, we minimize the attack surface as much as possible. After all, it’s better to prevent than to remediate!
Once all optimizations have been implemented, our Cloud Control service will continuously keep an eye on your environment. We leverage a variety of techniques, both manual and through automated detection systems and will respond adequately if there is an alert which needs further investigation.
In parallel to the Protect-Detect-Respond process, we’ll continuously monitor and review the configuration of your environment and use insights from our Cloud Control center as well as improvements in Microsoft’s services and solution to revisit the existing configuration of your environment.
In this phase, we’ll make changes to your configuration after which the entire continous service improvement process starts over again all the while the protect-detect-respond process runs independently.
Want to be more secure?
Michael Van Horenbeeck
Managing Partner & Solution Lead Security Services