Just a moment, logging you in...
Solution for organizations wanting to improve their overall security posture by implementing key security features for protecting user identity, devices, and data.
Softchoice's (ZTWS) Zero Trust Workplace Solution allows IT security resources to enable a Zero Trust environment utilizing Microsoft based security solutions. This engagement delivers Zero Trust design and implementation services delivered by certified security and Zero Trust leaders within Softchoice utilizing Microsoft’s Zero Trust Methodology and toolset to ensure enablement of proper Zero Trust enablement of workplace Zero Trust pillars.
Discovery and Design • Discovery & validation of current security posture and utilization of Microsoft Security tools in production • Azure landscape review to ensure proper security measures are in place for cloud resources • Review of clients current Microsoft Licensing Capabilities and access to Microsoft 365 Security workloads • Workshops detailing out Microsoft 365 Security licensing and features to ensure proper customer alignment with Zero Trust • Azure Identity Protection • Defender for Cloud Apps • Azure Information Protection • DLP Policies and labeling • Microsoft Endpoint Manager • Defender for Workstations • Development of a design document outlining the deployment of Microsoft 365 Security Workloads
Implementation • Deployment of the Microsoft 365 Zero Trust design specified within the design document • Review with client staff to ensure proper functionality of Microsoft 365 Security workloads • Deployment of user based security features within Microsoft 365 • Completion of and As-Configured document to ensure configuration is utilizing Microsoft 365 Security tools effectively
Testing and Knowledge Transfer • Training and testing of Microsoft 365 Security collateral • Review of all security threshold with client teams • Final sign off and approval of Microsoft 365 Security Workflows within the infrastructure
These deliverables will be tailored to align to your specific technical requirements and Microsoft 365 Security use case objectives.
Terms, conditions, and pricing are custom to each engagement. Please contact us to discuss a solution to meet your business needs. Offer availability may be limited in some countries.