https://store-images.s-microsoft.com/image/apps.1845.e246e3b3-2038-428b-818b-c4ae320964b8.4b2fbc55-e382-4756-8a93-37de3fb49fce.85f299bf-b29b-45e5-b8c0-1f03980fc1af

Cyber Security Services 9 days Assessment

Alfa Connections Pte Ltd

Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.

Cyber Security Assessment Service is an automated security assessment that provides insights into an organizations security vulnerabilities. It collects relevant data from Endpoint, Office 365, Network Devices, Active Directory & Azure AD • Provide an analysis of customer’s cybersecurity maturity status. • Assessment of cybersecurity-related policies and procedures. • Help to create a cybersecurity roadmap to better protect customer’s IT assets. • Final report with analysis of current cybersecurity status. • Recommendations based on facts. • Cybersecurity improvement with an action plan. • Cybersecurity maturity is based on CIS controls framework and Microsoft security SOM Model The CIS Controls Topics | Advised Products are mentioned below:

  1. Inventory and Control of Hardware Assets | Microsoft Endpoint Manager, Network discovery solution
  2. Inventory and Control of Software Assets | Software Asset Management [SAM] tooling; Microsoft Endpoint Manager; Microsoft Cloud App Security; Defender for Endpoint
  3. Continuous Vulnerability Management | Microsoft Endpoint Manager, Windows Server Update Services (WSUS), Azure Security Center, Azure Sentinel, Azure AD Identity Protection
  4. Controlled Use of Administrative Privileges | Azure AD Privileged Identity Management (PIM), Privileged Access Management (PAM), Azure AD Multi-Factor Authentication (MFA), Azure AD Conditional Access
  5. Secure Configuration for Hardware and Software on Mobiles Devices, Laptops, Workstations and Servers | Microsoft Endpoint Manager; Defender for Endpoint; Azure Security Center; Microsoft Cloud App Security
  6. Email and Web Browser Protections | Exchange Online Protection; Microsoft Defender for Office 365.
  7. Malware Defenses | Microsoft Cloud App Security, Defender for Endpoints
  8. Data Recovery Capabilities | Azure Back-up and Site Recovery
  9. Secure Configuration for Network Devices, such as Firewalls, Routers and Switches | Network Device Management Solution
  10. Boundary Defense | Azure DDoS Protection
  11. Data Protection | Azure Information Protection Scanner; Data Loss Prevention; Microsoft 365 Advanced Data Governance; Microsoft Information Protection; Azure SQL Data Discovery & Classification
  12. Controlled Access Based on the Need to know | Azure AD, PortalTalk 365
  13. Account Monitoring and Control (OP, Azure, Microsoft 365) | Azure AD Multi-Factor Authentication (MFA), Azure AD Conditional Access, Azure Identity Protection, Azure AD Password Protection
  14. Application Software Security | Microsoft Endpoint Manager
  15. Incident Response and Management | Microsoft 365 Advanced Compliance: Advanced eDiscovery
  16. Penetration Tests and Red Team Exercises | Microsoft Endpoint Manager; Defender for Endpoint; Azure Security Center AD.1. IT Governance | Azure AD Identity Governance; Microsoft Compliance Manager AD.2. Data Governance | Azure Information Protection Scanner , Data Loss Prevention, Azure Information Protection P2, Azure AD Identity Governance AD.3. Risk Management | Microsoft Compliance Manager .

At a glance

https://store-images.s-microsoft.com/image/apps.58959.e246e3b3-2038-428b-818b-c4ae320964b8.7a023d35-3fb1-411a-a85c-ba35a58f88e0.0fc998e3-17b4-4803-8d0c-d1e443e7b89e
https://store-images.s-microsoft.com/image/apps.64876.e246e3b3-2038-428b-818b-c4ae320964b8.7a023d35-3fb1-411a-a85c-ba35a58f88e0.9fded251-ced7-4ab7-8a16-d55bd344dd30
https://store-images.s-microsoft.com/image/apps.40071.e246e3b3-2038-428b-818b-c4ae320964b8.7a023d35-3fb1-411a-a85c-ba35a58f88e0.72fb8a29-536c-44a5-884b-558b13f21769