https://store-images.s-microsoft.com/image/apps.8375.d2697755-a283-49b0-8a8d-d2561a4a8cf8.9ecb47df-3b49-4842-b337-debd84d2e854.b08ec6cd-4095-4d44-a3a9-5727563fee3f

Data Protection Program & Strategy Design - 12 Wk Implementation

Protiviti

End-to-End Data Protection to Identify, Classify, Protect and Optimize Your Data in Microsoft 365

The objective of this engagement is to Identify the data your organization stores and handles, classify your data based on sensitivity, protect your data throughout its lifecycle and across platforms and optimize the effectiveness of controls protecting the data within your Microsoft 365 environment.

Program Readiness Assessment (Identify)

  1. Data Protection Program Assessment: Cross-functional program alignment and Implementation roadmap for recommendations and quick-win improvement opportunities
  2. Data Protection Tool Assessment: Technology and Licensing optimization strategy
  3. Data Discovery : Preliminary inventory of data landscape and Identify unprotected sensitive data in Microsoft 365

Strategy and Deployment Roadmap (Classify)

  1. Data Identification: Business alignment with data protection capabilities
  2. Enforcement Controls: Risk-based data protection mechanisms
  3. Reporting & Metrics: Defined success metrics and Concise, relevant reporting by stakeholder
  4. Sprint Backlog: Defined methodology to prioritize activities

Microsoft Deployment and Optimization (Protect)

  1. Data Inventory: Preliminary data protection use cases and Protection rules aligned with business objectives
  2. Classification Schema: Organization-wide data classification schema
  3. Microsoft Deployment Plan: Structured technology rollout plan in Microsoft 365

Managed Services (Optimize)

  1. Sustainable Data Governance in Microsoft 365: End-to-end program management
  2. Ongoing Data Discovery: Consistently updated data landscape
  3. DLP Alert Management: Managed data loss risk, Automated triage and workflow and Cost-effective personnel scaling
  4. Insider Risk Management: Ongoing threat management

Output:

  1. Data Protection & Technology Maturity Methodology
  2. Data Protection Tool Coverage Heatmap
  3. Microsoft Purview Deployment Coverage
  4. Automated Purview Scanning
  5. Data Landscape Power BI Dashboards
  6. Data Loss Prevention Use Case Library
  7. Documented Considerations for Enforcement
  8. Sensitive Data Identification Use Case Library
  9. Data Classification & Handling Policy Templates
  10. Microsoft Purview Deployment Pans
  11. Defined Key Performance Indicators
  12. Training and Awareness Documentation
  13. Data Governance Documentation Templates

Pricing and timing can vary depending on size of Microsoft 365 environment and volume of data.

At a glance

https://store-images.s-microsoft.com/image/apps.24846.d2697755-a283-49b0-8a8d-d2561a4a8cf8.9ecb47df-3b49-4842-b337-debd84d2e854.9a91ad94-7a16-4f44-9f18-b224dc86c73f
https://store-images.s-microsoft.com/image/apps.6692.d2697755-a283-49b0-8a8d-d2561a4a8cf8.3b9d99fe-6c72-4a25-84d7-230094a1b83a.ba0510bc-47e8-4d8c-9f4e-6a942f758c66
https://store-images.s-microsoft.com/image/apps.57977.d2697755-a283-49b0-8a8d-d2561a4a8cf8.3b9d99fe-6c72-4a25-84d7-230094a1b83a.ac1b551e-8a42-45b1-ba88-4170adfa18af
https://store-images.s-microsoft.com/image/apps.5189.d2697755-a283-49b0-8a8d-d2561a4a8cf8.9ecb47df-3b49-4842-b337-debd84d2e854.9bdac473-389b-497c-a2af-26f212116f31
https://store-images.s-microsoft.com/image/apps.11637.d2697755-a283-49b0-8a8d-d2561a4a8cf8.3b9d99fe-6c72-4a25-84d7-230094a1b83a.b802c3d1-fa2a-4296-93eb-8ccda543e637