https://store-images.s-microsoft.com/image/apps.24891.4e2c7d19-02ab-43a0-8cf6-8afdaf87b59f.6aea3340-f014-4cd7-a888-146eef762bae.165e0c24-7cf9-4521-b289-64eba2705c68

The Zero Trust Journey: 6WK Implementation

Devoteam Alegri GmbH

The Zero Trust Journey consists of four distinct steps. Envisioning Workshop, Assessment Workshops, Implementation, Posture Management.

Today’s organizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they’re located. Microsoft 365 provides a suite of security services which covers all of the mention areas.

Instead of assuming everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an open network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to “never trust, always verify.” With Azure Active Directory as the central identity provider and the security services like Conditional Access, every access request is fully authenticated, authorized, and encrypted before granting access.

Microsoft Defender and Microsoft Cloud App Security provides rich intelligence and analytics to detect and respond to anomalies in real time.

What do you get?

Envisioning Workshop:

  • Kick-Off
  • Overview of Microsoft Zero Trust in general for key stakeholders
  • Discuss your Business needs and resources
  • Scope and planning

Assessment Workshops:

  • Deep-Dive into Microsoft's Zero Trust strategy
  • Prioritize topics for a short (quick wins), medium and long-term strategy
  • Assessment of your environment

Conceptualization / Implementation:

  • Interview your stakeholders
  • Develop a holistic concept for each area of the Zero Trust strategy
  • Roll-Out step-by-step
  • Implement continuous monitoring

*Please note that the pricing & timeframe is only a rough estimate and will vary depending on the services you choose, the size of the implementation and other circumstances in your specific target scenario.

Lühiülevaade

https://store-images.s-microsoft.com/image/apps.59989.4e2c7d19-02ab-43a0-8cf6-8afdaf87b59f.4052d381-94a6-4483-b6ac-471b2868a43c.9dcf66db-085d-4c8f-a50e-2e017a49f8e5
https://store-images.s-microsoft.com/image/apps.55556.4e2c7d19-02ab-43a0-8cf6-8afdaf87b59f.bfa749f0-d859-4d6e-903d-c8fd7eb894ea.d3c6bbd4-b40e-42e3-a565-c1a07f93054c
https://store-images.s-microsoft.com/image/apps.45948.4e2c7d19-02ab-43a0-8cf6-8afdaf87b59f.bfa749f0-d859-4d6e-903d-c8fd7eb894ea.56d4d56b-f5b9-4776-921c-582e6a1105a5
https://store-images.s-microsoft.com/image/apps.37785.4e2c7d19-02ab-43a0-8cf6-8afdaf87b59f.6aea3340-f014-4cd7-a888-146eef762bae.e2d974bc-acf6-438d-b6f5-89864bf55ef8