https://store-images.s-microsoft.com/image/apps.29609.96241ef1-79fc-44e8-8e95-3b52a5754a39.7e64db8b-e5c5-4143-a724-1677a84f2d5e.3ca34431-81e2-4c8a-872d-06f6efe8e62e

HybridHunter | Defender for Cloud Assessment | 1 week

Enabling Technologies Corporation

Enabling Technologies employs Microsoft’s latest security tools to perform a diagnostic hybrid cloud assessment, analyzing resources in: Azure, other web services & on-premises infrastructure.

Securing an expanding mesh of hybrid and cloud services adds to an already long to-do list for CISOs. Managing vulnerabilities and ensuring ongoing updates and improvements in the cloud can be daunting.

Defender for Cloud is a tool for security posture management and threat protection. It strengthens the security posture of your cloud resources, and with its integrated Microsoft Defender plans, Defender for Cloud protects workloads running in Azure, hybrid, and other cloud platforms.

Gold Partner Enabling Technologies employs Microsoft’s latest security tools including Defender for Cloud to perform a diagnostic hybrid cloud assessment, analyzing resources in:

  • Azure (including VMs, Storage, SQL, Key Vaults, Kubernetes)
  • On-Premises VMs1
  • Amazon Web Services and Google Cloud Platform (VMs, clusters, storage)

Enabling’s security team will manage a project to deploy tools, assess data, and then educate the client on the findings, which often include:

Analysis of current threats Suggestions to improve posture Methods to reduce the attack surface Ways to monitor for continuous compliance (i.e. with CIS, PCI, DSS controls, etc.)

Enabling’s Security team will lead a 1 week engagement to:

  1. Align on current state, major risk concerns, future goals, and budget/personnel constraints
  2. Onboard a predefined number of services (i.e. VMs, SQL databases, containers) to MDC
  3. Enable the enhanced security features
  4. Set up email notifications
  5. Create auto-responses to alerts, recommendations, and regulatory guidance
  6. Assess environment’s posture against desired standard controls (i.e. CIS, PCI)
  7. Train SOC on operational best practices and CISO reporting tools
  8. Deliver a .ppt with tangible recommendations for improvement and to scale ongoing operations

Sekilas pandang

https://store-images.s-microsoft.com/image/apps.48554.96241ef1-79fc-44e8-8e95-3b52a5754a39.10d3083a-db39-41e5-aadf-8d51f6c71160.a628979b-ae75-4c3c-97ec-140fed520a26
/staticstorage/6d4e0803/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.39667.96241ef1-79fc-44e8-8e95-3b52a5754a39.7e64db8b-e5c5-4143-a724-1677a84f2d5e.dd3b697c-f9b1-4f2f-baad-af938a8d61bf