https://store-images.s-microsoft.com/image/apps.48835.f447b4cd-a22e-4d70-a8a4-10930900255e.4d48a608-cb03-4abb-98aa-84943a7ad5c7.d2b59868-be4a-4b35-bfad-a78bc28668d0

Security Threat Check: 5-Day Assessment & Workshop

Chorus

Our security assessment identifies active and potential security threats and gives you a clear breakdown of which Microsoft 365 security products can be used to remediate active threats.

Our Microsoft Security assessment provides a high-level overview of your security posture, using Microsoft 365 to scan your digital estate to identify active threats and vulnerabilities across email, identity and data. Results are gathered, analysed, and presented alongside a written report to identify key threats. We then breakdown the ongoing remediation steps with a clear plan of which Microsoft security solutions can be used to remediate vulnerabilities - which we can implement or you can takeaway to implement internally.

Deliverables:

  • Security Report – You will receive a detailed report outlining the identified active and potential threats across your estate – include impact, severity and the detail into threats identified. We will outline the recommended mitigations and approaches that are clearly prioritised to provide a security roadmap.
  • Workshop/Presentation – Alongside the report, we will come onsite or deliver the report remotely to discuss the findings and recommendations with you.
  • Roadmap - A prioritised roadmap for adopting Microsoft security technologies to remediate active threats and improve your security posture.

Optional Inclusions

As well as carrying out the core activities of this engagement we can also offer additional add-ons:
  • Advanced Threat Protection– Provides visibility into on-premise alerts and detects vulnerabilities, such as plain text credentials.
  • Attack Simulator – Enables a controlled phishing attack simulator to be carried out to assess end user awareness and risk.
  • Shadow IT Discovery– Generates a cloud app discovery report, which reveals approved and unapproved cloud applications being used to store company data.

Please note

  • Costs are estimated as they do not include travel and expenses and may vary if the scope is amended.
  • You may be eligible for funding to have this engagement free of charge – please contact us.
  • For a more in-depth assessment, please review our ‘Zero Trust Security Assessment’ service.

At a glance

https://store-images.s-microsoft.com/image/apps.1775.f447b4cd-a22e-4d70-a8a4-10930900255e.4d48a608-cb03-4abb-98aa-84943a7ad5c7.971f0a07-57af-4bca-83f9-c9e96c1fc09a