Skip links

With data residing in the cloud and users working on mobile devices, it’s more important than ever to ensure your enterprise – and the data you store – is kept safe.

We can help you build a strategy and a management infrastructure that ensures security is properly defined, implemented, managed and audited across your cloud environment and at every layer, including the ‘human layer’.

We will bring you up-to-speed with the latest Microsoft security capabilities and ensure you have all the optimum settings configured.  Areas of expertise include:

Workshops

If there’s one workshop we think is ESSENTIAL before you go anywhere near the cloud it’s our Security Baseline Workshop.

Other workshops drill even deeper..

Security Baseline Workshop

Security requirements analysis

Review of Microsoft security

Risk review

Recommendations

Learn more

Identity & Access Management

Active Directory review

AD clean-up recommendations

Authentication model review

Conditional access policies options

Learn more

Active Directory Essentials

AD risk assessment

Management reporting

Problem remediation recommendations

Learn more
Not sure where to start?  Ask about our FREE Cloud Base Workshop
Enquire today
cloud security

Get a security audit.

If you’re already in the cloud, an audit or risk assessment can provide peace-of-mind that everything has been appropriately deployed and there’s no imminent risk.

Delivered as a service from us, or using self-service tools, you can run proactive reporting, perform risk analysis and get real time alerts.

Perform a full inventory of your AD, gathering in-depth information about the configuration of your directory including all objects, relationships, permissions and ownership, privileged accounts, security settings, domain controller configurations and so on.

Understand all potential risk conditions, such as stale or unneeded distribution groups, empty groups, unused staff,  contractor and service accounts, inappropriate use of privileged accounts and more.

Advanced reporting combined with ‘what if’ modelling will help you determine immediate fixes.  You’ll also have the foundation for establishing a roadmap that meets the goals of the multiple parties in your organisation that have a vested interest in maintaining a well-defined AD structure.

We’ll show how you can define workflows and processes that provide oversight, prevention and remediation of incidents that do not comply with GDPR and other legislative and business demands.

It is no small achievement to reduce a corporate enterprise data footprint this significantly in a responsible, well planned and executed manner.

Pierre Blignaut, Information Manager, Alexander Forbes

Alexander Forbes Starts Cloud Journey With On-premises Storage Saving & Security Assessment

Read the case study

Latest Posts

How to leverage Microsoft Teams without introducing a compliance blind-spot

How to leverage Microsoft Teams without introducing a compliance blind-spot

Collaboration is a big business buzzword these days, with tools[...]
3 Things to Watch Out for When Moving Journals to Office 365 Shared Mailboxes

3 Things to Watch Out for When Moving Journals to Office 365 Shared Mailboxes

To achieve accurate retention and eDiscovery in Office 365, legacy[...]
Is Office 365 up to handling all your eDiscovery needs?

Is Office 365 up to handling all your eDiscovery needs?

With the bulk of business information now stored electronically, eDiscovery[...]
Let us help you build a cloud security strategy to meet your business, practical & compliance needs.
Start my cloud journey