How do you know you haven’t already been compromised?

The median time it takes organisations to detect an active intrusion is over 99 days

Detect Advanced Attacks

Investigate Method and Scope of Breach

Ensure an Organisational Approach

Adopt an "Assume Breach" Stance

Employ the world’s largest threat knowledge base

Why Microsoft?

Why does Microsoft technology have such a comprehensive level of security?

Microsoft has for years been a world leader in desktop and enterprise solutions. Thousands of organisations trust Microsoft to keep their data safe in the Cloud. Why? Because over the years, Microsoft have been at the forefront of cyber-security and ensuring that theirs and their customers systems are protected. In fact in 2016, OnMSFT, a dedicated Microsoft community, claimed that 85% of the fabled Fortune 500 are using Azure. Microsoft's ‘security first’ stance to technology and services is a driving factor behind the constant evolution - it develops unlike any other provider, giving consumer the confidence and peace of mind that they're in safe hands. Every business’ security is only as strong as the weakest piece of technology in its infrastructure, and Microsoft’s decades long knowledge of this fact means that all software, hardware, applications or other services provided by Microsoft is tested and retested to maintain a standard higher than all their competitors.

By developing a solely Microsoft infrastructure, organisations are under increased protection from potential breaches as there is no third party or inferior product to corrupt the otherwise strong defenses. Any third-party application must be identified, it’s access monitored and users limited to ensure that the billions spent on security by Microsoft over the years is not devalued by an inferior third party product.

Microsoft operates products and solutions across on-premises and the Cloud, but the years of quality control and stringent testing means that only Microsoft technology is equipped to better protect your endpoints to move faster to detect threats, and respond to security breaches across even the largest of organisations.

Why risual?

Why choose risual to keep you secure?

risual have been making a name for themselves as a market leading Security partner for over ten years. With former Microsoft Security MVP Alun Rogers as one of the business founders, security has always been a consulting service, a priority and a key part of risual's business strategy. Moving from the dedicated Identity, Access and Perimeter into the wider Cloud Infrastructure practice. All of our risual engagements adhere to our own security guidelines, that by working within pre-defined governance across devices, users and access will ensure that a security-first mindset is ‘baked in’ to our work. Most of our security engagements start by simply sharing this best-practice with other organisations.

All risual staff are Security Cleared and vetted, we have achieved the ISO/IEC 20000 and ISO/IEC 27001:2015 Information Security Management and our staff have worked on some of the highest security projects in both the private and public sector. As part of our staff and apprenticeship training, we provide information security training to ensure that all staff see security as first priority, beyond second nature.

risual are truly unmatched when it comes to Security services, with such a heritage of security engagements, and deep technical relationship with Microsoft technology means our expertise as a security services provider for both technology and business governance are market leading.


Case Study

Bond Dickinson

Change of Business Needs

As one of the UK’s leading Law Firms, Bond Dickinson needed constant access to their critical IT systems to maintain high levels of service to both clients and internal customers. As the company’s environment continues to grow, a need for a swift resolution to any IT issues was identified as key to ensuring they were responsive to client and internal needs. Bond Dickinson have a highly skilled, dedicated IT team, they recognised that they would benefit from trusted partner risual to work alongside them to provide a scalable Managed Service.

Due to the nature of their business, Bond Dickinson need to ensure the constant availability of critical applications. risual provide the highest level of expertise, available when needed at crucial times. risual and Bond Dickinson have a “open and honest long standing relationship, built on excellent engagements, delivered through their technical consulting team” as described by Andrew White, IT Infrastructure Manager.

This meant risual were already aware of the business requirements and existing technology deployments. Years of working together in this manner mean Bond Dickinson trust risual as a strategic partner to support and maintain their complex IT systems.

Bespoke Managed Services Services Partnership

Due to the nature of the business and demands on their own internal IT team, risual and Bond Dickinson were able to create a bespoke service which delivered precisely what Bond Dickinson required. Based on a flexible contract, this allows Bond Dickinson to call on risual as and when they require additional services – along with 24×7 proactive monitoring of systems.

This unique agreement means that Bond Dickinson are not tied into a long term costly contract which defines the exact scope of work, instead the flexibility of the contract allows Bond Dickinson to get the maximum value from their agreement. As stated by Andy White of Bond Dickinson “it’s the assurance that we have an external level of support that we can escalate to as and when we need it.”

The managed services team within risual monitor Bond Dickinson’s systems, allowing them to proactively provide additional support when required, identify any problems or issues within the monitored environment and have a solution ready to implement when needed.


As a result of the managed services agreement between Bond Dickinson and risual, they have seen the following:

  • Bond Dickinson’s own IT team are not stretched or under resourced, they can also focus on more strategic projects due to the knowledge they have additional strength in depth when required
  • Support the reduction in the operational cost of IT by providing business as usual tasks as a service
  • Peace of mind- with risual’s flexible service agreement, we are able to provide a quick fix on any issues, regardless of the severity or technology involved – meaning improved response, flexibility and agility focused on providing value to the customer.
  • A strong strategic relationship, capable of providing hands on project support within a defined scope


Click here to view the full case study.

Case Notes

Digital transformation for a UK non-ministerial government department

End User Computing

risual are delivering a digital transformation project for a non-ministerial government department in the UK. It’s being put in place to allow more secure, flexible working with portable devices, as opposed to the current thin client environment. The ultimate objective will be to allow secure access to their data from any device, whether it be an internally-provided device or a personally owned device, with the focus being on securing the data and the identity rather than the devices. Security will be implemented from the ground up with each of the identified technologies to ensure that it protects the users without impacting their experience using UK government guidelines where appropriate. 

The project promoted the idea of a ‘paperless office’ which would reduce the printing costs for the organisation as users will be able view documents on their devices and during meetings they will could bring their devices with them.

The EUC project is expected to provide several benefits throughout the delivery, these include: 

  • Users can select the device best suited to them and their productivity requirements. 
  • IT is consumed as a suite of business services grouped together to meet specific requirements. 
  • Users have the freedom and trust to define their personal workspace across a multitude of devices and locations without degrading the user experience. 
  • Users having the ability to consume technologies in the way that they want to work and drive innovation to continually improve the service provided to the people.  
  • Everyone has the knowledge that their personal and corporate security is considered at all times. 
  • Users can access applications, data and services on any device, at any time, dependent on location and access rights. 
  • Users have a single identity which drives access to services 
  • A flexible approach to EUC services with ability to accommodate change within the IT and business landscape.

Architect White Paper

Our Architects have produced an excellent, comprehensive piece on how modern productive organisations can approach security with Microsoft.


When a meticulously woven Trojan Horse arrives at your gate, take appropriate action and always question its authenticity...

Having an infrastructure set up to identify, react and minimise the damage of a breach is paramount to keeping an organisation running...

In the words of our old companion Yoda, when it comes to ensuring your systems are protected, “Do. Or do not. There is no try.”

Having an effective and secure spine to your organisation is key to maintaining the flow of the way business operates...

Smart fish swim together and recognise the importance of being under the umbrella of a proactive cloud infrastructure...

Snowden may or may not be a true peace patriot, but either way, it’s imperative to ensure your organisation isn’t left with the same level of exposure...

A future without passwords will make it much easier for users to juggle their tens of passwords and makie it more difficult for hackers...

General Data Protection Regulation (GDPR) will be implemented into UK law come May 25th 2018. This is going to bring about a whole world of change...


Contact us