How do you know you haven’t already been compromised?
The median time it takes organisations to detect an active intrusion is over 99 days
Detect Advanced Attacks
Investigate Method and Scope of Breach
Ensure an Organisational Approach
Adopt an "Assume Breach" Stance
Employ the world’s largest threat knowledge base
Microsoft has for years been a world leader in desktop and enterprise solutions. Thousands of organisations trust Microsoft to keep their data safe in the Cloud. Why? Because over the years, Microsoft have been at the forefront of cyber-security and ensuring that theirs and their customers systems are protected. In fact in 2016, OnMSFT, a dedicated Microsoft community, claimed that 85% of the fabled Fortune 500 are using Azure. Microsoft's ‘security first’ stance to technology and services is a driving factor behind the constant evolution - it develops unlike any other provider, giving consumer the confidence and peace of mind that they're in safe hands. Every business’ security is only as strong as the weakest piece of technology in its infrastructure, and Microsoft’s decades long knowledge of this fact means that all software, hardware, applications or other services provided by Microsoft is tested and retested to maintain a standard higher than all their competitors.
By developing a solely Microsoft infrastructure, organisations are under increased protection from potential breaches as there is no third party or inferior product to corrupt the otherwise strong defenses. Any third-party application must be identified, it’s access monitored and users limited to ensure that the billions spent on security by Microsoft over the years is not devalued by an inferior third party product.
Microsoft operates products and solutions across on-premises and the Cloud, but the years of quality control and stringent testing means that only Microsoft technology is equipped to better protect your endpoints to move faster to detect threats, and respond to security breaches across even the largest of organisations.
risual have been making a name for themselves as a market leading Security partner for over ten years. With former Microsoft Security MVP Alun Rogers as one of the business founders, security has always been a consulting service, a priority and a key part of risual's business strategy. Moving from the dedicated Identity, Access and Perimeter into the wider Cloud Infrastructure practice. All of our risual engagements adhere to our own security guidelines, that by working within pre-defined governance across devices, users and access will ensure that a security-first mindset is ‘baked in’ to our work. Most of our security engagements start by simply sharing this best-practice with other organisations.
All risual staff are Security Cleared and vetted, we have achieved the ISO/IEC 20000 and ISO/IEC 27001:2015 Information Security Management. and our staff have worked on some of the highest security projects in both the private and public sector. As part of our staff and apprenticeship training, we provide information security training to ensure that all staff see security as first priority, beyond second nature.
risual are truly unmatched when it comes to Security services, with such a heritage of security engagements, and deep technical relationship with Microsoft technology means our expertise as a security services provider for both technology and business governance are market leading.
Malware can persist on devices undetected for years by hiding underneath the OS and AV.
Device Protection Can ensure device, OS, and anti-malware have not been compromised. Separate and harden key OS components.
Malware & Viruses
23% of all email is phishing messages, 11% of attachments opened contain threats, new malware is being produced at a rate of millions per day
Threat Resistance Can ensure your users are safer online. Microsoft offer the most secure enterprise browser, built in anti-virus, a website blacklist, and an app whitelist.
60% of network intrusions are traced back to compromised credentials
Identity Protection help prevent this. Windows 10 comes with Two-factor authentication via biometric recognition or a second device. Credential protection is built into the Operating System and users are authenticated using Active Directory.
10% of laptops will be stolen, 58% of managers sent private data to the wrong person.
Make sure you are prepared for theft or human error with Information Protection. Encrypt business files, require authentication to open, copy or share. Keep your hard drive encrypted to protect lost devices.
The median time to detect an active intrusion is over 200 days.
Breach Detection is a service that analyzes log reports of Windows 10 devices in Azure and compares it with enterprise patterns and global threat intelligence to identify intruders
Unmanaged Third Party Applications
Security is only as strong as the weakest link
Consolidate your security solutions with Windows 10 built-in features, we can advise on a strategy to protect, monitor and simplify your entire estate.
Change of Business Needs
As one of the UK’s leading Law Firms, Bond Dickinson needed constant access to their critical IT systems to maintain high levels of service to both clients and internal customers. As the company’s environment continues to grow, a need for a swift resolution to any IT issues was identified as key to ensuring they were responsive to client and internal needs. Bond Dickinson have a highly skilled, dedicated IT team, they recognised that they would benefit from trusted partner risual to work alongside them to provide a scalable Managed Service.
Due to the nature of their business, Bond Dickinson need to ensure the constant availability of critical applications. risual provide the highest level of expertise, available when needed at crucial times. risual and Bond Dickinson have a “open and honest long standing relationship, built on excellent engagements, delivered through their technical consulting team” as described by Andrew White, IT Infrastructure Manager.
This meant risual were already aware of the business requirements and existing technology deployments. Years of working together in this manner mean Bond Dickinson trust risual as a strategic partner to support and maintain their complex IT systems.
Bespoke Managed Services Services Partnership
Due to the nature of the business and demands on their own internal IT team, risual and Bond Dickinson were able to create a bespoke service which delivered precisely what Bond Dickinson required. Based on a flexible contract, this allows Bond Dickinson to call on risual as and when they require additional services – along with 24×7 proactive monitoring of systems.
This unique agreement means that Bond Dickinson are not tied into a long term costly contract which defines the exact scope of work, instead the flexibility of the contract allows Bond Dickinson to get the maximum value from their agreement. As stated by Andy White of Bond Dickinson “it’s the assurance that we have an external level of support that we can escalate to as and when we need it.”
The managed services team within risual monitor Bond Dickinson’s systems, allowing them to proactively provide additional support when required, identify any problems or issues within the monitored environment and have a solution ready to implement when needed.
As a result of the managed services agreement between Bond Dickinson and risual, they have seen the following:
- Bond Dickinson’s own IT team are not stretched or under resourced, they can also focus on more strategic projects due to the knowledge they have additional strength in depth when required
- Support the reduction in the operational cost of IT by providing business as usual tasks as a service
- Peace of mind- with risual’s flexible service agreement, we are able to provide a quick fix on any issues, regardless of the severity or technology involved – meaning improved response, flexibility and agility focused on providing value to the customer.
- A strong strategic relationship, capable of providing hands on project support within a defined scope
Click here to view the full case study.
End User Computing
risual are delivering a digital transformation project for a non-ministerial government department in the UK. It’s being put in place to allow more secure, flexible working with portable devices, as opposed to the current thin client environment. The ultimate objective will be to allow secure access to their data from any device, whether it be an internally-provided device or a personally owned device, with the focus being on securing the data and the identity rather than the devices. Security will be implemented from the ground up with each of the identified technologies to ensure that it protects the users without impacting their experience using UK government guidelines where appropriate.
The project promoted the idea of a ‘paperless office’ which would reduce the printing costs for the organisation as users will be able view documents on their devices and during meetings they will could bring their devices with them.
The EUC project is expected to provide several benefits throughout the delivery, these include:
- Users can select the device best suited to them and their productivity requirements.
- IT is consumed as a suite of business services grouped together to meet specific requirements.
- Users have the freedom and trust to define their personal workspace across a multitude of devices and locations without degrading the user experience.
- Users having the ability to consume technologies in the way that they want to work and drive innovation to continually improve the service provided to the people.
- Everyone has the knowledge that their personal and corporate security is considered at all times.
- Users can access applications, data and services on any device, at any time, dependent on location and access rights.
- Users have a single identity which drives access to services
- A flexible approach to EUC services with ability to accommodate change within the IT and business landscape.
Architect White Paper
Our Architects have produced an excellent, comprehensive piece on how modern productive organisations can approach security with Microsoft.
When a meticulously woven Trojan Horse arrives at your gate, take appropriate action and always question its authenticity...
Having an infrastructure set up to identify, react and minimise the damage of a breach is paramount to keeping an organisation running...
In the words of our old companion Yoda, when it comes to ensuring your systems are protected, “Do. Or do not. There is no try.”
Having an effective and secure spine to your organisation is key to maintaining the flow of the way business operates...
Smart fish swim together and recognise the importance of being under the umbrella of a proactive cloud infrastructure...
Snowden may or may not be a true peace patriot, but either way, it’s imperative to ensure your organisation isn’t left with the same level of exposure...
A future without passwords will make it much easier for users to juggle their tens of passwords and makie it more difficult for hackers...
General Data Protection Regulation (GDPR) will be implemented into UK law come May 25th 2018. This is going to bring about a whole world of change...