risual Security Services
Build stronger privacy, security, and management practices.
With Identity and Access Consultants, Cloud Architects and Business Analysts all trained in security services, risual has the breadth of skills to secure your modern productive enterprise.
Your Security Posture
To remain compliant and as secure as possible, Microsoft and risual recommend investment in three key areas of security: protect, detect and respond. Ensure that you invest in all three areas ensure you have enough deterrents to prevent an attack, the tools to identify when you have been breached and the protocols in place to make immediate remedial action.
Enterprises have traditionally built applications and services in siloes, protecting those environments using perimeter network devices. The advent of cloud services requires a rethink of this model and a change in mindset. The move of services such as email, file services and other applications into hosted cloud applications means that the traditional perimeter controls are no longer effective.
With the perimeter network model no longer suitable for use, enterprises are being forced into new access models. These are no longer focused on controlled access and prevention, but focused on detection and response to threats. Even with a shift to an identity-driven model, some requirement to protect devices remains. Not only can basic measures such as anti-malware protection limit the likelihood of a successful attack but advanced technologies can protect against threats that would otherwise be overlooked.
With the transition away from the perimeter network model and traditional VPN technologies, an alternative model for authentication and access control is needed. Identity has become the control plane and our identities are now very much the “keys to the digital kingdom”. In the past, organisations focused on securing devices and operating systems. Whilst this is still a valid element of the overall security strategy, the focus must shift to securing data – across any platform.
Azure Active Directory is Microsoft’s identity-as-a-service (IDaaS) platform. It’s a comprehensive identity and access management cloud solution that’s central to the “identity as the control plane” approach to managing users and groups. Azure Active Directory is based on industry-standard protocols and this means that, in addition to Microsoft’s own SaaS platforms (Office 365 and Dynamics 365), thousands of third-party SaaS applications are pre-integrated with Azure Active Directory. Because of this, single sign-on is a reality, reducing the reliance on maintaining multiple sets of credentials.
Azure Active Directory Identity Protection is a feature that helps organisations to detect potential vulnerabilities and to automatically respond to suspicious incidents (such as multiple logons from geographically-dispersed locations). Exchange Advanced Threat Protection (ATP) uses machine learning to analyse behaviour and detect anomalies, alerting administrators and providing protection against unknown malware or viruses (i.e. in a zero-day exploit scenario).
For mobile and PC devices alike, Microsoft Intune provides mobile device management, mobile application management and PC management on Android, iOS, Windows 10 Mobile, Windows and MacOS. Corporate data can be secured on user-owned devices and information leakage is prevented by controlling the interaction between applications. As a cloud service, Intune requires no additional infrastructure but it can be integrated with existing System Center investments on-premises.