Eviden Threat Protection 5-Wk Workshop

Eviden International France - SAS

Utilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.

Microsoft Threat Protection Value Insights Workshop

Empower your organization's cybersecurity strategy with our "Microsoft Threat Protection Value Insights" workshop, designed to unveil the surplus value of embedded security solutions in your Microsoft cloud environment.

The Challenge:

"The Microsoft Threat Protection Engagement helped us understand our maturity levels on different sectors of cybersecurity." - Harri Kivimaa, Head of End User Services, VTT

Do you know how many phishing attacks your organization has received? If employees are using the right password protocol? Whether personal data is being exposed? In short, is your organization’s cloud environment as secure as you think it is? In this format, we’ll help you develop a strategic plan customized for your organization. You’ll gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture for the long term.

In Scope:

  • Deployment of trial licenses for Threat Check in customer tenant
  • Configuration of Security tools to discover threats to customers identity, email and data (Sentinel, Defender XDR, Entra ID Protection, Defender for Office 365 und Defender for Cloud Apps)
  • Defender for Endpoint: Onboarding 5 - 100 devices (Windows 10/11 only)
  • Defender for Cloud Apps: One-time manual upload of logs from firewall or proxy server
  • Detailed self assessment of customers security landscape and definition of next steps

Out of Scope:

  • Devices other than Windows 10/11 devices
  • In-depth analysis and investigation of detected threats
  • Threats in the on-premise infrastructure
  • Forensic analysis
  • Technical designs or implementations
  • PoC or Lab Deployment

Microsoft Services:

  • Threat Check
  • Microsoft Sentinel
  • Microsoft Defender for Endpoint
  •  Microsoft Defender for Cloud Apps
  • Microsoft Defender for Identity

What to expect?

  • Strengthen your organization’s approach to cybersecurity
  • Understand how to prioritize and mitigate potential attacks
  • Understanding how to mitigate threats by showing how Microsoft 365, AAD and Application security products can help mitigate and protect against threats that are found
  • Recommendations and planning next steps for a production deployment

Five-Week Schedule:

  • Week 1: Alignment of expectations, general scope, and scheduling. Self-assessment of your security landscape and identification of top priorities, main influences, and opportunities (questionnaire).
  • Week 2: Kick-Off, definition of scope & deployment of Microsoft Threat Detection tools in your production environment.
  • Week 2-4: Data Collection and Threat Exploration & Report Preparation.
  • Week 5: Key results of the Threat Exploration in your environment, insights into Microsoft’s holistic approach to security, and how it relates to your organization, demonstrations of Microsoft’s integrated security, including the latest tools and methods, next steps on how to jointly proceed.

Value Insights Highlights:

  • Identify real threats to your cloud environment with Threat Check
  • Understand your security goals and objectives
  • Get insights into the Microsoft end-to-end security approach
  • Showcase security scenarios with product demos
  • Develop joint plans and next steps