Azure Information Protection: 6 Week Implementation

Kontex Security Ltd

Know and protect sensitive data across your Microsoft stack

Protecting your organisation’s growing amount of sensitive data, such as customer PII and intellectual property, is just as important as protecting your organisation from external threats. Our Azure Information Protection & Risk Management solution helps tackle commonly faced challenges, such as mapping sensitive data in hybrid environments and understanding risks from insiders, employees or vendors.

Through a series of workshops with stakeholders, Kontex work to gain a level of understanding of the IT landscape, existing security controls, and how sensitive data is created, stored, and transferred by the business. Stemming from these workshops, a series of initiatives are identified that can form the basis of an Azure Information Protection programme. The initiatives outlined in the programme consists of the use of technologies, processes/procedures, and user awareness campaigns that can be implemented in an iterative manner to gain visibility and reduce data loss events, while minimising the risk of business disruption.

Kontex will deploy an information protection solution using our multi-phased approach, considering our main guiding principles: Technology, Awareness & Procedures.

Approach:

▪ Stage 1: Assess Discovery, Mapping, and Evaluation of Critical Data & Infrastructure

Perform an assessment of your existing environment, data classification objectives and capability gaps. Engage and align with the appropriate stakeholders, evaluate the cost factors for each of the available options and agree on the costs involved. Define your data classification objectives and develop a roadmap to achieve desired state.

▪ Stage 2: Architect Information Protection Solution

Develop a deployment & adoption plan for each technology capability - identifying and design processes to enable capabilities which are tailored to client's specific technical and data requirements. Finalize solution architecture and configuration in development environment.

▪ Stage 3: Deploy, Monitor & Maintain

Conduct phased deployment and roll-out of the capabilities in production environment. Provide ongoing training and support during the roll-out to ensure successful user adoption and maximum ROI. Continuously monitor performance, track health and provide insights via risk assessments, penetration testing and vulnerability testing to optimise the program.

As an end-to-end cloud security partner, we’re the proactive specialists that help you push boundaries, who feel like part of your team, that transform your IT for good. With Microsoft, we offer a wide range of best-in-class solutions, through friendly, personalised support and hands-on management. ​Together, we’re the people who power your possible.

Final pricing and timelines will be aligned to your specific requirements.

https://store-images.s-microsoft.com/image/apps.32367.7709d414-2dd6-4053-a02a-e99b0f6f9a69.90f02460-b8ef-467c-9dbf-e8b325bf15ec.fc60feb8-7f97-409f-b8bb-6cde9899399b
https://store-images.s-microsoft.com/image/apps.32367.7709d414-2dd6-4053-a02a-e99b0f6f9a69.90f02460-b8ef-467c-9dbf-e8b325bf15ec.fc60feb8-7f97-409f-b8bb-6cde9899399b
https://store-images.s-microsoft.com/image/apps.5204.7709d414-2dd6-4053-a02a-e99b0f6f9a69.90f02460-b8ef-467c-9dbf-e8b325bf15ec.ea4a0ce9-aa68-43d0-9eee-84038fa26bcb
https://store-images.s-microsoft.com/image/apps.52821.7709d414-2dd6-4053-a02a-e99b0f6f9a69.90f02460-b8ef-467c-9dbf-e8b325bf15ec.5c440378-0b9e-41ae-9709-167a9e157bd0