Banner Insentis Portfolio IT Security

Cloud Security

Outsourcing your own IT infrastructures to the cloud can reduce costs for operation and maintenance while improving accessibility. We support you in planning and migrating your data to the cloud, always paying special attention to security. To secure the official cloud infrastructure, we advise you on how to implement strong authentication to prevent unauthorized people from gaining access to your cloud. We also show you how you can use a so-called zero trust principle to prevent the cloud provider from obtaining more information about your data than is absolutely necessary. In case you decide one day to leave the cloud again, we also help you plan an exit strategy right from the start.

  • Holistic security and compliance consulting for the (hybrid) use of cloud solutions or cloud migration projects
  • Office 365 / Microsoft 365, Microsoft Azure, Amazon Web Services (AWS), Google Cloud Platform
  • Security audit and hardening according to security best practices such as CIS Benchmarks and Cloud Conformity
  • Carrying out threat analyses using threat modeling according to STRIDE
  • Cloud Security Posture Management (CSPM) & Security Monitoring
  • Creation of security concepts as well as compliance audits
  • Consulting for migration of holistic IT infrastructures, standard software and individual software
  • Support with contract design, SLA description, tender support and transition
  • License evaluation

Cloud Security Assessment

We review your cloud infrastructure for appropriate security architecture, looking at the following aspects:

  • Identity and Access Management (IAM)
  • Identity Protection: MFA & Conditional Access
  • Compliance and data protection in particular with regard to EU-DSGVO
  • Advanced Threat Protection & Antimalware
  • Data Loss Prevention & Information Protection (AIP)
  • Threat Protection, E-Mail Security, Attachment Filtering
  • Phishing Protection inkl. SPF, DMARC, DKIM
  • Logging, Monitoring und Alerting
  • Conformity Checks & Hardening regarding Best Practices
  • CIS Benchmarks, Cloud Conformity

Cloud Security Posture Management & Compliance Monitoring

Cloud Security Posture Management enables monitoring of cloud environments based on known security risks and best practices. Cloud and infrastructure benchmarking rules (CIS benchmarks, DSGVO, PCI-DSS, SOC 2, and HIPAA) can detect misconfigurations, application vulnerabilities, and compliance violations. Get regular summaries of your compliance status and quickly find answers to the most pressing questions to assess your security posture with the help of an intuitive dashboard. View relevant security metrics across your infrastructure at any time and quickly track their value to the appropriate benchmarks or frameworks. Real-time monitoring and automated corrective actions for the security, compliance, and governance of your cloud infrastructure keep you in control of your security.

Office 365 / Microsoft 365 Security

We secure your Microsoft 365 environment, protecting you from the top threats to Office 365, Teams, Sharepoint and OneDrive. Through multi-factor authentication and conditional access, we secure your data from unauthorized access. We support you with cloud security management and shadow IT scanning, as well as compliance and data protection in the Microsoft Cloud. With the help of Advanced Threat Protection, we protect your e-mail traffic from spam, malware and phishing attacks. In addition to backup solutions for data loss prevention, we also provide you with an exit strategy to prevent vendor lock-in. Last but not least, we are also happy to assist you with licensing issues.

Identity and Access Management

Identity and Access Management (IAM) ensures that the right people have access to the data and tools you need. We support you in developing and implementing a coherent IAM concept that meets your requirements. To do this, we consider the following aspects:

  • Concept: Identity and Access Management with RBAC
  • Identity Protection
  • Azure AD Identities vs. Hybrid
    • Passthrough
  • MFA and Conditional Access
  • Privileged Access Management (PAM)
  • Single-Sign-On & Social Login
  • OAuth 2.0 & OpenID Connect
  • Credential Leals Monitoring
  • Identity and Access Governance
  • Zero-Trust Model

 

 

 

scroll to top