Microsoft 365 Security & Compliance
Enhance your Microsoft 365 suite with our security and compliance expertise. Specializing in AzureAD, IAM, PIM, Defender, Intune, and Pureview to deliver a comprehensive security framework that protects and manages your digital assets effectively.
Features
- Proven expertise from a Microsoft Gold Partner
- Entra, Conditional access policies, IAM, PIM
- Endpoint Manager - Intune
- Security manager - Defender
- Compliance manager - Pureview
Benefits
- Establish or improve your Microsoft 365 SecOps Capability
- Create effective monitoring and alerting
- Securing hybrid, on-site and remote working
- Unified endpoint security
- Protection from zero-day malwares, phishing and business email compromise
- Governance and securing data across the entire data estate
Pricing
£240.00 to £950.00 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 9 2 5 6 9 3 3 6 0 7 6 6 4 6
Contact
IT LABS D.O.O.E.L.
John Abadom
Telephone: +38923111033
Email: vendor@it-labs.com
Planning
- Planning service
- Yes
- How the planning service works
-
Everything in security is about risk. Based on this premise, every element of our offering is delivered with a long-term business strategy delivered through long-term risk lifecycle management
security operations with real-time adaptive risk lifecycles.
If a client doesn’t require some specific consultancy, service, or technology-based solution, we recommend a two-phase risk-based approach on how to suit client requirements for security.
- Long term risk lifecycle(Identify, Assess, Mitigate, Monitor)
- Real-time adaptive risk lifecycle (Detect, Protect, Monitor, Respond). - Planning service works with specific services
- Yes
- Hosting or software services the planning service works with
-
- Entra, Conditional Access, MFA
- Securely managing Guest Access and external collaboration
- Pureview, Data classification, Data Loss Prevention, Insider
- Risk Management and Information Protection
- Defender 365, Defender for Endpoint
- Privileged Access Management
- Email Security and Phishing Protection, BYOD
Training
- Training service provided
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
-
Our comprehensive service ensures that your organization’s Microsoft 365 environment is configured to meet security and compliance requirements. We seamlessly migrate existing data and settings, empowering your organization with robust protection and governance.
Why Choose Our Service?
Risk Management: Safeguard sensitive data across clouds, apps, and endpoints.
Regulatory Compliance: Respond effectively to regulatory requirements.
Risk Identification and Remediation: Identify and address critical risks within your organization. - Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- Yes
- How the quality assurance and performance testing works
-
As providers of Quality Assurance services, we engage in a comprehensive approach to ensure customers receive top-notch solutions. We collaborate closely with clients to develop a Strategic QA Plan tailored to their specific needs and objectives. This plan outlines the testing methodologies, tools, and timelines to be employed throughout the project covering functional and non-functional expectations.
Performance testing is a key aspect of our services, wherein we assess the system's responsiveness, stability, and scalability under varying conditions to identify and rectify bottlenecks.
Incorporating Penetration testing, we rigorously evaluate the system's security posture, probing for vulnerabilities and fortifying defenses against potential cyber threats.
Furthermore, we leverage Test Automation to streamline the testing process, enhancing efficiency and accuracy while reducing manual effort and time-to-market.
By integrating these services seamlessly, we empower customers to deploy robust, high-performance systems that meet the highest standards of quality and reliability.
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security testing
- Security incident management
- Security audit services
- Certified security testers
- Yes
- Security testing certifications
- Other
- Other security testing certifications
-
- Offensive Security Certified Professional (OSCP)
- Offensive Security Wireless Professional (OSWP)
- Practical Network Penetration Tester (PNPT)
- Certified Red Team Expert (CRTE)
- Certified Ethical Hacker (CEH)
- Master CEH
Ongoing support
- Ongoing support service
- Yes
- Types of service supported
- Buyer hosting or software
- How the support service works
-
Software Services Support is conducted through a couple of phases on both the infrastructure and application levels.
Technical Support:
Troubleshooting problems;
Ensuring that all functional aspects of the application are accessible and working as intended.
Monitoring:
Infrastructure monitoring (CPU utilization, memory consumption, database throughput);
Application monitoring (Performance monitoring-tracking speed, responsiveness, and stability);
Network monitoring (Audit access to the network, revisit security groups, access level, firewall rules).
Security Management:
Security audits;
Updates to address vulnerabilities;
Ensuring compliance with data protection regulations.
Maintenance:
Regular framework updates;
Patching software bugs;
Updating features;
SSL certificates update.
Service scope
- Service constraints
- The services are mainly done remotely and on-premise work is available on demand. The talent is available on 3 continents, Europe, Latam, and the US.
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Our email response times vary depending on the severity of the issue as outlined below:
Normal: We aim to respond within 3 hours.
High: We strive to respond within 1 hour, with a resolution target of 24 to 48 hours.
Emergency: We prioritize immediate response within 15 to 30 min, with a resolution time (at least a quick fix) of less than 12 hours.
For complex issues, we provide estimated resolution times corresponding to each severity level. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Support levels
-
We offer three levels of support tailored to different needs:
Level 1 Support: This tier addresses common issues using self-service tools like FAQs and online resources. Our engineers guide users through solutions, especially for problems stemming from configuration errors or external systems.
Level 2 Support: Providing intermediate assistance, this level tackles issues impacting the infrastructure. Our experts offer personalized guidance beyond basic troubleshooting, ensuring swift resolution.
Level 3 Support: Reserved for advanced technical challenges, this tier demands specialized expertise and deep troubleshooting skills, spanning applications as well as infrastructure. Collaboration with developers or engineers may be necessary, and solutions could involve on-site visits or remote assistance to effectively resolve complex issues.
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- TÜV NORD CERT GmbH
- ISO/IEC 27001 accreditation date
- 06/06/2023
- What the ISO/IEC 27001 doesn’t cover
- We are certified against ISO27001:2022 according to all SoA controls.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Offensive Security Certified Professional (OSCP)
- Offensive Security Wireless Professional (OSWP)
- Practical Network Penetration Tester (PNPT)
- Certified Red Team Expert (CRTE)
- Certified Ethical Hacker (CEH)
- Master CEH
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
IT Labs is committed to fighting climate change by implementing sustainable practices across our operations. We are ISO 14001:2015 certified and compliant with all environmental requirements. Our data centers are powered by renewable energy sources, reducing carbon emissions and environmental impact. Additionally, we prioritize energy-efficient infrastructure and optimize resource utilization to minimize energy consumption. By adopting eco-friendly technologies and practices, we contribute to mitigating climate change and preserving the planet for future generations.Covid-19 recovery
In response to the COVID-19 pandemic, IT Labs leveraged G-Cloud services to support recovery efforts and facilitate resilience in affected communities. Our cloud-based solutions enable remote work, distance learning, and virtual collaboration, empowering organizations to adapt to new challenges and maintain continuity amidst disruptions. We provide scalable and flexible services to accommodate evolving needs, ensuring that businesses, healthcare systems, and public sector agencies can effectively navigate the recovery process and build resilience for the future.Tackling economic inequality
IT Labs is dedicated to tackling economic inequality by promoting inclusive growth and economic empowerment. We offer cost-effective and scalable solutions that enable small and medium-sized enterprises (SMEs), larger enterprises, and underserved communities to access technology resources and compete on a level playing field. Additionally, we prioritize diversity and inclusion in our supplier network and workforce, fostering opportunities for underrepresented groups and promoting economic diversity within the digital economy.Equal opportunity
At IT Labs, we are committed to promoting equal opportunity by ensuring accessibility, diversity, and inclusivity in all aspects of our operations. Our solutions are designed to be accessible to users of all backgrounds and abilities, with features and functionalities that accommodate diverse needs. We actively recruit and support a diverse workforce, and we promote supplier diversity to create opportunities for minority-owned businesses and disadvantaged entrepreneurs. By fostering an environment of equality and inclusivity, we empower individuals to thrive and contribute to the digital ecosystem without barriers or discrimination.Wellbeing
IT Labs prioritizes user well-being by promoting work-life balance, mental health, and personal development. Our solutions incorporate features that support employee wellness, such as flexible scheduling, remote work options, and wellness resources. We also offer training and development programs to support career growth and skill enhancement, promoting overall well-being and job satisfaction. Additionally, we invest in employee health and safety initiatives to create a supportive and inclusive workplace culture that prioritizes the holistic well-being of our team members.
Pricing
- Price
- £240.00 to £950.00 a unit
- Discount for educational organisations
- No