Skip to main content

Help us improve the Digital Marketplace - send your feedback

IT LABS D.O.O.E.L.

Microsoft 365 Security & Compliance

Enhance your Microsoft 365 suite with our security and compliance expertise. Specializing in AzureAD, IAM, PIM, Defender, Intune, and Pureview to deliver a comprehensive security framework that protects and manages your digital assets effectively.

Features

  • Proven expertise from a Microsoft Gold Partner
  • Entra, Conditional access policies, IAM, PIM
  • Endpoint Manager - Intune
  • Security manager - Defender
  • Compliance manager - Pureview

Benefits

  • Establish or improve your Microsoft 365 SecOps Capability
  • Create effective monitoring and alerting
  • Securing hybrid, on-site and remote working
  • Unified endpoint security
  • Protection from zero-day malwares, phishing and business email compromise
  • Governance and securing data across the entire data estate

Pricing

£240.00 to £950.00 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at vendor@it-labs.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 9 2 5 6 9 3 3 6 0 7 6 6 4 6

Contact

IT LABS D.O.O.E.L. John Abadom
Telephone: +38923111033
Email: vendor@it-labs.com

Planning

Planning service
Yes
How the planning service works
Everything in security is about risk. Based on this premise, every element of our offering is delivered with a long-term business strategy delivered through long-term risk lifecycle management
security operations with real-time adaptive risk lifecycles.
If a client doesn’t require some specific consultancy, service, or technology-based solution, we recommend a two-phase risk-based approach on how to suit client requirements for security.
- Long term risk lifecycle(Identify, Assess, Mitigate, Monitor)
- Real-time adaptive risk lifecycle (Detect, Protect, Monitor, Respond).
Planning service works with specific services
Yes
Hosting or software services the planning service works with
  • Entra, Conditional Access, MFA
  • Securely managing Guest Access and external collaboration
  • Pureview, Data classification, Data Loss Prevention, Insider
  • Risk Management and Information Protection
  • Defender 365, Defender for Endpoint
  • Privileged Access Management
  • Email Security and Phishing Protection, BYOD

Training

Training service provided
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
Our comprehensive service ensures that your organization’s Microsoft 365 environment is configured to meet security and compliance requirements. We seamlessly migrate existing data and settings, empowering your organization with robust protection and governance.
Why Choose Our Service?
Risk Management: Safeguard sensitive data across clouds, apps, and endpoints.
Regulatory Compliance: Respond effectively to regulatory requirements.
Risk Identification and Remediation: Identify and address critical risks within your organization.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
As providers of Quality Assurance services, we engage in a comprehensive approach to ensure customers receive top-notch solutions. We collaborate closely with clients to develop a Strategic QA Plan tailored to their specific needs and objectives. This plan outlines the testing methodologies, tools, and timelines to be employed throughout the project covering functional and non-functional expectations.
Performance testing is a key aspect of our services, wherein we assess the system's responsiveness, stability, and scalability under varying conditions to identify and rectify bottlenecks.
Incorporating Penetration testing, we rigorously evaluate the system's security posture, probing for vulnerabilities and fortifying defenses against potential cyber threats.
Furthermore, we leverage Test Automation to streamline the testing process, enhancing efficiency and accuracy while reducing manual effort and time-to-market.
By integrating these services seamlessly, we empower customers to deploy robust, high-performance systems that meet the highest standards of quality and reliability.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
Certified security testers
Yes
Security testing certifications
Other
Other security testing certifications
  • Offensive Security Certified Professional (OSCP)
  • Offensive Security Wireless Professional (OSWP)
  • Practical Network Penetration Tester (PNPT)
  • Certified Red Team Expert (CRTE)
  • Certified Ethical Hacker (CEH)
  • Master CEH

Ongoing support

Ongoing support service
Yes
Types of service supported
Buyer hosting or software
How the support service works
Software Services Support is conducted through a couple of phases on both the infrastructure and application levels.

Technical Support:
Troubleshooting problems;
Ensuring that all functional aspects of the application are accessible and working as intended.

Monitoring:
Infrastructure monitoring (CPU utilization, memory consumption, database throughput);
Application monitoring (Performance monitoring-tracking speed, responsiveness, and stability);
Network monitoring (Audit access to the network, revisit security groups, access level, firewall rules).

Security Management:
Security audits;
Updates to address vulnerabilities;
Ensuring compliance with data protection regulations.

Maintenance:
Regular framework updates;
Patching software bugs;
Updating features;
SSL certificates update.

Service scope

Service constraints
The services are mainly done remotely and on-premise work is available on demand. The talent is available on 3 continents, Europe, Latam, and the US.

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Our email response times vary depending on the severity of the issue as outlined below:

Normal: We aim to respond within 3 hours.
High: We strive to respond within 1 hour, with a resolution target of 24 to 48 hours.
Emergency: We prioritize immediate response within 15 to 30 min, with a resolution time (at least a quick fix) of less than 12 hours.
For complex issues, we provide estimated resolution times corresponding to each severity level.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Support levels
We offer three levels of support tailored to different needs:

Level 1 Support: This tier addresses common issues using self-service tools like FAQs and online resources. Our engineers guide users through solutions, especially for problems stemming from configuration errors or external systems.

Level 2 Support: Providing intermediate assistance, this level tackles issues impacting the infrastructure. Our experts offer personalized guidance beyond basic troubleshooting, ensuring swift resolution.

Level 3 Support: Reserved for advanced technical challenges, this tier demands specialized expertise and deep troubleshooting skills, spanning applications as well as infrastructure. Collaboration with developers or engineers may be necessary, and solutions could involve on-site visits or remote assistance to effectively resolve complex issues.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
TÜV NORD CERT GmbH
ISO/IEC 27001 accreditation date
06/06/2023
What the ISO/IEC 27001 doesn’t cover
We are certified against ISO27001:2022 according to all SoA controls.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • Offensive Security Certified Professional (OSCP)
  • Offensive Security Wireless Professional (OSWP)
  • Practical Network Penetration Tester (PNPT)
  • Certified Red Team Expert (CRTE)
  • Certified Ethical Hacker (CEH)
  • Master CEH

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

IT Labs is committed to fighting climate change by implementing sustainable practices across our operations. We are ISO 14001:2015 certified and compliant with all environmental requirements. Our data centers are powered by renewable energy sources, reducing carbon emissions and environmental impact. Additionally, we prioritize energy-efficient infrastructure and optimize resource utilization to minimize energy consumption. By adopting eco-friendly technologies and practices, we contribute to mitigating climate change and preserving the planet for future generations.

Covid-19 recovery

In response to the COVID-19 pandemic, IT Labs leveraged G-Cloud services to support recovery efforts and facilitate resilience in affected communities. Our cloud-based solutions enable remote work, distance learning, and virtual collaboration, empowering organizations to adapt to new challenges and maintain continuity amidst disruptions. We provide scalable and flexible services to accommodate evolving needs, ensuring that businesses, healthcare systems, and public sector agencies can effectively navigate the recovery process and build resilience for the future.

Tackling economic inequality

IT Labs is dedicated to tackling economic inequality by promoting inclusive growth and economic empowerment. We offer cost-effective and scalable solutions that enable small and medium-sized enterprises (SMEs), larger enterprises, and underserved communities to access technology resources and compete on a level playing field. Additionally, we prioritize diversity and inclusion in our supplier network and workforce, fostering opportunities for underrepresented groups and promoting economic diversity within the digital economy.

Equal opportunity

At IT Labs, we are committed to promoting equal opportunity by ensuring accessibility, diversity, and inclusivity in all aspects of our operations. Our solutions are designed to be accessible to users of all backgrounds and abilities, with features and functionalities that accommodate diverse needs. We actively recruit and support a diverse workforce, and we promote supplier diversity to create opportunities for minority-owned businesses and disadvantaged entrepreneurs. By fostering an environment of equality and inclusivity, we empower individuals to thrive and contribute to the digital ecosystem without barriers or discrimination.

Wellbeing

IT Labs prioritizes user well-being by promoting work-life balance, mental health, and personal development. Our solutions incorporate features that support employee wellness, such as flexible scheduling, remote work options, and wellness resources. We also offer training and development programs to support career growth and skill enhancement, promoting overall well-being and job satisfaction. Additionally, we invest in employee health and safety initiatives to create a supportive and inclusive workplace culture that prioritizes the holistic well-being of our team members.

Pricing

Price
£240.00 to £950.00 a unit
Discount for educational organisations
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at vendor@it-labs.com. Tell them what format you need. It will help if you say what assistive technology you use.