Implementation of IDECSI data protection solution
- Risk analysis of permissions granted to IDECSI
- Configuration of user data collection
- Launch of several adoption campaigns
- Change management support
- Drafting of a service catalog (Move to Run)
- Drafting of an N1 support document
Cyber resilience study of backup solutions
- Gathering of customer requirements
- Analysis of existing infrastructure
- Selection of the most suitable technologies
- Contact with editors
- Production of a functional and technical benchmark presenting the advantages and disadvantages of solutions and their various functionalities
- Selection of the final solution.
Comparative study between FireEye and Microsoft Defender for Office for mail protection
- Support for the customer in migrating mailboxes historically hosted on on-premise Exchange servers to the Exchange Online service in the Microsoft cloud
- Comparison of Fireeye and Microsoft Defender for Office 365 solutions
- Drafting of a recipe booklet
- Production of an operating document (DEX) for the Microsoft Defender for Office 365 solution.
Tanium deployment
- Inventory of machines in the environment and monitoring of security solution deployment
- Definition of use cases based on subscribed modules, and implementation of these:
- Support for incident resolution following solution deployment
Support for the deployment of the Zscaler solution
- Collection of customer requirements
- Definition of ZIA and ZPA architecture (Zscaler solution)
- Definition of security policies (PSSI) in line with cyber best practices and customer requirements
- Definition of filtering policies
- Drafting of technical project documentation (DAT, DEX)
- Project management