Reduce vulnerability for your customers, and yourself.
Businesses are increasingly aware that standing still is essentially going backwards when it comes to security. There’s greater readiness to invest in their security posture, and many will turn to their service providers for advice.
If your customers asked you to review their Microsoft cloud security today, could you confidently assess vulnerabilities beyond familiar security controls? Mmany partners know it is difficult to be sure of what Microsoft 365 and Azure assets your clients are using, or to even be sure that what you do know is correct and complete.
That’s where a Crayon Cloud Security Assessment comes in.
What is a Crayon Cloud Security Assessment?
The new Crayon Cloud Security Assessment is a true through-partner service that is purpose-built to gather configration data from a Microsoft 365 tenant, Azure tenant, and in some cases, on-premises.
We provide the technical framework and skillsets to run the process, analyse findings, and create a comprehensive report, complete with actionable recommendations, such as:
– What must be done immediately to secure a vulnerability
– What is realistically achievable in 30 days, 3 months, 6 months
– How to achieve the recommendations
– Which mitigations may require assistance to undertake
The full report is provided back to our partners to help guide discussions and plan necessary actions with their customers.
A Crayon Cloud Security Assessment can create opportunities to add significant value to your customers, reduce unrecognised risk and liability on your part as the service provider and earn healthy margin along the way.
M365 Cloud Security Assessment
Comprehensive analysis of Microsoft 365, endpoints, Active Directory and Azure Active Directory, EoL, software, vulnerable software, application risk, missing and/or misconfigured technical security controls.
Azure Cloud Security Assessment
Comprehensive analysis of Azure, network security groups, vulnerable software, application risks, Defender for Cloud, missing and/or misconfigured technical security controls.
Frequently Asked Questions
If the client is from a regulated industry or has a strong interest in security then yes, otherwise Crayon tends to find that very small orgs do not have the capacity to successfully benefit from a security assessment. An assessment should be considered the first step in a process to improve security posture.
The total time required from the client is around 4-5 hours depending on the workshop components, these are very important in the security posture is more than just about products, it is also very much a process and people issue. The automated scan will run over a period of 2 weeks ideally and will not need client interaction.
The Assessment requires the client to have an azure landing zone that can be used to deploy a virtual image.
All sensitive data remains within the VM and the customers Azure instance, Crayon can read this data for the purpose of providing advisory, none of this data leaves the clients azure tenant and only metadata is retained by Crayon for our security analysts to build a report. After the scan is finished the client can log on to the VM for specific information and data and remove the VM when they no longer require the detailed information.
Latest offers at rhipe
Helping our partners offer a better cloud
Support as a Service
Our team is your team. Support your customers will love.Support as a Service
Skilled experts to help pitch, win and deliver cloud projects.Technical Services
Marketing as a Service
Smart targeting strategies to get leads flowing and more wins on your board.Marketing as a Service
Talk to us today about the Crayon Cloud security assessment service
Contact us to learn how to sign up to the Crayon Cloud security assessment service, or to speak to one of our experts about how you can enhance your business with Crayon. Submit your details here and a member of our team will reach out to you.