https://store-images.s-microsoft.com/image/apps.50900.639ef1c7-4a45-493a-9e79-5409f1e2bb20.28f440de-ced6-4c24-853a-ddc6237e72dd.33e3f87d-2e3f-47dd-836a-a549ab0962b7

Zero Trust Deployment and Optimization Service

Softchoice

Deploy zero trust with confidence, optimize it to deliver lasting outcomes.

This service is delivered in two independent phases: Phase 1: Zero Trust Deployment Two Zero Trust deployment options depending on customer size and requirements: • Modular Zero Trust Implementation Service: Customizable Zero Trust implementation with expanded scope for commercial and enterprise customers. We help customers implement Zero Trust across the following three core pillars. Data Security: We help you identify and address gaps in how your data is managed, protected and secured. From data encryption to loss prevention, we ensure that your sensitive information is governed by the right policies and compliance standards by using Microsoft Purview solutions Identity and Access Management: We assess your current environment, identify vulnerabilities and security gaps and design a solution that ensures the right people can access the right information at the right time. By implementing Entra ID, Microsoft Defender for Identity, Cloud Apps and Office 365, we’ll help you lock down identities and access, reducing risk while strengthening your control over who can access sensitive data. Endpoint Protection: We will help you address gaps in your device security across platforms, operating systems and more ensuring every endpoint is protected. By implementing a “least privileged access model” and leveraging Microsoft Defender for Endpoint and Intune, we ensure your devices remain secure, compliant and easily trackable – so that you can be confident your business is protected, no matter where your employees work from.

• Zero Trust Fundamentals: Low-cost, baseline Zero Trust solution for SMB customers. It includes five modules to create a baseline Zero Trust solution in the following areas Data security: Protect sensitive information and reduce risk with Microsoft Purview Identity and Access Management: Control user access and reduce risk with Microsoft-recommended identity protections using Entra ID Endpoint Protection: Strengthen device security with Microsoft Defender for Endpoint Endpoint Management: Enhance device management with Microsoft Intune Sentinel: Power security operations with Microsoft Sentinel's SIEM and SOAR capabilities.

Phase 2: Zero Trust Optimization Service Includes reviews and tasks to ensure that the desired customer outcomes are met through the implemented solution. It will include • Periodic health-checks to measure the policy performance across Data, Identity and Endpoint pillars. • Review findings with customers and provide recommendations based on Microsoft best practices • Policy optimization – ongoing adjustments to policies to ensure desired outcomes are met Optimization service has three tracks to include Data Optimization: health-check reviews and optimization provided on Purview Information Protection and Purview DLP Identity Optimization: health-check reviews and optimization provided on Entra ID Protection and Microsoft Defender for Identity Endpoint Optimization: health-check reviews and optimization provided on Microsoft Defender for Endpoint and Intune

สรุปย่อ

https://store-images.s-microsoft.com/image/apps.1160.639ef1c7-4a45-493a-9e79-5409f1e2bb20.28f440de-ced6-4c24-853a-ddc6237e72dd.e8e98291-c3df-4d28-84d8-2f7babcd9ddf