SERVICES
Cloud & Server Security Reviews
Weakly configured servers or cloud environments can significantly increase the risk of compromise and make it easier for an attacker to pivot onto other machines. Our security reviews deliver a consolidated view of your system’s security configuration and highlight improvements that can help you further harden the system.
Microsoft 365 Security Configuration Review
There is a common misconception that Microsoft 365, used by around 46% of businesses worldwide, is fully secured by default. While the tenant enables some of the security configurations by default, many of the security features must be manually configured. In additional, human-introduced misconfigurations and security weaknesses can also arise.
Our Microsoft 365 Security Configuration Review provides a comprehensive evaluation of your tenant’s security configuration in alignment with the CIS Microsoft 365 Benchmark. The review covers a range of cyber security best practices including, but not limited to, the following areas:
- Accounts and Authentication Access Control and Permissions
- Mobile Device Management Azure AD Security
- Email Security Configuration
- SharePoint Security
- External Resources Management
- Events and Login
Server Security Configuration Review
- Identification and Authentication
- Access Control
- Events and Logging
- System and Information Integrity
- System and communications protection
- System and services acquisition
- Media Protection
Why Predatech?
Qualified Security
Experts
Assessments undertaken by CREST Registered Penetration Testers.
Clear & Focused
Reporting
Findings reported in plain English and prioritised to help you focus on what really matters.
Competitive
Pricing
Competitive quotes tailored to your business with no hidden costs.
Customer
Satisfaction
Proven track record of meeting and exceeding customer expectations.
Latest Blogs
ISO 27001: Introduction & Certification Process
- Chris Massey|
- 09.09.2024|
DEF CON 32 Highlights
- Chris Massey|
- 15.08.2024|
Capturing and Cracking WPA/WPA2 WiFi Passwords with Kali Linux
- Nicholas Ray|
- 29.07.2024|
ISO 27001: Introduction & Certification Process
- Chris Massey|
- 09.09.2424|
DEF CON 32 Highlights
- Chris Massey|
- 15.08.2424|
Capturing and Cracking WPA/WPA2 WiFi Passwords with Kali Linux
- Nicholas Ray|
- 29.07.2424|
1,000 Cyber Essentials & Cyber Essentials Plus Certificates Issued
- Michael Fotis|
- 03.07.2424|
Other
Services
Predatech offers a range of security testing services and products, from vulnerability assessments to penetration testing.
Penetration
Testing
Conduct in-depth testing of your systems using a range of advanced manual techniques to identify vulnerabilities.
Cyber Essentials
Certification
Support, assess, and certify your business in the Government-backed Cyber Essentials or Cyber Essentials Plus certifications.
ISO 27001 & IASME Cyber Assurance
Support to achieve ISO 27001 or IASME Cyber Assurance.