SERVICES

Cloud & Server Security Reviews

Weakly configured servers or cloud environments can significantly increase the risk of compromise and make it easier for an attacker to pivot onto other machines. Our security reviews deliver a consolidated view of your system’s security configuration and highlight improvements that can help you further harden the system.

Microsoft 365 Security Configuration Review

There is a common misconception that Microsoft 365, used by around 46% of businesses worldwide, is fully secured by default. While the tenant enables some of the security configurations by default, many of the security features must be manually configured. In additional, human-introduced misconfigurations and security weaknesses can also arise.

Our Microsoft 365 Security Configuration Review provides a comprehensive evaluation of your tenant’s security configuration in alignment with the CIS Microsoft 365 Benchmark. The review covers a range of cyber security best practices including, but not limited to, the following areas:

  • Accounts and Authentication Access Control and Permissions
  • Mobile Device Management Azure AD Security
  • Email Security Configuration
  • SharePoint Security
  • External Resources Management
  • Events and Login

Server Security Configuration Review

In today’s fast-paced digital landscape, your server infrastructure serves as the backbone of your organisation’s IT operations. Ensuring that your servers are securely configured, and maintained is critical to reducing the risk of compromise.
 
Our Windows & Linux Server Security Configuration Reviews will evaluate your Windows or Linux server build configuration against the relevant CIS server benchmark to identify areas that can be hardened. The review will include, but is not limited to, the following areas:
 
  • Identification and Authentication
  • Access Control
  • Events and Logging
  • System and Information Integrity
  • System and communications protection
  • System and services acquisition
  • Media Protection

Why Predatech?

Qualified Security
Experts

Assessments undertaken by CREST Registered Penetration Testers.

Clear & Focused
Reporting

Findings reported in plain English and prioritised to help you focus on what really matters.

Competitive
Pricing

Competitive quotes tailored to your business with no hidden costs.

Customer
Satisfaction

Proven track record of meeting and exceeding customer expectations.

Latest Blogs

DEF CON 32 Highlights

Once again, Predatech’s technical team made the trip to DEF CON 32! DEF CON is the world’s largest annual gathering of hackers, researchers and security professionals,…
READ MORE

DEF CON 32 Highlights

Once again, Predatech’s technical team made the trip to DEF CON 32! DEF CON is the world’s largest annual gathering of hackers, researchers and security professionals,…
READ MORE

Other
Services

Predatech offers a range of security testing services and products, from vulnerability assessments to penetration testing.

Penetration
Testing

Conduct in-depth testing of your systems using a range of advanced manual techniques to identify vulnerabilities.

Cyber Essentials
Certification

Support, assess, and certify your business in the Government-backed Cyber Essentials or Cyber Essentials Plus certifications.

ISO 27001 & IASME Cyber Assurance

Support to achieve ISO 27001 or IASME Cyber Assurance.