Expert services for you

Consultants

We offer expert services within data center infrastructure & security with strong focus on the identity area. We can help you regardless if you are running an isolated on premise environment, using a hybrid approach or going for cloud native. Our experience spans both from pure IT environments to OT environments with strong security demands.

Concepts include for example:

  • Active Directory
  • Azure Active Directory
  • ADFS
  • PKI
  • HSM

Trusted security model

AD Tier model

Implementing a tiered administrative model significantly enhances the security. Benefits also includes

  • Lower likelihood for security incidents
  • Reduced impact from incidents
  • Clear roles & responsibilities
  • Standardization & better structure
  • More mature security awareness & process adherence

 

We have a standardized model for implementing a Tier model which enforces strong security and harden the environment, including logging & compliance. Our proven model only relies on built-in functionality in Windows Server OS. Our standardized package includes:

  • Naming convention
  • OU Structure
  • Delegation concept
  • Tier Guard concept
  • Privileged Access Workstations (PAW)
  • Admin/Jump server hardening
  • Secure PKI with certificate management
  • Admin MFA logon (i.e. with YubiKey)
  • Physical hosting, backup & storage scenarios
  • Automation
We believe that securing Active Directory is necessary for every organization. We know however that each organization is unique with different demands, technical conditions & limitations. Therefore, the analyze will show the plan needed to cover the gaps. 

Analyze

Present & plan

Implementation

Audit & Followup

Fixed delivery

Health check

Conducting an Active Directory Health Check is a good way to get an insight of the health and stability of your existing Directory Services deployment, including PKI. The health check also verifies the security posture in your environment. 

It is recommended to perform ADHCs and ensure good health before an upgrade, acquisition or when you just need to know the status of you core infrastructure service that manages the authentication and authorization.

Findings

Remediation

Trusted delivery

Operations

Based on the need, we can offer services to maintain the security level according to what is delivered. This can include audit, monitoring or compliance checks on a daily, weekly or monthly basis. 

We can check for adherence to procedures (naming standards & processes), delegation concepts, security solutions and operational (patch level).

Auditing & compliance

Security monitoring

Lifecycle & maintenance