Technology Record - Issue 25: Summer 2022

54 “Fastpath Solutions integrates seamlessly with Microsoft Azure Portal and Azure Active Directory to help analyse current user access and maintain compliant user provisioning by detecting and preventing improper access that would introduce risk into your organisation. Fastpath also extends Microsoft’s Azure Identity Governance solution by allowing customers to include our world-class segregation of duties analysis engine in their assignment workflow. By using these Fastpath solutions, our customers can ensure they are following security best practices and helping stop internal and external threats.” Frank Vukovits Director of Strategic Partnerships, Fastpath Solutions Richard McPhee Solutions Director, Gamma “Gamma ensures that our customers’ services are never exposed or compromised. We follow industry best practices such as the CIS Benchmarks and the National Cyber Security Centre’s guidance for our government contracts. While a Microsoft Azure environment can look different from traditional on-premises data centres, a lot of the principles, such as auditing, multi-factor authentication and data encryption, are similar and still apply. The main difference is that a Microsoft Azure environment offers an array of optional powerful tools and suites, designed with securing cloud environments in mind. We use these to help lock down our customer environments to secure them against cyberattacks.” David Murrell Director of Strategic Partnerships, ITC Secure “As a Microsoft Gold Security Partner and MISA member with Microsoft Security, Compliance and Identity practices, we have advanced insight into Microsoft's security products, including Microsoft Sentinel, Defender for Endpoint, Defender for Cloud, Defender for IoT, and its rapidly developing risk and compliance offerings. This knowledge, coupled with our 24/7 security operations centre and managed services, gives us insight into the global threat landscape across industries from our customers’ perspectives and enables us to continuously develop internet protocol. As a result, our customers have access to the most comprehensive and up-to-date security solutions that not only effectively detect, prevent and remediate threats but also enhance visibility via reporting tools such as Power BI and Microsoft Teams.” COV E R S TOR Y

RkJQdWJsaXNoZXIy NzQ1NTk=