India Information Technology Act Assessment (refer Microsoft Purview) | Audit and Compliance | No | Yes | Yes | Conducting assessments to ensure compliance with the India Information Technology Act. | Annually |
India DPDPA (refer Microsoft Purview) | Audit and Compliance | No | Yes | Yes | Conducting assessments to ensure compliance with the India Data Protection and Privacy Act (DPDPA). | Annually |
Daily Review | Threat Protection | Yes | Yes | Yes | Regular monitoring and review of threat protection measures. | Daily |
Monthly Reports based on the Managed Services Plan | Information Protection | Yes | Yes | Yes | Providing monthly reports on the status and performance of managed services. | Monthly |
Device Lifecycle Management | Device Management | No | Yes | Yes | Managing the lifecycle of devices, including provisioning, maintenance, and decommissioning. | As Needed |
Monthly Review and Update “Deployment Status” Sheet using “SecureIT 365 Plan of Action” Template | Audit and Compliance | No | Yes | Yes | Regularly reviewing and updating the deployment status sheet using the SecureIT 365 Plan of Action template. | Monthly |
Multi-Factor Authentication (MFA) Setup | Identity and Access | Yes | Yes | Yes | Setting up MFA for enhanced security. | One-Time |
Conditional Access Policies | Identity and Access | No | Yes | Yes | Implementing conditional access policies to enhance security. | As Needed |
Self-Service Password Reset | Identity and Access | No | Yes | Yes | Enabling self-service password reset for users. | One-Time |
Identity Protection Policies | Identity and Access | No | Yes | Yes | Setting up identity protection policies. | As Needed |
Advanced Threat Protection | Threat Protection | No | No | Yes | Enhanced monitoring and response to advanced threats. | Continuous |
Data Loss Prevention (DLP) Policies | Information Protection | No | No | Yes | Implementing DLP policies to prevent data breaches. | As Needed |
Advanced Compliance Management | Audit and Compliance | No | No | Yes | Comprehensive compliance management and reporting. | Quarterly |
Custom Security Policies | Security Management | No | No | Yes | Developing and implementing custom security policies tailored to the customer’s needs. | As Needed |
Endpoint Detection and Response (EDR) | Threat Protection | No | No | Yes | Continuous monitoring and response to endpoint threats. | Continuous |
Secure Email Gateway | Email Security | No | Yes | Yes | Protecting against email-based threats such as phishing and malware. | Continuous |
Mobile Device Management (MDM) | Device Management | No | Yes | Yes | Managing and securing mobile devices used within the organization. | Continuous |
Backup and Disaster Recovery | Data Protection | No | No | Yes | Ensuring data is backed up and can be recovered in case of a disaster. | Daily/Weekly |
Security Awareness Training | User Training | No | Yes | Yes | Training users on security best practices and threat awareness. | Quarterly |
Application Whitelisting | Application Security | No | No | Yes | Allowing only approved applications to run on devices. | As Needed |