BUI is proud to announce its selection as a Managed Extended Detection and Response (MXDR) partner for Microsoft’s new business security services, Microsoft Security Experts.
Microsoft Security Experts was unveiled this month and includes three new managed services: Microsoft Defender Experts for Hunting, Microsoft Defender Experts for XDR, and Microsoft Security Services for Enterprise. Two existing services – Microsoft Security Services for Modernization and Microsoft Security Services for Incident Response – are now also part of this portfolio.
As an MXDR partner, BUI will work in conjunction with Microsoft to manage extended detection and response services for some of the largest enterprise customers globally, from threat monitoring to mitigation and investigation.
“We’re excited to continue our security journey with Microsoft,” says BUI Managing Director Ryan Roseveare. “This new collaboration builds on our longstanding relationship, and we look forward to working alongside Microsoft to help customers protect and defend their IT environments from emerging cyberthreats.”
In 2021, Microsoft security technology blocked over 9.6 billion malware threats and more than 35 billion phishing emails and malicious messages. “Technology is critical, but it’s the combination of leading technologies, comprehensive threat intelligence, and highly skilled people that makes for a truly effective security posture,” notes Vasu Jakkal, Microsoft Corporate Vice President: Security, Compliance, Identity, and Management.
Roseveare agrees. “The cybersecurity landscape is incredibly complex. You need comprehensive tools and holistic knowledge to navigate it successfully. Here at BUI, we’ve focused on building both: our Cyber Security Operations Centre is a state-of-the-art facility designed to leverage and integrate with Microsoft technology, and our security specialists are world-class technologists with a deep understanding of the challenges that businesses are facing today.”
BUI’s tried-and-tested blend of people, process and technology will be critical going forward, adds Roseveare, given the alarming increase in the number and sophistication of cyberattacks.
BUI was part of a select group of Microsoft Partner organisations involved in the development of Microsoft Security Experts. As a Microsoft Azure Expert MSP, a managed security service provider, and a member of the Microsoft Intelligent Security Association, BUI is consistently recognised as a strategic partner for cybersecurity innovation. BUI holds nine Microsoft Advanced Specializations – including Cloud Security and Threat Protection – and earned Microsoft South Africa’s Security Partner of the Year Award in 2021, 2020, and 2019.
“We’re serious about security. We always have been,” says Roseveare. “We’ve earned the trust and loyalty of customers around the world because we provide the best possible security solutions and the right advice. As an MXDR partner for the Microsoft Security Experts portfolio, we’ll continue to put our expertise to work for customers – because we’re here to help them safeguard their business resources, from the endpoint to the cloud,” he concludes.
Cybercriminals are targeting businesses large and small to try to gain access to sensitive, confidential, or proprietary data and resources.
What steps have you taken to prevent a breach? Stay ahead of threat actors by choosing a managed detection and response service from BUI.
More than 80% of enterprises had embarked on a hybrid workplace journey by the middle of 2021. Today, the combination of on-site, remote, and mobile productivity is considered part of the new normal – but it also presents significant challenges for corporate cybersecurity teams.
With employees working from so many different locations, using multiple devices and methods of connectivity, managing and monitoring endpoints is a demanding job. And the task is further complicated by the status quo: as personal and professional lives overlap, the lines between home equipment and business equipment are being blurred.
In a recent survey, 46% of employees admitted using their corporate laptop for “life admin” – including online shopping and social media – and 30% said they had allowed someone else to use their work device.
Alongside these emerging trends in device use and misuse, there is substantial evidence that the cyberthreat landscape has been changed irrevocably – by the COVID-19 pandemic and by rapid digital transformation. As the world grappled with the first wave of coronavirus cases in early 2020, there was a 238% spike in cyberattack volume.
Threat actors took advantage of the sudden shift to home-based and remote productivity – and no industry was spared. Miners, manufacturers, financial institutions, healthcare providers, retail outlets, non-profit organisations, and even schools and universities were targeted. Unsecured endpoints – from smartphones to printers – were often exploited during these cyberattacks.
According to the International Data Corporation, 70% of all successful network breaches begin on endpoint devices. To safeguard your enterprise network, you need to monitor every endpoint. You need to apply controls and restrictions. You need to identify anomalies. And you need to respond to threats as they occur. How does your endpoint security strategy measure up?
For comprehensive security, you have to be able to identify, assess, and remediate endpoint vulnerabilities and threats in real time. Loopholes and misconfigurations are weaknesses that cybercriminals will try to exploit.
To minimise your exposure to cybercrime, you have to reduce your attack surface. With stringent controls for devices, applications, and folders, plus comprehensive defences against network intrusions and malware, you can lessen the risk to your resources.
When you’re proactive about threat hunting within your IT environment, you can harness the power of machine learning, big data, and advanced analytics to detect suspicious behaviours and malicious activities on endpoints – and remediate cyberthreats when they occur.
High volumes of security alerts and notifications can overwhelm corporate cybersecurity teams and delay their response times. Leverage the security tools at your disposal and apply decision-making algorithms to investigate and resolve security issues automatically, and at scale.
Continuous threat intelligence from endpoints is critical to help your security teams provide robust protection across your enterprise environment. With full endpoint visibility, you will be better positioned to eliminate potential penetration points, monitor emerging threats, and improve your overall security posture.
Microsoft Defender for Endpoint uses a combination of technologies built into Windows 10 and Microsoft’s cloud service to generate continuous threat intelligence.
Talk to our experts to learn more about Defender for Endpoint’s advanced threat protection, centralised management, and detailed reporting features.