Advanced Threat Analytics (ATA) is a complex system that allows you to protect your IT infrastructure from a variety of information threats and cyberattacks.

    ATA identifies three main types of threats: cyberattacks, abnormal activities and problems, and security risks.

    ATA technologies can detect many types of suspicious activity at various stages of an attack, including:

    • Collecting information about your infrastructure, during which attackers can get data about the network structure and devices, such as servers, network storage, or PCs
    • Implementation, during which attackers spread malware within the network, using software vulnerabilities or unsafe settings of services and servers
    • Managing a domain, during which the attacker collects information that allows them to resume the attack using different credentials, entry points, and vulnerabilities

    Our objective is to plan, design, and implement Advanced Threat Analytics service.

    IT Partner responsibilities #

    1. Customer infrastructure research for developing appropriate architecture solution
    2. ATA architecture design
    3. Preparation of the environment for the ATA installation
    4. Installation and configuration of the ATA service
    5. Basic introduction of working with ATA

    Client responsibilities #

    1. Coordinate Client resources and staff schedules
    2. Provide a dedicated point of contact responsible for working with IT Partner
    3. Coordinate any outside vendor resources and schedules
    4. Configure all networking equipment, such as load balancers, routers, firewalls, and switches
    5. Review and approve engagement deliverables in a timely manner

    Additional cost items not provided by the project #

    1. Advanced Threats Analytics license
    2. On-premises or hybrid Active Directory domain

    Plan #

    The plan may vary depending on your needs.

    1. Kickoff meeting
    2. Infrastructure research
    3. Preparation of the environment
    4. ATA installation and configuration
    5. Verifying and fixing issues

    Success Criteria #

    1. Advanced Threats Analytics installed successfully
    2. The administrator may use the ATA Center to view reports and notifications

    Related services

    Microsoft Teams - Tenant-to-Tenant Migration

    We will migrate your Microsoft Teams structure and documents from one Microsoft 365 tenant to another Microsoft 365 tenant.

    Password-less Authentication

    The common practice for IT to attempt lessening password risk by employing stronger password complexity, including special characters and demanding more frequent password changes, makes employees' work vastly more complex and decreases their productivity. Most importantly, this approach isn’t enough for current cybersecurity threats and doesn’t deliver on organizational information security needs.

    SKU ITPWW330IMPOT

    Price:
    1950