Home
%3CLINGO-SUB%20id%3D%22lingo-sub-566494%22%20slang%3D%22en-US%22%3EInSpark%20modernizes%20cloud%20security%20with%20managed%20services%20solution%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-566494%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3E%3CEM%3EGreetings!%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CEM%3EThis%20is%20Sue%20Bohn%2C%20director%20of%20program%20management%20%3C%2FEM%3E%3C%2FSPAN%3E%3CEM%3Efor%20Identity%20and%20Access%20Management.%20I%E2%80%99m%20always%20excited%20to%20share%20our%20partners%E2%80%99%20experiences%20with%20you.%20Today%E2%80%99s%20post%20is%20really%20special%20because%20we%E2%80%99re%20talking%20with%20InSpark%2C%20the%202018%20Country%20of%20the%20Year%20Partner%20and%202019%20Microsoft%20Security%20and%20Compliance%20Partner%20of%20the%20Year!%20Read%20what%20CTO%20Stefan%20Daelemans%20has%20to%20say%20about%20Cloud%20Security%20Center%2C%20the%20company%E2%80%99s%20managed%20security%20and%20compliance%20services%20solution%2C%20and%20its%20impact%20on%20InSpark%E2%80%99s%20customers%20and%20the%20business.%20A%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.google.com%2Fsearch%3Fq%3Dopportunity%2Bmeets%2Bpreparation%26amp%3Brlz%3D1C1NDCM_enUS821US821%26amp%3Boq%3Dopportuity%2Bmeets%2B%26amp%3Baqs%3Dchrome.1.69i57j0l5.7576j1j7%26amp%3Bsourceid%3Dchrome%26amp%3Bie%3DUTF-8%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CEM%3ERoman%20philosopher%3C%2FEM%3E%3C%2FA%3E%3CEM%3Eonce%20said%20that%20%E2%80%9CSuccess%26nbsp%3Bis%26nbsp%3Bwhere%20preparation%20meets%20opportunity.%E2%80%9D%26nbsp%3BRead%20on%20to%20find%20out%20why%20InSpark%20is%20so%20successful.%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId-1988948478%22%20id%3D%22toc-hId-1988948478%22%3E%3CFONT%20size%3D%224%22%3E%3CFONT%20size%3D%225%22%3EIdentifying%20customer%20security%20challenges%3C%2FFONT%3E%3CSTRONG%3E%3CBR%20%2F%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3EAt%20InSpark%2C%20we%20spend%20a%20lot%20of%20time%20helping%20customers%20as%20their%20organizations%20go%20through%20a%20digital%20transformation.%20In%20that%20process%2C%20we%20incrementally%20underwent%20our%20own%20transformation.%20As%20a%20business%20who%20delivered%20our%20cloud%20security%20expertise%20through%20a%20project-based%20approach%2C%20we%20transformed%20the%20delivery%20of%20cloud%20security%20to%20a%20managed-first%20security%20service.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAbout%20three%20years%20ago%2C%20we%20established%20a%20separate%20security%20practice%20focused%20specifically%20on%20the%20cloud.%20We%20set%20up%20a%20team%20to%20secure%20cloud%20environments%20for%20customers%20because%20we%20saw%20that%20traditional%20(meaning%20on-premises)%20security%20providers%20were%20struggling%20to%20protect%20the%20new%2C%20often%20PaaS%20or%20SaaS%2C%20cloud%20environments.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIdentity%20is%20the%20most%20important%20element%20when%20you%20talk%20about%20cloud%20security.%20It%E2%80%99s%20usually%20how%20we%20start%20a%20conversation%20with%20a%20customer.%20Maintaining%20a%20secure%20baseline%20across%20on-premises%20and%20cloud%20environments%20is%20challenging.%20It%20requires%20constant%20updating%20and%20oversight.%20When%20we%20followed%20up%20with%20customers%20after%20a%20project%20ended%2C%20we%20saw%20consistently%20how%20difficult%20it%20was%20for%20them%20to%20maintain%20the%20secure%20baseline%20environment%20that%20we%20set%20up%20for%20them%20mostly%20because%20admins%20weren%E2%80%99t%20following%20the%20rules%20that%20we%20set%20up%20for%20a%20cloud%20environment%20or%20customers%20didn%E2%80%99t%20have%20time%20to%20evaluate%20and%20implement%20new%20features%20when%20they%20were%20released.%20Either%20way%2C%20there%20was%20a%20significant%20drop%20in%20the%20customer%E2%80%99s%20security%20profile%20and%20state.%20It%20became%20obvious%20that%20our%20customers%20needed%20a%20solution%20for%20this.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId--563208483%22%20id%3D%22toc-hId--563208483%22%3E%3CFONT%20size%3D%225%22%3ECloud%20Security%20Center%20provides%20protect%2C%20detect%2C%20and%20response%20services%20%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3EOur%20customers%20were%20struggling%20to%20create%20a%20secure%20baseline%20in%20the%20cloud%20and%20manage%20the%20security%20incidents%20generated%20by%20Microsoft%E2%80%99s%20evergreen%20security%20services.%20We%20knew%20it%20was%20difficult%20for%20them%20to%20integrate%20the%20solutions%20and%20hire%20staff%20with%20the%20right%20level%20of%20security%20expertise%E2%80%94and%20it%E2%80%99s%20expensive%20to%20set%20up%20and%20run%20a%20security%20organization.%20Since%20we%20had%20the%20knowledge%20and%20skills%20that%20our%20customers%20lacked%2C%20we%20decided%20that%20security%20in%20the%20cloud%20world%20needed%20to%20be%20delivered%20through%20a%20managed%20security%20service%20that%20we%20would%20create%20ourselves.%20That%E2%80%99s%20how%20we%20got%20into%20the%20managed%20security%20business.%20We%20started%20with%20our%20Cloud%20Security%20Center%20(CSC)%20to%20offer%20protect%2C%20detect%2C%20and%20response%20services%20in%20a%20managed%20way%20that%20would%20let%20us%20deliver%20security%20designs%2C%20implement%20baselines%20for%20customers%2C%20and%20also%20include%2024%2F7%20detect%20and%20response%20services.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECloud%20Security%20Center%20consists%20of%20IP%20that%20implements%20all%20Microsoft%20security%20services%20in%20a%20highly%20automated%20way%2C%20following%20the%20guidance%20from%20the%20National%20Institute%20of%20Standards%20and%20Technology%20(NIST)%20cybersecurity%20framework.%20We%20use%20different%20Microsoft%20security%20services%20during%20each%20phase%20of%20protect%2C%20detect%2C%20and%20respond.%20Azure%20Active%20Directory%20Identity%20Protection%2C%20Azure%20Security%20Center%2C%20Azure%20Sentinel%2C%20and%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20(Microsoft%20Defender%20ATP)%20are%20the%20four%20services%20that%20we%20use%20a%20lot.%20Here%E2%80%99s%20a%20description%20of%20the%20Microsoft%20services%20that%20we%20use.%3CBR%20%2F%3E%3CFONT%20size%3D%225%22%3E%26nbsp%3B%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F123296iE9ED6D60219963B2%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Inspark1.jpg%22%20title%3D%22Inspark1.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH1%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20inherit%3B%20font-family%3A%20inherit%3B%20font-size%3A%2030px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20normal%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.2%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%20margin%3A%2024px%200px%2012px%200px%3B%22%20id%3D%22toc-hId-1179601852%22%20id%3D%22toc-hId-1179601852%22%3E%3CFONT%20size%3D%225%22%20style%3D%22box-sizing%3A%20border-box%3B%22%3ECustomers%20enjoy%20security%20features%20in%20Azure%20AD%20and%20Microsoft%20365%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3EMany%20of%20our%20customers%20have%20a%20hybrid%20environment%20with%20an%20on-premises%20Active%20Directory%20extended%20into%20their%20Azure%20Active%20Directory%20(Azure%20AD).%20For%20identity%20management%2C%20we%20install%20services%20like%20Azure%20AD%20Identity%20Protection%20and%20Azure%20ATP%20to%20configure%20automated%20responses%20to%20suspicious%20actions%20and%20mitigate%20risks%20by%20proactively%20preventing%20identities%20from%20being%20abused%20and%20compromised.%20That%E2%80%99s%20a%20game%20changer%20because%20the%20service%E2%80%99s%20security%20features%20help%20convince%20customers%20to%20move%20to%20the%20cloud.%20Customers%20also%20like%20Azure%20AD%20Privileged%20Identity%20Management%20(PIM)%20because%20it%20helps%20them%20easily%20mitigate%20the%20risk%20of%20excessive%2C%20unnecessary%2C%20or%20misused%20access%20rights%20through%20just-in-time%20access.%20Then%20we%20built%20an%20integration%20layer%20that%20coordinates%20Microsoft%20services%2C%20manages%20tickets%20and%20processes%2C%20and%20links%20access%20requests%20managed%20by%20PIM%20to%20tickets%20in%20our%20Cloud%20SOC.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOur%20motto%20is%20%E2%80%9Cinnovate%20to%20accelerate%E2%80%9D%20and%20our%20client%20Vebego%20is%20a%20good%20example%20of%20CSC%20in%20action.%20Vebego%2C%20an%20international%20company%20that%20is%20active%20in%20facility%20services%20and%20healthcare%20with%20over%2035%2C000%20employees%2C%20wanted%20to%20replace%20their%20existing%20security%20solution.%20Using%20CSC%2C%20the%20company%20went%20from%20no%20active%20security%20features%20to%20having%20all%20Microsoft%20365%20E5%20features%20deployed%20and%20enabled%20within%20three%20months.%20Additionally%2C%20the%20company%20is%20using%20our%20custom%20portal%20for%20on-boarding%2C%20threat-and-vulnerability%20insights%20and%20reporting.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId--1372555109%22%20id%3D%22toc-hId--1372555109%22%3E%3CFONT%20size%3D%225%22%3EThe%20lasting%20result%20of%20innovation%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3EAccelerating%20our%20customers'%20business%20with%20impactful%20innovations%20is%20why%20we%20come%20to%20work%20every%20day.%20With%20Cloud%20Security%20Center%2C%20we%20created%20a%20standard%20solution%2C%20automated%20it%2C%20and%20made%20it%20easy%20to%20deploy%20and%20scale.%20It%20means%20the%20world%20to%20us%20to%20get%20validation%20by%20winning%20the%202019%20Microsoft%20Global%20Security%20%26amp%3B%20Compliance%20Partner%20of%20the%20Year%20Award.%20We%20want%20our%20customers%20to%20have%20lasting%20results%20%E2%80%93%20that%E2%80%99s%20why%20we%20moved%20to%20a%20managed%20service%20model.%20We%E2%80%99re%20proud%20of%20this%20recognition%20of%20our%20commitment%20to%20cloud%20security%20and%20strong%20partnerships.%20We%E2%80%99ve%20also%20received%20great%20feedback%20from%20our%20customers%20%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eand%20we%E2%80%99ve%20more%20than%20doubled%20the%20managed%20business%20revenue%20in%20just%20six%20months%20with%20our%20CSC.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20the%20future%2C%20we%20want%20to%20continue%20working%20with%20Azure%20Sentinel%20to%20deliver%20an%20integrated%20and%20%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eand%20add%20custom%20Threat%20Intelligence%20by%20integrating%20an%20Open%20Source%20Threat%20Intelligence%20Platform%20(MISP)%20for%20early%20detection%20of%20zero-day%20malware%20attacks.%20We%E2%80%99re%20also%20working%20on%20ways%20to%20expand%20CSC%20beyond%20the%20Dutch%20market%20and%20make%20it%20available%20to%20other%20partners%20and%20customers%20in%20the%20Microsoft%20ecosystem%20by%20licensing%20the%20IP%20and%20software%20that%20we%20created.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId-370255226%22%20id%3D%22toc-hId-370255226%22%3E%3CFONT%20size%3D%225%22%3ELearn%20more%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3E%3CSPAN%3E%3CEM%3EI%20hope%20you%20enjoyed%20reading%20about%20the%20InSpark%20and%20Cloud%20Solution%20Center.%20Again%2C%20we%20congratulate%20them%20for%20their%20innovative%20solution.%20In%20the%20meantime%2C%20stay%20tuned%20for%20more%20%3C%2FEM%3E%3C%2FSPAN%3E%3CEM%3Estories%20about%20Azure%20AD%20and%20identity%20management%20and%20check%20out%20the%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Active-Directory-Identity%2Fbg-p%2FIdentity%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3E%3CEM%3EAzure%20Active%20Directory%20Identity%20Blog%20series%3C%2FEM%3E%3C%2FA%3E%3CEM%3Eto%20read%20more.%20%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CEM%3EExplore%20the%20partner%20companies%20and%20their%20solutions%20from%20around%20the%20globe%20who%20were%20Partner%20of%20the%20Year%20winners%20or%20finalists%20%3C%2FEM%3E%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fpartner.microsoft.com%2Fen-us%2Finspire%2Fawards%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CEM%3Ehere%3C%2FEM%3E%3C%2FA%3E%3CSPAN%3E%3CEM%3E.%20%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-566494%22%20slang%3D%22en-US%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%20vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20style%3D%22font-size%3A%2011.0pt%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%22%3ELearn%20how%20InSpark%20moved%20to%20a%20managed%20security%20services%20and%3C%2FSPAN%3E%3CSPAN%20style%3D%22font-size%3A%2011.0pt%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%22%3Edoubled%20managed%20service%20revenue%20in%20just%20six%20months.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Microsoft

Greetings!

 

This is Sue Bohn, director of program management for Identity and Access Management. I’m always excited to share our partners’ experiences with you. Today’s post is really special because we’re talking with InSpark, the 2018 Country of the Year Partner and 2019 Microsoft Security and Compliance Partner of the Year! Read what CTO Stefan Daelemans has to say about Cloud Security Center, the company’s managed security and compliance services solution, and its impact on InSpark’s customers and the business. A Roman philosopher once said that “Success is where preparation meets opportunity.” Read on to find out why InSpark is so successful.

Identifying customer security challenges

At InSpark, we spend a lot of time helping customers as their organizations go through a digital transformation. In that process, we incrementally underwent our own transformation. As a business who delivered our cloud security expertise through a project-based approach, we transformed the delivery of cloud security to a managed-first security service.

 

About three years ago, we established a separate security practice focused specifically on the cloud. We set up a team to secure cloud environments for customers because we saw that traditional (meaning on-premises) security providers were struggling to protect the new, often PaaS or SaaS, cloud environments.

 

Identity is the most important element when you talk about cloud security. It’s usually how we start a conversation with a customer. Maintaining a secure baseline across on-premises and cloud environments is challenging. It requires constant updating and oversight. When we followed up with customers after a project ended, we saw consistently how difficult it was for them to maintain the secure baseline environment that we set up for them mostly because admins weren’t following the rules that we set up for a cloud environment or customers didn’t have time to evaluate and implement new features when they were released. Either way, there was a significant drop in the customer’s security profile and state. It became obvious that our customers needed a solution for this.

Cloud Security Center provides protect, detect, and response services

Our customers were struggling to create a secure baseline in the cloud and manage the security incidents generated by Microsoft’s evergreen security services. We knew it was difficult for them to integrate the solutions and hire staff with the right level of security expertise—and it’s expensive to set up and run a security organization. Since we had the knowledge and skills that our customers lacked, we decided that security in the cloud world needed to be delivered through a managed security service that we would create ourselves. That’s how we got into the managed security business. We started with our Cloud Security Center (CSC) to offer protect, detect, and response services in a managed way that would let us deliver security designs, implement baselines for customers, and also include 24/7 detect and response services.

 

Cloud Security Center consists of IP that implements all Microsoft security services in a highly automated way, following the guidance from the National Institute of Standards and Technology (NIST) cybersecurity framework. We use different Microsoft security services during each phase of protect, detect, and respond. Azure Active Directory Identity Protection, Azure Security Center, Azure Sentinel, and Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) are the four services that we use a lot. Here’s a description of the Microsoft services that we use.
 

Inspark1.jpg

 

Customers enjoy security features in Azure AD and Microsoft 365

Many of our customers have a hybrid environment with an on-premises Active Directory extended into their Azure Active Directory (Azure AD). For identity management, we install services like Azure AD Identity Protection and Azure ATP to configure automated responses to suspicious actions and mitigate risks by proactively preventing identities from being abused and compromised. That’s a game changer because the service’s security features help convince customers to move to the cloud. Customers also like Azure AD Privileged Identity Management (PIM) because it helps them easily mitigate the risk of excessive, unnecessary, or misused access rights through just-in-time access. Then we built an integration layer that coordinates Microsoft services, manages tickets and processes, and links access requests managed by PIM to tickets in our Cloud SOC.

 

Our motto is “innovate to accelerate” and our client Vebego is a good example of CSC in action. Vebego, an international company that is active in facility services and healthcare with over 35,000 employees, wanted to replace their existing security solution. Using CSC, the company went from no active security features to having all Microsoft 365 E5 features deployed and enabled within three months. Additionally, the company is using our custom portal for on-boarding, threat-and-vulnerability insights and reporting.

The lasting result of innovation

Accelerating our customers' business with impactful innovations is why we come to work every day. With Cloud Security Center, we created a standard solution, automated it, and made it easy to deploy and scale. It means the world to us to get validation by winning the 2019 Microsoft Global Security & Compliance Partner of the Year Award. We want our customers to have lasting results – that’s why we moved to a managed service model. We’re proud of this recognition of our commitment to cloud security and strong partnerships. We’ve also received great feedback from our customers  and we’ve more than doubled the managed business revenue in just six months with our CSC.

 

For the future, we want to continue working with Azure Sentinel to deliver an integrated and  and add custom Threat Intelligence by integrating an Open Source Threat Intelligence Platform (MISP) for early detection of zero-day malware attacks. We’re also working on ways to expand CSC beyond the Dutch market and make it available to other partners and customers in the Microsoft ecosystem by licensing the IP and software that we created.

Learn more

I hope you enjoyed reading about the InSpark and Cloud Solution Center. Again, we congratulate them for their innovative solution. In the meantime, stay tuned for more stories about Azure AD and identity management and check out the Azure Active Directory Identity Blog series to read more.

 

Explore the partner companies and their solutions from around the globe who were Partner of the Year winners or finalists here.