We’re pleased to announce that we have achieved Fortinet’s Cloud Security Specialization as part of the Fortinet Engage Partner Programme. We’re the first Fortinet partner in South Africa to earn this level of recognition and one of the few partners in the EMEA (Europe, Middle East, and Africa) region currently holding this particular specialization.
Fortinet’s Cloud Security Specialization is awarded only to those partners who have demonstrated the advanced knowledge and skills required to deploy and manage Fortinet’s range of cloud security solutions effectively.
“We’re thrilled with this achievement, and we’re so proud of our people,” says Donovan Vernes, BUI Service Delivery Manager (Network Operations). “Fortinet has very strict qualifying criteria, from technical expertise and experience to sales alignment, and we met every single benchmark.”
The BUI Network and Security teams are already highly certified, with credentials that span the full breadth of the Fortinet certification path, but Vernes emphasises the significance of our new Cloud Security Specialization. “It’s a validation of our cloud capabilities and an acknowledgement of our commitment to deliver the best possible cybersecurity solutions to our customers.”
Cloud adoption continues to accelerate as customers modernise and transform their operations, notes Vernes. “We’re seeing more and more business organisations with public, private, hybrid and multi-cloud environments in play. These complex systems can be challenging to secure – and even more so when there are diverse technologies involved… That’s why customers need experts they can count on to provide consistent, quality service and support. By earning the Fortinet Cloud Security Specialization, I believe BUI has distinguished itself as a trusted security advisor and guide,” he says.
The cost of cybercrime is predicted to hit $8 trillion this year – and no company is immune to the threat posed by cybercriminals. “Organisations of all sizes, across sectors and industries, are potential targets,” warns Vernes, citing statistics from Fortinet’s recent research.
“According to The 2023 Global Ransomware Report, half of enterprises fell victim to a ransomware attack in the last 12 months, and 46% were targeted by ransomware two or more times,” he says, adding that phishing, access via vulnerable ports, and remote desktop exploits were the most common tactics observed.
“Now, more than ever, enterprises should strive for unified security,” advises Vernes. “By integrating your security tools, technologies and systems, you can gather relevant, actionable data from your business sources and gain deeper insights regarding potential threats. This will allow you to close security gaps, enable faster detection and response, and minimise your attack surface.”
As a Fortinet partner, BUI offers professional consultations, reactive support, and managed services tailored for each customer’s security journey. “Our comprehensive security expertise, our advanced security solutions, and our ability to help customers improve their overall security posture sets us apart,” says Vernes.
Cybersecurity is a critical profession in this digital age, but there aren’t enough professionals to meet the global demand. “The skills shortage is a major concern for customers, who want top talent to protect their business resources,” says Vernes.
“As a Fortinet Select Partner, BUI is required to have top talent… Experienced technologists who have undergone specialised training to address the unique security challenges of hyperconnected workplaces. Customers who choose BUI are choosing a team with deep cloud and security expertise and a track record of success.”
As a Cloud Security Specialization partner, BUI has access to Fortinet’s advanced security solutions, including FortiGate Cloud (for the management and maintenance of Fortinet’s FortiGate Next-Generation Firewalls), FortiCASB (Fortinet’s Cloud Access Security Broker for monitoring security risks), and FortiCWP (Fortinet’s Cloud Workload Protection solution).
“There’s a wide range of Fortinet tools available to give customers greater visibility across their cloud infrastructure and greater control over their connected systems,” explains Vernes. “Customers who choose BUI can benefit from single-pane-of-glass cloud management, streamlined network and security operations, and holistic protection with cutting-edge technology.”
To maintain business continuity in a world of evolving cyber threats, organisations must ensure the security of their cloud environments. “A clear understanding of the enterprise security posture is vital,” says Vernes.
“Customers need to know how effective their defences really are so that they can adjust their IT strategies accordingly. We can help them find the right Fortinet products to support their security goals, and ensure that the requisite network, application and platform solutions are correctly integrated and fully optimised,” he concludes.
Looking for a technology partner to enable comprehensive protection for your organisation’s users, devices, applications, and network edges?
Book a consultation with us to explore Fortinet’s cutting-edge security solutions for public, private, hybrid and multi-cloud environments.
There’s a high demand for cybersecurity specialists equipped to help organisations defend themselves against cyberattacks. Industry certifications that validate your cybersecurity experience can be a great way to publicise your abilities, increase your earning potential, and boost your career prospects in this field.
Microsoft, the International Information System Security Certification Consortium, Offensive Security, and eLearnSecurity provide some of the most comprehensive cybersecurity certification courses on the market, according to BUI Cloud Security Architect Neil du Plessis.
Microsoft offers a variety of cybersecurity training options to help you achieve technical certifications that showcase your industry-relevant skills. Du Plessis advises starting with the SC-900 certification to get to grips with the fundamentals of Microsoft’s security, compliance, and identity solutions.
“You’ll gain valuable insights into the relationship between these solutions and how they can be leveraged to ensure end-to-end cybersecurity. After that, you can move on to technology-specific and role-based certifications in security operations, identity and access management, and information protection, in line with what you want to achieve professionally.”
Du Plessis recommends the following order:
“Microsoft has outlined its own recommended path for individuals looking to specialise in security, compliance, and identity, but I think you can adapt this learning journey to suit your personal outcomes,” says Du Plessis.
Quick Tip | The Microsoft Security, Compliance, and Identity Training and Certifications Guide contains more information about the SC-900, AZ-500, MS-500, SC-400, SC-300, SC-200, and SC-100 certifications, and Microsoft Learn has an extensive collection of free training materials to aid your studies and exam preparation.
The International Information System Security Certification Consortium – or (ISC)² – offers technology professionals a range of information security certifications. (ISC)² certifications are recognised globally and deal with everything from security administration to operations and management. These are the four that Du Plessis suggests:
Certified in Cybersecurity (CC) is an entry-level certification aimed at graduates, beginners, and novice practitioners in the field. “It’s designed to give you the foundational knowledge required to start a career in cybersecurity,” says Du Plessis. “If you’re new to the industry or perhaps changing your job focus, this could be the first rung on the ladder as you develop your skills.”
Systems Security Certified Practitioner (SSCP) is a credential that proves your ability to implement, monitor, and manage IT systems and infrastructure securely. “It’s a way to demonstrate your holistic understanding of the best practices, accepted policies, and international standards regarding security operations,” says Du Plessis. The SSCP certificate is a popular choice among experienced systems administrators, systems analysts, and systems engineers.
Certified Cloud Security Professional (CCSP) is best suited for information security leaders with experience in cloud security architecture, design, operations and orchestration. “With the CCSP certification behind your name, prospective employers will know that you have advanced capabilities when it comes to protecting critical cloud assets,” says Du Plessis.
Certified Information Systems Security Professional (CISSP) is widely regarded as the globe’s premier cybersecurity certification. “But it doesn’t come easy,” notes Du Plessis. “CISSP certification requires a substantial investment of both time and money. There’s a staggering volume of course information to get through, but the reward is well worth it. Plus, the credential itself can open new doors for you.”
In the United Kingdom, the CISSP certification is comparable to Level 7 of the Regulated Qualifications Framework. And in South Africa, many universities will accept CISSP as recognition of prior learning if you pursue a postgraduate study programme (to achieve an Honours degree, for example).
(ISC)² offers several other certifications, but Du Plessis cautions that they’re geared toward professionals in particular disciplines or industries. “If your focus area is governance and compliance, or risk management, then Certified Authorisation Professional (CAP) may be a good path to explore. But if your responsibilities include protecting sensitive patient data and medical records, then becoming a Healthcare Information Security and Privacy Practitioner (HCISPP) might make more sense.”
Quick Tip | The (ISC)² Cybersecurity Qualification Pathfinder tool can help you decide which certifications match your current and future career goals.
Penetration testing and digital forensic investigation are highly specialised fields that require cybersecurity pros to expand their practical, technical, and analytical capabilities. “For those with the necessary credentials in these niches, there’s certainly no shortage of work,” remarks Du Plessis. “At BUI, our penetration testers are booked months in advance. And worldwide, there’s a growing demand for forensic experts who can help organisations uncover evidence of cybercrime.”
The OSCP (Offensive Security Certified Professional) course presented by Offensive Security is considered far more technical than other ethical-hacking qualifications on the market. “It’s also one of the few cybersecurity certifications that requires students to prove their practical skills in a test environment,” adds Du Plessis. “The combination of hands-on training and real-world simulation is hugely beneficial.”
The certifications offered by eLearnSecurity are also worth looking into – especially if you want to narrow your focus by specialising in penetration testing for web or mobile applications, says Du Plessis. The eLearnSecurity Certified Professional Penetration Tester (eCPPT) credential is recognised on all seven continents, and the Web Application Penetration Tester eXtreme (eWPTX) and Mobile Application Penetration Tester (eMAPT) certifications are respected in IT circles.
The eLearnSecurity Certified Digital Forensics Professional (eCDFP) accreditation is designed for senior technologists with existing cybersecurity knowledge. It focuses on the processes and methodologies used in modern digital forensics investigations.
These cybersecurity certifications are just a starting point. It’s always a good idea to do additional research to see what fits best for you. “Keep an eye on cybersecurity news sites, group forums, and social media, too,” advises Du Plessis. “The security industry is evolving rapidly. If you’re in the loop, then you’ll be able to update your skills accordingly with the right certifications.”
Bring your talents, skills, and unique perspectives to a collaborative community of technology professionals.
We’re always excited to grow the BUI community! Take a look at our current vacancies, listed on our career portal.
Keeping sensitive data safe and secure is a challenge for businesses of all sizes. Major shifts in the workplace – from in-person to remote and hybrid productivity – forced companies to change, or at least re-assess, their cybersecurity practices and protocols. And far too often, they were not adequately prepared for the evolving cyberthreat landscape.
In fact, according to CyberEdge’s ninth annual Cyberthreat Defence Report, more than 80% of organisations suffered from a successful cyberattack in 2021. With data privacy and data security top of mind, businesses are looking to strengthen their defences against cybercriminals. Here are four simple steps you can take to better protect your workplace data.
Knowing what kind of data cybercriminals want is an essential part of your defence strategy. Therefore, creating an inventory of your so-called crown jewels (the most valuable data and data-related assets within your organisation, including hardware and software information) is important.
In addition, you should have a current (and actively maintained) list of every end-user who has access to your critical business data. Keep accurate records, with device and location details, so that you can carry out the necessary forensic investigations in the event of a data breach.
Keep your operating systems, software packages and web browsers up to date and ensure that all devices have automatic updates enabled. When your connected environment is well maintained, with patches and updates carried out timeously, then your overall security posture is that much stronger.
In addition, make sure that your staff use multifactor authentication (MFA) when they log in. Simple username-and-password combinations are not enough to keep cybercriminals at bay, and MFA could mean the difference between a successful or an unsuccessful hack.
You should monitor your IT environment continuously to detect misconfigurations, vulnerabilities, breach attempts, and cyberattacks in real time. If you have dedicated cybersecurity personnel, they can implement endpoint security technology to help monitor your network. If not, you can bring in SecOps experts to actively identify, investigate, and mitigate cyberthreats 24/7/365.
Moreover, make sure that everyone in your organisation understands the importance of good cyber hygiene and is following the security policies you have in place. When your people know how to spot phishing attempts, for example, then they can respond appropriately.
No matter how many safeguards you have in place, the unfortunate reality is that cyber incidents still occur. However, responding in a comprehensive manner will reduce the impact on your business and send a positive signal to your customers and employees. Therefore, you should have an incident response plan prepared in advance.
This document should be stored safely and your dedicated response team should be able to access it quickly when the need arises. Make sure your incident response plan includes clearly defined technical, operational, legal, and communication-related steps for your team to follow.
BUI is proud to be a Champion organisation for the 2022 edition of Cybersecurity Awareness Month. This article was originally provided by the National Cybersecurity Alliance and is republished here with permission.
Cybercriminals are targeting enterprises big and small to try to gain access to sensitive, confidential, or proprietary data and resources.
How are you protecting your IT environment? Stay ahead of threat actors by choosing a managed detection and response service from BUI.
The COVID-19 pandemic forced people to embrace working from home – a concept they had little or no experience with at the time. Many employees have since returned to the office, but remote work remains a popular choice. According to the 2022 State of Remote Work report by Buffer, 97% of remote workers would like to work remotely, at least some of the time, for the rest of their careers. As remote and hybrid work models continue to evolve, it’s vital for households to be vigilant about cybersecurity.
Most households are linked to the internet in some way. They can be hard-wired to the net or they can leverage wireless technology to connect computers, gaming systems, TVs, tablets, mobile phones and smart home devices to the worldwide web. Having the right cyber protection in place is essential to ensure that everyone in the home can use the internet safely and securely for personal and professional activities. Here are three simple ways to improve your household cybersecurity.
Using a wireless router is a convenient way to allow multiple devices to connect to the internet from different areas of your home. However, unless your router is secure, you risk the possibility of outsiders accessing information on your devices or using your network for nefarious purposes.
It’s important to secure your router from Day 1. Manufacturers assign preset passwords to routers – and these defaults are often weak or easy to guess. If you leave the factory-set password in place, then you effectively leave the door open for cybercriminals to breach your home network. Make sure you change the default router password when you set up the machine itself.
All devices connected to your home network should have security software installed – and updated regularly. Many modern devices have automatic update features, and you should enable them to ensure that your gadgets function optimally and securely at all times.
With the most up to date security software, operating systems and web browsers, your household devices will be better protected against viruses, malware and other cyberthreats.
While steps can be taken to reduce the chance of your household network, devices and user accounts being hacked or compromised, they can never be 100% effective. Households should embrace the practice of backing up data.
You can protect your valuable work, photos and other digital information by making electronic copies of important files and storing them safely. This can be done using cloud software in addition to manual storage devices like portable hard drives and USBs.
By taking simple, proactive steps like these in your own home, you can defend your household members against online fraudsters and scammers.
BUI is proud to be a Champion organisation for the 2022 edition of Cybersecurity Awareness Month. This article was originally provided by the National Cybersecurity Alliance and is republished here with permission.
Cybercriminals are targeting enterprises big and small to try to gain access to sensitive, confidential, or proprietary data and resources.
How are you protecting your IT environment? Stay ahead of threat actors by choosing a managed detection and response service from BUI.
Cybersecurity has become one of the biggest topics inside and outside of technology circles over the past two years. From securing personal devices for digital learning and remote work during the COVID-19 pandemic to safeguarding corporate data against cyberattacks, there’s been a seemingly endless news cycle dedicated to concerns around online safety.
It’s easy to feel overwhelmed or even powerless in the face of rapidly increasingly cybercrime, especially when there are fresh headlines about data breaches and phishing scams almost every day. But end-users – the people using technology to communicate, collaborate and connect – have an important role to play as the first line of defence when it comes to thwarting scammers, fraudsters and threat actors.
Unfortunately, many individuals are not aware of the most basic cybersecurity practices for everyday life. During Cybersecurity Awareness Month this October, Champion organisations like BUI are trying to change that – by sharing practical, actionable tips to help everyone #BeCyberSafe. Here are four basic online safety tips that you can implement right now.
Phishing (when a cybercriminal poses as a legitimate party in the hope of getting individuals to engage with malicious content or links) remains one of the most popular tactics among cybercriminals. In fact, about 90% of data breaches occur due to phishing, according to Cisco’s 2021 Cybersecurity Threat Trends report.
While phishing has grown more sophisticated, suspicious email characteristics (like poor spelling and grammar, typos, low-quality graphics and fake logos in a message) can be a tell-tale sign that the content is risky. Read our explainer blogs – Phishing: Can you spot these common types? and Three ways to shore up your defences against phishing – to learn more.
And remember… If you think you have spotted a phishing attempt, be sure to report the incident to your internal IT teams and service providers so that they can remediate the situation and prevent others from possibly becoming victims.
Having a unique, long and complex password for each of your accounts is one of the simplest ways to boost your online safety. And yet, only 43% of the public say that they “always” or “very often” use strong passwords, according to the National Cybersecurity Alliance’s 2022 Cybersecurity Attitudes and Behaviours Report.
Password cracking is one of the go-to tactics that cybercriminals turn to in order to access sensitive information. And if you are a “password repeater”, once a cybercriminal has hacked one of your accounts, they can easily do the same across all of your accounts. Read our blog – The importance of digital identity management – to find out why it’s vital to make your login credentials rock solid.
Multifactor authentication or MFA – which prompts a user to input a second set of verifying information or to sign-in via an authenticator app – is a very effective measure that anyone can employ to reduce the chances of a cybersecurity breach.
According to Microsoft, MFA can block over 99.9% of account compromise attacks. Therefore, it is a must for any individual who is looking to secure their devices and accounts. Remember, multifactor authentication – from one-time PINs to biometric scans – will put an extra barrier between your sensitive data and the cybercriminals who want to access it.
Read our blog – Three simple ways to improve your data privacy – to explore other ways of protecting your personal information.
Making sure that your devices are up to date should be an essential part of your cybersecurity routine. Don’t ignore software updates and patches! Cybersecurity is an ongoing effort, and updates are important for device maintenance and security.
Instead of trying to remember to check for updates, enable automatic updates whenever you can. This way, you’ll reduce your chances of having older, possibly vulnerable or risky versions of software that could be exploited by cybercriminals.
BUI is proud to be a Champion organisation for the 2022 edition of Cybersecurity Awareness Month. This article was originally provided by the National Cybersecurity Alliance and is republished here with permission.
Cybercriminals are targeting enterprises big and small to try to gain access to sensitive, confidential, or proprietary data and resources.
How are you protecting your IT environment? Stay ahead of threat actors by choosing a managed detection and response service from BUI.
We’re excited to announce that we won the Azure Infrastructure Partner of the Year Award, the Modern Work Partner of the Year Award, and the Security Partner of the Year Award at the FY22 Microsoft South Africa Partner Awards on 28 September 2022.
The gala dinner and prizegiving ceremony took place at the Marriott Hotel Melrose Arch in Sandton, where members of the local Microsoft Partner ecosystem gathered together, in person, for the first time since 2019. Microsoft SA’s awards evenings in 2020 and 2021 were held virtually as lockdown protocols remained in place at the height of the coronavirus pandemic.
The Microsoft SA Partner Awards are presented annually to acknowledge the partner organisations that have excelled in delivering Microsoft solutions over the past 12 months. Award submissions are reviewed by a panel of judges and entries are evaluated in terms of partner competencies, cloud transformation, entrepreneurial spirit, and sales performance, among other factors.
This year, Microsoft SA CEO Lillian Barnard praised partners for pushing beyond all limits to modernise, transform, and enable success for enterprises in South Africa and around the world. In her opening speech on the night, Barnard remarked: “Let me start first by just expressing my gratitude on behalf of the Microsoft company for all that you’ve done in our markets, and in our business. The work that you continue to do in our country is just simply inspiring. You are driving digital transformation and innovation, and you are doing this with a deep sense of commitment.”
BUI was named Azure Infrastructure Partner of the Year for its proven success in helping customers modernise their infrastructure and migrate their applications and data to the cloud. “We’re always thrilled to receive this award,” says Managing Director Ryan Roseveare, highlighting the ninth time that BUI has won this award.
“This accolade is a tremendous achievement in recognition of our team’s focus and positive outcomes. It’s also a validation of our consistency, our high standard of work, and our dedication to our customers. We’re actively driving digital transformation by helping businesses to become more agile and more resilient with Azure’s extensive range of solutions,” adds Roseveare.
As the Modern Work Partner of the Year, BUI was acknowledged for enabling performance and productivity with Microsoft’s comprehensive set of cloud-powered tools for the modern workplace. “From Office 365 to Microsoft Teams and Microsoft Viva, we’re empowering customers with the technology they need to communicate and collaborate effectively in remote and hybrid scenarios,” says National Sales Manager Paul Wallett.
“We’re also supporting our customers as they adapt to new ways of working, and making sure that they’re able to leverage the full power of the cloud and the Microsoft resources at their disposal to take their enterprises to the next level,” he continues. “The whole BUI team is invested in creating real value for customers – by delivering cutting-edge business solutions and world-class service.”
Roseveare is thrilled to take home the Security Partner of the Year award yet again – especially after the recent expansion of BUI’s security portfolio. “In an environment where the right skills are harder to find than ever before, we’re putting more energy and focus into our security solutions and services – because customers are looking for trusted partners to help them protect their digital environments. From our own Cyber SoC and MDR facilities, and as part of Microsoft Security Experts, we’re helping businesses to manage and strengthen their cyber defences,” he says.
“We’ve earned our reputation as a leader in the security space by combining talent and technology,” notes Wallett. “Our security operations division includes some of the most highly skilled and highly certified professionals in the country, and we’re constantly innovating with the Microsoft stack to offer our customers bespoke solutions to accelerate their security.”
With three new Microsoft Partner of the Year awards to celebrate, Wallett and Roseveare are quick to praise the BUI team. “I’m so proud of everyone,” says Wallett. “It’s rewarding to receive these accolades and to be acknowledged in our industry, but none of it would be possible without the dedication shown by our people every day.” Roseveare agrees. “It’s wonderful to see the team’s efforts honoured by Microsoft. We look forward to another year of collective success as we continue to support customers through every stage of the cloud journey,” he concludes.
Cybercriminals are targeting enterprises big and small to try to gain access to sensitive, confidential, or proprietary data and resources.
How are you protecting your IT environment? Stay ahead of threat actors by choosing a managed detection and response service from BUI.
On 31 December 2022, Microsoft will end support for all StorSimple 8000 series devices and StorSimple Data Manager and Snapshot Manager software. This end of support (EOS) date will coincide with the discontinuation – or end of life (EOL) – of the StorSimple service.
If you’re using StorSimple as your hybrid cloud storage solution, then it’s important to understand how EOS for the 8000 series and EOL retirement of the service itself will impact your enterprise. Here’s what you need to know…
EOS for the StorSimple 8000 series is effective on 31 December 2022. On that day, Microsoft will end support for:
EOL for the StorSimple service is also effective on 31 December 2022, which means the following will no longer be available:
StorSimple users are being encouraged to finalise a migration strategy as soon as possible to avoid losing critical stored data when the StorSimple service is discontinued at the end of the year. Today, we’re answering the most common questions about StorSimple migrations to help you take your next steps…
A. The StorSimple 8000 series follows Microsoft’s Fixed Lifecycle Policy. Mainstream Support ended on 1 July 2020 and Extended Support will end on 31 December 2022.
Several other StorSimple products – including the StorSimple 5000 series, 7000 series and 1200 series – also follow Microsoft’s Fixed Lifecycle Policy, and adhere to their own EOS timelines:
Since its launch in November 2014, the StorSimple 8000 series has been embraced by enterprises looking for the best of both worlds: the scalability of cloud storage for limitless capacity, and on-premises physical or virtual storage arrays for performance and flexibility. Now, as Microsoft continues to expand its portfolio of Azure hybrid storage capabilities with new services for data tiering and cloud ingestion, there are more options for customers to store data natively in Azure.
A. You will lose all data stored locally on your StorSimple device, which has a limited, local cache capacity. Microsoft has advised customers: “Once the StorSimple cloud service is shut down, you will not be able to access tiered files that your local device only holds a cloud reference for… Eventually, the device will stop working when it is no longer able to reach the cloud service.” To preserve your data, you need to migrate it into a new solution before the StorSimple EOL date in December 2022.
A. Depending on your contractual obligations, you may be able to keep the device hardware. Microsoft has indicated that it will not ask for leased devices to be returned. Bear in mind that your device will stop working; the StorSimple service will stop working; and hardware and software support will no longer be available from Microsoft.
A. As a StorSimple customer, you have a range of choices for migrating your data – but the right choice will depend on your particular business environment. You’ll have to evaluate your existing StorSimple deployments and workloads, and then match them with an alternative solution that can support your current file-storage demands and scale to meet your future requirements. Need help? Talk to our experts, who can recommend the right solution for your enterprise and customise a migration strategy to streamline your StorSimple move.
A. Every StorSimple migration project is different and time-to-completion will depend on the structure of the existing StorSimple deployment, the data volumes in play, and any bandwidth limitations, among other factors. The depth and breadth of the planning and preparation done beforehand will also affect the speed and progression of the migration, so make sure that you engage with your cloud solution provider in advance.
The timelines announced by Microsoft (EOS for the StorSimple 8000 series and EOL for the StorSimple service) are concrete – and there are only a few months left until yearend. If you haven’t started planning your StorSimple data migration yet, then you should prioritise the task immediately so that your stored files remain accessible beyond 31 December 2022.
We’re excited to announce that we’ve been awarded the Microsoft Modernize Endpoints Advanced Specialization for our holistic expertise in endpoint deployment, management, and security.
The Modernize Endpoints Advanced Specialization is our 10th such premier accreditation from Microsoft and our fourth in the Modern Work category, which includes Adoption and Change Management, Calling for Microsoft Teams, and Teamwork Deployment.
To achieve it, Microsoft partners are required to demonstrate comprehensive knowledge of Azure technologies and Microsoft 365, including modern and virtual desktop administration in enterprise environments. “We undergo an in-depth audit, and it’s a review of our skills, competencies, and business performance,” explains Managing Director Ryan Roseveare. “But more than that, it’s an evaluation of our ability to provide the highest levels of service. I’m proud to say the BUI team passed with flying colours once again.”
“Advanced specializations like this are important differentiators,” adds Chief Technology Officer Willem Malan. “Customers are looking for cloud partners they can trust to deliver sound guidance and superior support on every project. The Modernize Endpoints accreditation proves not only our technical aptitude, but also our success in managing access to corporate resources across mobile, desktop, and virtual endpoints. It’s a hallmark of service excellence that gives customers peace of mind. I’m thrilled to see BUI – and our Cloud Centre of Excellence in particular – acknowledged in this way.”
In today’s hybrid workplaces, effective endpoint management is critical for productivity and security alike, says Cloud Centre of Excellence Lead Dhiren Boodhia. “More and more enterprises are giving their people the power to work from any device, in any location, and it certainly paves the way for greater collaboration across teams and time zones. But to enable remote and on-the-move employees to carry out their tasks effectively and safely, you have to deliver reliable services, consistent user experiences, and comprehensive security, no matter the endpoint in play.”
The evolving cyberthreat landscape means it’s also crucial to manage and safeguard endpoints from the get-go, notes Malan. “Your devices must be up-to-date and protected, your operating systems must be secure by design, and user access to your applications and data must be controlled. This is all possible with Microsoft technologies. Here at BUI, we’re already leveraging our expertise in security, virtualisation, networking, and identity and access management to help customers transform their endpoint estates for a more modern, secure way of working,” he says.
Roseveare welcomes Microsoft’s latest recognition of our team’s focus and acumen. “The Modernize Endpoints Advanced Specialization verifies that we can support businesses throughout the process of endpoint modernization, and empower them to give their people seamless work experiences, every day. We look forward to strengthening our relationship with Microsoft, and helping our mutual customers thrive with tools geared for the hybrid workplace,” he concludes.
You can give your remote and hybrid teams a more flexible, secure workplace that allows them to use whatever device they want to carry out daily tasks.
Talk to our experts about modern endpoint management, with cloud-powered tools for additional security, and build your business resilience with a trusted partner.
BUI is proud to announce its selection as a Managed Extended Detection and Response (MXDR) partner for Microsoft’s new business security services, Microsoft Security Experts.
Microsoft Security Experts was unveiled this month and includes three new managed services: Microsoft Defender Experts for Hunting, Microsoft Defender Experts for XDR, and Microsoft Security Services for Enterprise. Two existing services – Microsoft Security Services for Modernization and Microsoft Security Services for Incident Response – are now also part of this portfolio.
As an MXDR partner, BUI will work in conjunction with Microsoft to manage extended detection and response services for some of the largest enterprise customers globally, from threat monitoring to mitigation and investigation.
“We’re excited to continue our security journey with Microsoft,” says BUI Managing Director Ryan Roseveare. “This new collaboration builds on our longstanding relationship, and we look forward to working alongside Microsoft to help customers protect and defend their IT environments from emerging cyberthreats.”
In 2021, Microsoft security technology blocked over 9.6 billion malware threats and more than 35 billion phishing emails and malicious messages. “Technology is critical, but it’s the combination of leading technologies, comprehensive threat intelligence, and highly skilled people that makes for a truly effective security posture,” notes Vasu Jakkal, Microsoft Corporate Vice President: Security, Compliance, Identity, and Management.
Roseveare agrees. “The cybersecurity landscape is incredibly complex. You need comprehensive tools and holistic knowledge to navigate it successfully. Here at BUI, we’ve focused on building both: our Cyber Security Operations Centre is a state-of-the-art facility designed to leverage and integrate with Microsoft technology, and our security specialists are world-class technologists with a deep understanding of the challenges that businesses are facing today.”
BUI’s tried-and-tested blend of people, process and technology will be critical going forward, adds Roseveare, given the alarming increase in the number and sophistication of cyberattacks.
BUI was part of a select group of Microsoft Partner organisations involved in the development of Microsoft Security Experts. As a Microsoft Azure Expert MSP, a managed security service provider, and a member of the Microsoft Intelligent Security Association, BUI is consistently recognised as a strategic partner for cybersecurity innovation. BUI holds nine Microsoft Advanced Specializations – including Cloud Security and Threat Protection – and earned Microsoft South Africa’s Security Partner of the Year Award in 2021, 2020, and 2019.
“We’re serious about security. We always have been,” says Roseveare. “We’ve earned the trust and loyalty of customers around the world because we provide the best possible security solutions and the right advice. As an MXDR partner for the Microsoft Security Experts portfolio, we’ll continue to put our expertise to work for customers – because we’re here to help them safeguard their business resources, from the endpoint to the cloud,” he concludes.
Cybercriminals are targeting businesses large and small to try to gain access to sensitive, confidential, or proprietary data and resources.
What steps have you taken to prevent a breach? Stay ahead of threat actors by choosing a managed detection and response service from BUI.