Blog

(Podcast) The Security Assessment that Uncovered $1M

“Defend Your Time” is the podcast dedicated to helping security leaders get more out of their Microsoft security investments. Listen and subscribe through Spotify or Apple Podcasts

In this episode, Microsoft Security expert Daniel Morris and security strategist Sam McHugh talk about a security assessment where they uncovered $1,000,000 in cost savings through tool reduction and optimization.

  • Introduction and Setup (0:00)
  • Understanding the Client’s Needs (1:44)
  • Identifying Opportunities for Consolidation (4:40)
  • Creating a Roadmap for Success (11:02)
  • Not All Security Assessments are Created Equal (16:42)
  • Summary and Conclusion (22:49)

Understanding the Client’s Needs

The client was looking to better leverage Microsoft E5 licensing and address some of the confusion and underutilization resulting from a multitude of tools. Daniel and Sam stepped in to streamline the security stack, optimize configurations, and uncover hidden savings. This process involves getting into granular levels of detail with the client to understand not only what tools are in place, but how specifically the client uses those tools, how they are set up and configured, and how these specific use cases and features compare to what exists within Microsoft E5 licenses.

Creating A Roadmap

Daniel and Sam’s approach involved a thorough review of the client’s existing tools and licenses. They compared the features of third-party tools with those available in the Microsoft ecosystem. By identifying redundant tools and highlighting underused Microsoft features, they crafted a roadmap for cost-effective security enhancement. 

However, not all assessments are created equal. Sam points out that Daniel set the client up for success by developing a realistic, achievable roadmap that considered factors like contract renewal dates, logging requirements, personnel constraints, tech debt, and product comparisons over time.

Key Insights and Implementation

  1. Tool Reduction The client was paying $200,000 annually for a tool they never fully implemented. By switching to Microsoft Purview, included in their E5 license, they eliminated this unnecessary expense.
  2. Optimized Deployment Sam and Daniel emphasize the importance of proper configuration and integration. They guided the client through deploying Microsoft Defender for Endpoint in passive mode, ensuring a smooth transition from their existing EDR solution.
  3. Holistic Approach Daniel and Sam’s strategy wasn’t just about cost savings. They focused on improving the client’s overall security posture by aligning tools with business needs and regulatory requirements.

Conclusion

This case study highlights the power of a well-planned security strategy. By leveraging existing Microsoft tools and eliminating redundancies, organizations can achieve significant cost savings and enhance their security posture. 

If you’re looking to optimize your security investments, consider a Security Strategy Review to develop a roadmap focused on delivering an ROI.

Join the Defender User Group on LinkedIn to connect with other security leaders who have invested in Microsoft security tools.

Sharing
Article By

Ontinue
AI-Powered MXDR

We detect and respond to security threats. Quickly. With AI-driven automation that enables smarter, faster decision-making and action. But we’re also in the business of preventing threats—with always-on protection that keeps going. And learning. And improving. Well past your previous definition of secure.

Keywords