BTT Armour — Security Without Compromise.

Increase the organization’s level of security without changing the way you work.

BTT Armour is a managed security service for those who want to implement a multi-layered security model that includes user and identity security, device compliance and management, enhanced email and M365 application protection together with its sensitive information leakage prevention.

BTT Armour combines the essential elements of identifying and preventing security vulnerabilities with the ongoing maintenance of the M365 environment — allowing customers to be worry-free about the software and data security.

BTT Armour managed security services include:

Information Security Risk Assessment
Security Control Implementation
Risk Management & Safety Modernization
Security Oversight & Reporting

BTT Armour — is unique security managed service, the only one of its kind in the Baltic States.

We are proud to have created a relevant and effective package of security services, which has already been tested, well appreciated, and successfully used by our customers.

BTT Armour can help you:

Maintain a higher level of security.

Enable remote workplace security.

Reduce GDPR compliance risks.

Maintain the balance between data security and user-friendliness.

BTT Armour plans

BTT Armour Basic service is relevant for companies that want to give full management of email, users and their identities, file storage, and document sharing security to their IT partners.

BTT Armour Premium is best suited for companies looking to deploy a multi-layered security model that includes user and identity security, device compliance and management, also enhanced business class mail protection and data security, including all BTT Armour Basic functions.

Basic
Premium
User and group administration
Email and calendar management
File storage and document sharing management:

- Ensuring secure file sharing with external contacts (guest privileges, secure links, verification codes)
- Management of internal and external users' access to company information
- Computers files synchronization with the cloud
- Data recovery / deletion (as required, depending on Microsoft tools and capabilities)

Security and compliance support:

- Email protection against spam, malware and known threats
- Appropriate password policy implementation
- Continuous updating of Office applications (depending on the capabilities of the M365 plan)
- Enable audit logging of user activity logs
- Activate and ensure Multi-factor authentication
- Activate and ensure single sign on (SSO)
- Authorization of Microsoft Teams guests or external users

PC and mobile device management:

- Configure security features and settings on Windows 10 PCs and mobile devices - Prepare and activate AutoPilot for automatic Office installation and updates
- Develop and implement a security strategy to protect business data on all devices, including iOS, Android®, and Windows PCs
- PC and mobile device management and maintenance

Advanced threat protection management:

- Activating and maintaining protection against sophisticated threats hidden in email attachments and links
- Enable remote wipe to prevent data leakage on a lost or stolen device
- Control who has access to company information by applying restrictions like do not copy and do not forward (labels)
- Enable unlimited cloud archive and long-term preservation policies to ensure you never lose an email with Exchange Online Archiving
- Enforce malware protection to help keep your Windows 10 devices safe from viruses, spyware, and other malicious software with Windows Defender
- Enable Bitlocker protection against unauthorized access to files and folders on computers
- Activate Conditional access policy to restrict access from devices that do not meet company requirements: not connected to a domain, not using MFA, IP address not allowed, etc.

Inform about the current security status of the company and provide a detailed report
Increasing and maintaining the Security Score:

- Preparation of a technical implementation plan to increase safety
- Implementation project
- Continuous monitoring of the M365 environment, systematic modernization of developed policies
- Presentation of security incident reports

Assessment of the company's M365 security status:

- Checking and evaluating the existing M365 tenant configurations - Security assessment of the current M365 tenant
- Suggesting necessary tweaks and enhancements, followed by implementing these recommendations.

Enhancing and maintaining the company's security score:

- Preparing a technical implementation plan to increase security
- Executing the designated tasks.
- Continually supervising the M365 environment, regularly updating established -policies, and sharing reports on security incidents.

Zero trust policy

- Managing identity and access controls, including user identity management, access protocols, password policies, and multifactor authentication to ensure only authorized users gain access to our organizational resources.
- Establishing geographic policies that define the locations from which users can access internal company data.
- Activating tracking of user actions within the M365 environment to prevent unauthorized data removal or misuse; managing smart devices, ensuring mobile devices and personal computers are controlled, protected, encrypted, and adhering to security policies, alongside performing status checks.
- Implementing conditional access for devices and users, demanding additional authentication measures so that only company devices and users can access sensitive data.
- Protecting data through classifying and labeling non-public documents, enforcing policies, and managing access to information based on the user's identity and device used. Configurations for non-organization data sharing are in line with GDPR.
- Monitoring and detecting threats, reacting to any security incidents instantly.

The choice of BTT Armour plan depends on the functionality of your existing or planned to buy Microsoft 365 plan

M365 Basic; M365 Standard, O365 E1 or up

M365 Premium, M365 Basic + Enterprise Mobility + Security E3

NIS2 compliance solutions based on Skaylink's managed security service BTT Armour powered by Microsoft.

Modern workplace security
  • Centralized management of users and groups
  • Activate and ensure Multi-factor authentication
  • Managing identity and access controls, including user identity management, access protocols, password policies, and multifactor authentication to ensure only authorized users gain access to our organizational resources.
  • External users conditional access implementation and managament
  • Protecting data through classifying and labeling non-public documents, enforcing policies, and managing access to information based on the user’s identity and device used. Configurations for non-organization data sharing are in line with GDPR
  • Security of sensitive company data
  • Ensuring secure file sharing
  • Email protection against spam, malware and known threats
  • Human resourses safety
  • Implemenration of zero trust policy
Cyber incident management
  • Response to cyber incidents
  • Prevention, containment and elimination of consequences of cyber incidents
  • Hacker logs observation
  • Monitoring and analysis logs of critical organization system
  • Incident detection, analysis, evaluation
Cybersecurity hygiene
  • Regular employee security training (how to recognize and respond to threats)
  • Regular simulation of Cyber Attacks for employees
Business continuity of organization ensuring
  • Regular backups
  • Regular backup checks, testing the recovery process
  • Preparation of a recovery plan for the subject’s critical infrastructure
  • Implementation and testing of the entity’s critical infrastructure recovery plan
  • Restore subject’s business activity after extreme events
  • Crisis management
Network and IS security
  • Risk control of network and IS infrastructure incidents
  • Proactive monitoring of the Network and Information Systems
  • Evaluation of the vulnerability of the network and critical systems
  • Infrastructure risk assessment
  • Ensure proper operation of the subject’s security systems
Cryptography
  • Encryption of the entity’s critical systems and data
  • Secure connection to the internal systems of the organization
  • Encryption of backups

Feedback

"BTT Cloud have been a great strategic partner to us over the last couple of years. We have engaged with them on a number of projects and have always found them knowledgeable, and always willing to go the extra mile – highly recommended!”

– IT manager Rolandas Dirgela, Magnetic MRO

"In order to go to market, we needed to be confident, that our internal IT maintenance would not be interrupted, and first thing was to find local reliable vendor, who could offer us IAAS and other comprehensive IT services. Moreover we needed Software as a service integrated with security, and compliance already. Gladly, on top of that we experienced that Armour securing cloud environments made it the best choice.“

– CSO Rokas Muraška, Paystrax

BTT Armour is one of the first managed security services packaged offers in the Baltics built on Microsoft 365 technology. We see great value of such managed security services offered by our partners, especially in the small and medium business segment, where in many cases there is a lack of IT resources to ensure security and data protection.”

– Simonas Černiauskas, General Manager at Microsoft Lithuania

Does the service relevant to us?

Microsoft Zero Trust test allows you to comprehensively assess your initial level of security and provide recommendations for the next steps.

Take the assessment
– the best managed security service for your safety!

What is important for small and midsize businesses?

86%

of SMBs say that cybersecurity is within their top five priorities for their organization.

73%

of SMBs plan to invest to invest significantly more in cybersecurity over the next 12 months.

79%

are worried about the vulnerabilities of remote workplaces

52%

over half of SMBs surveyed agree they lack the in-house skills necessary to properly deal with security issues, and 57% report lacking cybersecurity-specific experts in their organization

91%

say that they would consider either using or moving to a new MSP if they offered the “right” managed security solution package

What would you choose?