
Cyber Security Built In
Cyber Security with Zero Trust
Under One Cloud supports a Zero Trust approach to technology.
Zero Trust is a modern security strategy based on the principle of never trust, always verify.
This means we take Cyber Security seriously and it comes into every business IT decision. This approach becomes a way of thinking so to simplify integrating new services to your IT system.
We made the decision early on that we would provide IT services without compromise. This means, we provide a full stack of IT software included with our services plans to set a mature baseline for your business.
All of our customer deployments come with:
Microsoft 365 Business Premium - A Full 365 Backup Solution - Security Suite and Training - Remote Monitoring - Policy Management - DNS Filtering - Helpdesk - Email Signature
(partner names have been intentionally left out)
Our stack is designed to improve over time with new products being added each year. Your service with UOC will only improve - we're invested in our customers!
Zero Trust as a Way of Thinking
Full Stack, no compromises approach to IT security. Its the new modern way to think about your IT.

Microsoft 365 Conditional Access
Conditional Access Policies within Microsoft 365 allow us to restrict access to resources based on specific conditions.
An example of this might be, setting conditions to target a specific group of users allowing them to login to MacOS devices. We may then enforce this policy to only allow these devices if they meet a compliance level.
We have a standardised list of conditional access policies that we deploy across all our clients. These policies include things like:
Location Blocking - Limited access to Managed Devices and Apps - Enforcing MFA - Requiring Approved Apps
We utilise a service called Inforcer to ensure our customers receive our policies and track all changes to ensure compliance.

Our Approach to New Technology
The Zero Trust Approach allows us to efficiently assess new technologies by ranking against specific criteria.
Business need, benefits, drawbacks, ROI and security are all important considerations.
Implementing new technology doesn't need to be daunting. Due to the way we standardise our services, we have the time to investigate, secure and deploy new technologies with the help of in-built Microsoft 365 Systems such as Microsoft Purview.
New Technology Exploration and Consultancy
We can leverage our direct Microsoft credits and Partnerships to help explore new technolgies and secure them with the help of Microsoft Purview for 365
