Security & Compliance ^

Protect your company's critical resources against threats and attacks. Ensure complete monitoring with a separate security team behind you.

Response times, increasing numbers of sophisticated attacks and gaps in security systems are known challenges exposing businesses to enormous risks and lessons learned.

Close the gaps in your organisation, and let us take care of security and compliance. We continuously monitor all systems, identify security holes and take measures with a lightning-fast response time in the event of a security breach.


Want to know the security measures we recommend for your company?


Get a complete security team behind you ^

Our security consultants ensure that your business and all its resources are well protected. You get a team of specialists in various fields of security who take overall responsibility for cyber security in your company.

We know the challenges ^

We identify your challenges and implement the necessary measures.

  • Threats and attacks are likely to be initiated from your internal networks
  • Data and apps are usually no longer located behind the internal firewall
  • Users need access to apps and data from places other than the corporate network
  • The ability to ensure agile development and dynamic cloud environments

The problem with traditional network-based security:

  • Only traffic over public network is encrypted (VPN)
  • Use of SSL/TLS without mutual authentication
  • Leaked credentials or compromised devices are difficult to detect

Security & compliance as a service ^

With ‘security and compliance as a service’, the business is in safe hands. We have specialists in information security who ensure that the organisation always complies with its own security procedures.

The service includes a monthly review of their Microsoft and Azure environment with a check of configuration against procedures and information security systems (ISMS).

You also get ongoing control of compliance in accordance with ISO/IEC 27001, as well as necessary periodic revisions of documentation, quarterly status meetings and reports.

Request a meeting

Quick help in the event
of a security breach ^

If an incident occurs in one of your Microsoft services, a ticket with SLA is automatically generated according to the severity of the incident. Our Public Cloud team will follow up on the incident directly in their M365 portal and take action as required.

Report a security breach



The ‘Security and Compliance as a Service’ is based on you already having an ISMS solution for governing documentation and an explanation for handling GDPR. If you do not have existing solutions, we offer software and consultancy to get this in place.

Continuous vulnerability analysis ^

To proactively address vulnerabilities and misconfigurations before any attacks or unwanted events occur, we offer vulnerability analyses as an ongoing service. The service is based on Microsoft Defender Cloud, & Nessus scanner or a combination of these.


Backup & monitoring ^

Arribatec offers continuous backup management and monitoring of servers. The solution is protected with several types of firewalls for the highest possible security and we carry out ongoing security assessments, for example, related to new threats such as crypto viruses and the like.

All data is classified as “confidential” according to ISO27001 and is only made available to authorised personnel who are defined by you.

The backup of the servers follows Arribatec’s standard security and backup policy, where we use the 3-2-1 principle and store data in geographically separated locations. With the “long-term storage” option, the data is also copied to tape and moved to a third location.

Request a meeting

More security related content ^

Handling of security-related incidents ^

The service is established based on one or more of the following Microsoft components:

  • Microsoft 365 E5
  • Microsoft 365 E3 + E5 Security

Possibly other subscriptions with one of the following add-ons:

  • Microsoft Defender for Endpoints
  • Microsoft Defender for Office 365
  • Microsoft Defender for Cloud Apps
  • Azure AD P2 (Identity Protection)
  • Microsoft Defender for Cloud

If your company is exposed to a major attack where, for example, the company’s files are encrypted, the service also includes an investigation of the incident.

Request more information

Do you want to know more about security for businesses?

Fill in the form and tell us about your challenges, wishes and needs.