FiltresEsborra-ho tot
Serveis de consultoria resultats
Es mostren resultats a serveis de consultoria.
Security Assessment - 4-Week AssessmentCoretek ServicesAnalysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 60
iT1's Security AssessmentIt1 Source LLCImprove your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 60
Endpoint Management WorkshopCitrin Cooperman Advisors, LLCEmpower secure endpoint management with Microsoft Intune through streamlined operations.
+2
Applicable to:
Cloud Security
Threat Protection
3 out of 60
Intune Design and Deployment ServicesTrusted Tech TeamModernize deployment, configuration and management of your Windows devices while
improving your security posture.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
4 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Get AI Ready: 5-Day AssessmentPSM PartnersAI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
6 out of 60
Defend Against Threats with SIEM Plus XDRNetrix GlobalAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Deployment of Copilot for Microsoft 365Windows Management Experts, Inc.Enhance the productivity of Microsoft 365 with our premium Deployment service for Copilot for Microsoft 365.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 60
Armor Defender XDR Foundational AssessmentArmorTailored consulting engagement designed to evaluate your current security environment and establish a baseline for implementing Microsoft Defender XDR.
+2
Applicable to:
Identity & Access Management
Threat Protection
9 out of 60
C1st Office 365 Tenant Migration AssessmentC1st Technologies LLCEnsure a smooth Office 365 tenant-to-tenant migration for businesses. We provide comprehensive consulting services to facilitate seamless transitions during mergers, acquisitions, and other scenarios.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
10 out of 60
Threat Protection Envisioning WorkshopTECH HEADS INCLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Modern SecOps Envisioning WorkshopSentinel Technologies Inc.As IT becomes more strategic, the importance of security grows daily. Security information and event management (SIEM) solutions built for yesterday’s environments struggle to keep pace.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
12 out of 60
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure LtdMicrosoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
13 out of 60
Microsoft Defender for Endpoint: Rapid DeploymentAscent Global, Inc.Modernize endpoint security and reduce cost with Microsoft Defender for Endpoint
+1
Applicable to:
Threat Protection
14 out of 60
Spyglass Managed Security Services: 2-week ImplementationQuisitiveSpyglass is a security and compliance program for cloud and on-premises organizations that aligns security and compliance with current requirements of best-in-class technology and expert deployment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 60
Data Security and Compliance Assessment for Microsoft 365abraGet more out of compliance using your orgnaizations data and behaviors to drive policy. Ensuring you maintain productivity while ensuring your business is safe and secure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
17 out of 60
Threat Protection Engagement: 3-Day AssessmentPSM PartnersDo more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP TechnologiesThe SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLPReview your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
21 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Zero Trust Assessment: 3-Week WorkshopAccountabilITOur Microsoft Zero Trust Assessment: 3-Week Workshop is designed to evaluate an organization's security posture and provide guidance on implementing a Zero Trust security model.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 60
Microsoft Purview Insider Risk Management and Compliance: ImplementationITC Secure LtdThis engagement delivers setup and enablement for Microsoft Purview’s Insider Risk Management and Communication Compliance capabilities, supporting proactive risk mitigation.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
24 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 WeeksNetrix GlobalUnderstand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
25 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
27 out of 60
Microsoft 365 Fundamentals: 1 Day WorkshopNETCOM LEARNINGIntroduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
+3
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
28 out of 60
Rapid Risk Assessment: 4-Wk AssessmentAscent Global, Inc.Immediate and long-term Microsoft security strategy assessment utilizing security tools such as Defender, Sentinel, and Cloud App Security.
+2
Applicable to:
Information Protection & Governance
Threat Protection
29 out of 60
Microsoft Managed Extended Detection & Response (MXDR)ISA Cybersecurity Inc.Our Managed XDR service provides your environment with the ultimate protection against cyber attacks.
+1
Applicable to:
Threat Protection
30 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTDMicrosoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
+2
Applicable to:
Cloud Security
Threat Protection
31 out of 60
Microsoft 365 Copilot Data Security AssessmentCollective InsightsAccelerate your deployment of Microsoft Copilot while ensuring comprehensive data security and compliance across the enterprise.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 60
Secure Productive Workplace: Implement 4-WkNetsuritNetsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
33 out of 60
Sentinel Readiness WorkshopSentinel Technologies Inc.Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
34 out of 60
Zero Trust Security AssessmentCitrin Cooperman Advisors, LLCOur Zero Trust Security Assessment will evaluate identity, email, data, and endpoint device controls, threat protection, management, and licensing to strengthen your organization's security posture.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 60
Threat Protection EngagementNeway TechnologiesEnhance your organization's security stance with a Neway Threat Protection Engagement.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
36 out of 60
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONSUNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
38 out of 60
Copilot for Security Readiness AssessmentInvokeInvoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Threat Protection and Cloud Security: 3 Day WorkshopNetwovenImprove your security posture with a Microsoft Threat Protection Assessment Workshop
+2
Applicable to:
Cloud Security
Threat Protection
40 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLCThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
42 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Big Green IT Security Assessment: 3-WeekBig Green IT - DevSecure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
44 out of 60
Defend Against Threats with SIEM Plus XDR WorkshopThe Partner MastersThe Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
46 out of 60
Microsoft 365 Secure Score AssessmentDaymark SolutionsImprove your environment’s security posture using Microsoft Secure Score.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
47 out of 60
ThreatHunter MXDR: 3-Wk ImplemenationeGroup Enabling TechnologieseGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
48 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk AssessmentApex Digital SolutionsAchieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
49 out of 60
Advanced Email Security: 4-Day ImplementationFSI StrategiesLeverage Microsoft Defender for Office 365 to implement best in class email security
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
50 out of 60
Multifactor Authentication: 4-Day ImplementationFSI StrategiesImplementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical StartRapidly identify, contain, and remediate a breach.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
52 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr WorkshopNetwovenLearn how to put next generation Microsoft security tools to work for you.
+2
Applicable to:
Cloud Security
Threat Protection
53 out of 60
Microsoft Defender for End Points JumpstartSentinel Technologies Inc.Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
+2
Applicable to:
Cloud Security
Threat Protection
54 out of 60
Microsoft Defender for Office JumpstartSentinel Technologies Inc.Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
+2
Applicable to:
Cloud Security
Threat Protection
55 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCConfigure and customize transport rules in Microsoft Exchange Online, ensuring efficient email routing, improved security, and compliance for your organization.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
56 out of 60
Implementation of Microsoft Defender for EndpointCDWCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLCProtect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLCThe goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLCThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60