FiltersClear all
Consulting services results
Showing results in consulting services.
All results
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud SecurityThreat Protection
1 out of 60
Cyderes Microsoft Security Adoption AdvisoryCyderesThe Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
2 out of 60
Varonis JumpstartSentinel Technologies Inc.Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
3 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro LtdWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
4 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
5 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalystAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
6 out of 60
Data Security and Governance: 3 Day WorkshopNetwovenNetwoven Data Security and Governance workshop will get you started on the path to discover, protect, and govern your sensitive corporate data
+2
Applicable to:
Cloud SecurityInformation Protection & Governance
7 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte LtdHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
8 out of 60
Zero Trust as a Service (ZTaaS)Aegis InnovatorsDigital transformation and adopting AI starts with building a secure foundation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
9 out of 60
Microsoft 365 Tenant Health-ChecknovaCapta GmbHMicrosoft 365 nach höchsten Sicherheitsstandards und Best Practices absichern, schützen und optimieren
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceKnowledge & Insights
10 out of 60
Integrating Microsoft Sentinel with Carbon Black EDRAVA SOFTWARE INCImprove endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
11 out of 60
Spyglass-MDR Managed Detection & Response: 2-week ImplementationQuisitiveSpyglass-MDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
12 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
13 out of 60
Avanade Security Risk AssessmentAvanade, Inc.Avanade's 5-day Risk Assessment offers security leaders a comprehensive view of risk posture across their enterprise and proactive ways to protect their organizations from growing cyber threats.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInformation Protection & Governance
14 out of 60
Microsoft Sentinel Security Consulting ServiceComtrade System IntegrationMicrosoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
+2
Applicable to:
Cloud SecurityThreat Protection
15 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
16 out of 60
Microsoft Defender for Endpoint SMC Deployment: 4-Week ImplementationBlueVoyantOur services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
17 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional ServiceIT Partner LLCThe goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
18 out of 60
Microsoft 365 Copilot: 1-Day AssessmentData Market Bilgi Hizmetleri A.SHow Microsoft 365 Copilot can transform your business and the overall concepts you must understand to better daily business life.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityPower Platform for Teams
19 out of 60
Secure Multi-Cloud Environments: 3-day WorkshopECF Data LLCThe Secure Multi-Cloud Environments Workshop helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
20 out of 60
Implementation of Microsoft Defender for Office 365CDWThe Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
21 out of 60
Security Operations Center with Microsoft SentinelAVA SOFTWARE INCMonitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
22 out of 60
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
23 out of 60
Microsoft 365 CISO Security Workshop with SentinelCDWMicrosoft 365 CISO Security Workshop with Sentinel is designed as a day engagement for Business Decision Makers (BDM) to help showcase the value proposition of Microsoft Security.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
24 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SASConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
25 out of 60
Cybersecurity Assessment - 3 WeeksArmis, Sistemas de Informação, LdaMicrosoft Security Assessment: detect security problems and take targeted action
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
26 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
27 out of 60
Multifactor Authentication: 4-Day ImplementationFSI StrategiesImplementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
28 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLCMulti-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
29 out of 60
Copilot for Micosoft 365 Readiness: 2-Day WorkshopCTGlobal A/SPlan adoption of Copilot for Microsoft 365 through explicit scenarios, use cases and data governance. Develop strategies for seamless onboarding and future integrations. In a safe and secure workshop.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
30 out of 60
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
31 out of 60
KMicro's Sentinel360 MXDR with Microsoft Copilot for Security: 4-Wk POC/POVKMicro Tech, Inc.Enhance threat hunting & accelerated MXDR for Microsoft Sentinel with Copilot for Security integration
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
32 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days ImplementationHCL Technologies Limited.HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
33 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOneLearn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
34 out of 60
Copilot Security Assessment: 4-Wk AssessmentManaged SolutionUnlock the full potential of AI with a comprehensive Microsoft Copilot Security Assessment, fully integrated with Microsoft 365
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementKnowledge & Insights
35 out of 60
MDR for Microsoft DefenderADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
+2
Applicable to:
Cloud SecurityThreat Protection
36 out of 60
Microsoft 365 License Optimization:1-hr AssessmentFrontier Technology, LLCReview current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
37 out of 60
Security Assessment for Copilot Readiness: 3 Day WorkshopNetwovenNetwoven's security assessment for Copilot workshop will train you to better discover, secure, and govern your corporate data for usage with Copilot for Microsoft 365
+2
Applicable to:
Cloud SecurityKnowledge & Insights
38 out of 60
Avanade Modern Workplace FY23Avanade, Inc.Modern Workplace Consulting Services
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
39 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
40 out of 60
Microsoft 365 E5 Zero Trust Security AssessmentSHI International CorpExplore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
41 out of 60
Avanade Modern Sec OpsAvanade, Inc.To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
42 out of 60
Microsoft 365 Migration 12 Hour Proof-of-ConceptNew Charter Technologies, Inc.Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
+3
Applicable to:
Adoption & Change ManagementCloud SecurityKnowledge & Insights
43 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)Summit 7 Systems, IncSummit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) practices associated with Levels 1-3 for Microsoft 365, as well as Azure and AAD where appropriate.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
44 out of 60
Microsoft 365 Protecting Corporate Identities: 5-Wk ImplementationKiZAN TechnologiesSafeguard your organization from devastating breaches with Microsoft 365 identity solutions.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
45 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoft BrasilBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
46 out of 60
MFA JumpstartSentinel Technologies Inc.Multi-factor authentication is a process in which users are prompted during the sign-in
process for an additional form of identification, such as a code on their cellphone or a
fingerprint scan.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
47 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
48 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
49 out of 60
Big Green IT Security Assessment: 3-WeekBig Green IT - DevSecure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
50 out of 60
Copilot Preparedness and Planning WorkshopCDI LLCThe Copilot workshop will prepare your organization to utilize copilot by identifying key scenarios and gaps in current configuration to improve ROI of using Copilot.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
51 out of 60
Microsoft 365 Security Assessment - 4wk AssessmentProtivitiEffective Analysis of CIS & NIST Benchmarking, Active Directory to Azure and Microsoft 365 Configurations
+1
Applicable to:
Cloud Security
52 out of 60
Adopción de Copilot chat Enterprise - Bing Chat Enterprise: 3-WkENCAMINA S.L.Adopta Copilot Chat Enterptise para multiplicar la productividad de tus empleados protegiendo los datos en tu empresa
+3
Applicable to:
Adoption & Change ManagementCloud SecurityTeamwork Deployment
53 out of 60
Microsoft 365 Security and Compliance AssessmentAVA SOFTWARE INCMicrosoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
54 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
55 out of 60
Red Canary Cloud Security AssessmentRed CanaryAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
56 out of 60
Endpoint Security Foundations 50 users: 1-YrRed River Technology LLCEndpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
+2
Applicable to:
Cloud SecurityThreat Protection
57 out of 60
Advisory Service for Microsoft CloudDell Technologies ServicesLeverage our expertise to uncover the insights to right-size your environment, minimize risk and optimize Microsoft 365 and Azure costs
+3
Applicable to:
Adoption & Change ManagementCloud SecurityKnowledge & Insights
58 out of 60
Microsoft Defender for Cloud Apps: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Cloud Apps
+2
Applicable to:
Cloud SecurityThreat Protection
59 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud SecurityThreat Protection
60 out of 60