FiltersClear all
Consulting services results
Showing results in consulting services.
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
1 out of 60
Microsoft Funded Workshop for Threat Protection envisioning WorkshopVM GLOBAL SOLUTIONS(PTY)LTDMicrosoft Funded Workshop for Threat Protection envisioning Workshop for Microsoft 365 will upskill your team, provide knowledge Microsoft Security
+1
Applicable to:
Threat Protection
2 out of 60
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
3 out of 60
Microsoft 365 threat protection assessmentAVASOFTIdentify vulnerabilities and threats in Microsoft 365. Use advanced protection, intelligence, detection, and response to safeguard data. Enhance security with real-time insights and monitoring.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
4 out of 60
Cybersecurity Managed Services for Microsoft by SoftwareOneSoftwareOneSecuring your digital landscape with SoftwareOne Cybersecurity Managed Services for Microsoft
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 60
MDS - Modern Security Operations EngagementMaureen Data SystemsA 2-day engagement to demonstrate how intelligent security analytics and threat intelligence can detect and stop active threats, encouraging organizations to deploy and adopt Modern SecOps solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITEDConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
7 out of 60
Hyperbolt Secure DeployDelphi ConsultingHyperbolt Secure Deploy offers automated Microsoft 365 Security implementation, delivering enterprise-grade protection in weeks using industry-standard policies.
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
8 out of 60
Copilot For Microsoft 365 Readiness AssessmentTHREATSCAPE LIMITEDThreatscape’s Copilot for Microsoft 365 Readiness Assessment (CRA) service can help you understand, and begin to address, the risks of Copilot for Microsoft 365 adoption.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFTEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 60
AVASecure 360 Next-Gen MXDR Managed ServicesAVASOFTAt AVASOFT, we are committed to securing your digital environment through a holistic Managed Extended Detection and Response (MXDR) solution.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 60
Microsoft Cloud Application for 3rd Party AppsAVASOFTSecure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
12 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.We assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
4security: Backup as a Service for Microsoft 3654Sight HoldingsProtect your data with 4Security's Microsoft 365 Backup as a Service. Seamless integration, automated backups, and reliable data recovery for businesses of all sizes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 60
MDS Managed MXDR EngagementMaureen Data SystemsDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
16 out of 60
Microsoft 365 Security & Compliance AssessmentITX360 (Pvt) Ltd.Microsoft 365 security assessment with a detailed report and recommendations to improve your security and compliance
+1
Applicable to:
Threat Protection
17 out of 60
Email Security Threat AssessmentAVASOFTConfident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
18 out of 60
MDS - Threat Protection EngagementMaureen Data SystemsA 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Threat Protection WorkshopMobile MentorDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
20 out of 60
Copilot - 2 Days Adoption WorkshopINSOMEA COMPUTER SOLUTIONS TUNISIE SARLINSOMEA will help users in adopting copilot within companies from different sectors and sizes
+2
Applicable to:
Frontline Workers
Threat Protection
21 out of 60
Data Leak DetectionAwara IT Kazakhstan LLPRapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Threat Protection
22 out of 60
Microsoft Defender for Business Managed Service: Monthly MDRe2e-assure LtdMaximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 60
Microsoft Sentinel Security Consulting ServiceComtrade System IntegrationMicrosoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 60
KMicro MXDR for SMBKMicro Tech, Inc.KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 60
MDS - Cybersecurity AssessmentMaureen Data SystemsThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFTManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Sensitive data risk assessmentAVASOFTConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFTAVASOFTAware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
30 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
31 out of 60
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data LtdWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
32 out of 60
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
33 out of 60
Defend, Protect, Secure with Microsoft Defender XDRComtrade System IntegrationTake the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
+2
Applicable to:
Cloud Security
Threat Protection
34 out of 60
Microsoft Intune Quickstart ImplementationTechNet UC LLCThe purpose of TechNet UC’s Microsoft Intune Quick Start offer is to provide organizations with expert guidance and support for the efficient deployment and management of Intune.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
35 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFTIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Teams & SharePoint Security HardeningAVASOFTTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFTSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
38 out of 60
Defender for Endpoint Managed Servicee2e-assure LtdMicrosoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Information Protection & DLP PilotAwara IT Kazakhstan LLPInformation Protection & DLP Pilot — secure your data with sensitivity labels, automated classification, and DLP policy testing.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
40 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
KMicro Rapid Incident Response & Readiness ServiceKMicro Tech, Inc.KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
42 out of 60
Microsoft Cloud App Security (MCAS) for Custom Apps by AVASOFTAVASOFTKnow your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
43 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFTConfident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 60
Ransomware & Supply Chain Incident Management: 12 Hour AssessmentMaureen Data SystemsIdentify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
+3
Applicable to:
Compliance Advisory Services
Knowledge & Insights
Threat Protection
45 out of 60
Copilot for Microsoft 365: Security AcceleratorKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
46 out of 60
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFTUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
47 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
48 out of 60
Microsoft Purview Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Purview while ensuring alignment with best practice for security, governance, and compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
49 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data SystemsAssess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Manage Corporate Data on Devices with IntuneAVASOFTCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
51 out of 60
Secure Data Management with Microsoft PurviewAVASOFTConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFTOur solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
53 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFTEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
54 out of 60
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLPEvaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
55 out of 60
4security: Microsoft 365 Communication Protect4Sight Holdings4security: Microsoft 365 Communication Protect, a solution to safeguard your organisation’s communications
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
56 out of 60
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to:
Cloud Security
Threat Protection
57 out of 60
KMicro's Sentinel360 MXDR with Microsoft Copilot for Security: 4-Wk POC/POVKMicro Tech, Inc.Enhance threat hunting & accelerated MXDR for Microsoft Sentinel with Copilot for Security integration
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
58 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies LtdMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Microsoft 365 Threat Protection Workshop + 5 DayCyberwise Siber Güvenlik TIC. AS.Is your Microsoft 365 environment secure? Do you wonder about your current security maturity? We will assist you with a full-fledged workshop on how to deploy and implement Microsoft 365 Security.
+1
Applicable to:
Threat Protection
60 out of 60