FiltersClear all
Consulting services results
Showing results in consulting services.
All results
True Managed Security Service- 3 day Workshoptrue org cloudYou have a vision. We can help you secure it...
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
1 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş."Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
2 out of 60
Red Canary Cloud Security AssessmentRed CanaryAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
3 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPOThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
4 out of 60
Cyber Insurer Readiness WorkshopSentinel Technologies Inc.Uncover gaps and strengthen your position when applying for cyber insurance
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
5 out of 60
Microsoft Defender for End Points JumpstartSentinel Technologies Inc.Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
+2
Applicable to:
Cloud SecurityThreat Protection
6 out of 60
Microsoft Defender for Office JumpstartSentinel Technologies Inc.Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
+2
Applicable to:
Cloud SecurityThreat Protection
7 out of 60
Complete MXDR Powered by Microsoft SentinelKiZAN TechnologiesRapidly improve your security posture and protect against an evolving cyber threat landscape 24x7x365 with Microsoft Sentinel, Microsoft 365 Defender, and Microsoft Defender for Cloud.
+2
Applicable to:
Cloud SecurityThreat Protection
8 out of 60
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Business Services - GlobalOur workshop will help you designing and deploying Microsoft security technologies for your unique needs.
+1
Applicable to:
Threat Protection
9 out of 60
Managed Threat Detection [xdr] for Microsoft 365 DefenderOrange Business Services - GlobalImplementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
10 out of 60
Zero Trust Defend Against Threats: 7-Wk ImplementationKiZAN TechnologiesAccelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
+3
Applicable to:
Identity & Access ManagementMobile Device ManagementThreat Protection
11 out of 60
Zero Trust Foundation: 6-Wk ImplementationKiZAN TechnologiesAccelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
12 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk AssessmentKiZAN TechnologiesLeverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
+3
Applicable to:
Identity & Access ManagementMobile Device ManagementThreat Protection
13 out of 60
Microsoft 365 Protecting Corporate Identities: 5-Wk ImplementationKiZAN TechnologiesSafeguard your organization from devastating breaches with Microsoft 365 identity solutions.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
14 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
15 out of 60
Free Microsoft 365 Defender Suite 4–6-hour Proof of ConceptLevacloud LLCThis free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft 365 Defender, Microsoft Defender for Office 365, Microsoft Defender for Endpoint
+2
Applicable to:
Cloud SecurityThreat Protection
16 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCConfigure and customize transport rules in Microsoft Exchange Online, ensuring efficient email routing, improved security, and compliance for your organization.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
17 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom ConsultingThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
18 out of 60
Microsoft Defender for Endpoint ImplementationCDWCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
19 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLCProtect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
20 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLCThe goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
21 out of 60
Get AI Ready: 5-Day AssessmentPSM PartnersAI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityThreat Protection
22 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLCThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
23 out of 60
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
24 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLCEnhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
25 out of 60
Additional Spam and Email Protection: 3-Days Professional ServiceIT Partner LLCAdditional protection for organizations experiencing problems with emails.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
26 out of 60
Microsoft Intune: 3-Wk Current State AssessmentInvokeAssess your endpoint management current state and have a roadmap to modernize it with the Microsoft Intune family of solutions.
+2
Applicable to:
Device Deployment & ManagementThreat Protection
27 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReplyValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
28 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLCService used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
29 out of 60
Microsoft 365 Security BriefingCDI LLCA Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
30 out of 60
Microsoft 365 Security WorkshopCollective InsightsEquip your organization with insights, strategies, and tools to fortify defenses, mitigate threats, and enhance overall security readiness across your digital estate.
+2
Applicable to:
Identity & Access ManagementThreat Protection
31 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5Collective InsightsUpgrade to Microsoft 365 E5 for Advanced Productivity and Security
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
32 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLCEstablish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
33 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLCEstablish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
34 out of 60
Microsoft Intune DeploymentSecure Future Bilgi Tek. ve Hiz. Tic A.S.The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
+3
Applicable to:
Identity & Access ManagementMobile Device ManagementThreat Protection
35 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
36 out of 60
iT1's Security AssessmentIt1 Source LLCImprove your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
37 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu TarsasagSafeguard your entire organization with Managed Security Services on Microsoft Defender
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
38 out of 60
Defender for IoT Professional Security Services | Customized Deployment in as Little as 8-WeeksDifendaUnify your IT and OT security environment with Difenda, the 2023 Microsoft Security Impact Award Winner.
+3
Applicable to:
Device Deployment & ManagementInformation Protection & GovernanceThreat Protection
39 out of 60
Vulnerability ManagementBlack Cell Magyarország Korlatolt Felelossegu TarsasagRapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
+2
Applicable to:
Cloud SecurityThreat Protection
40 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu TarsasagInspect events in your network to locate threat indicators and entities
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
41 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for EndpointCyderesCyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
42 out of 60
Cyderes Microsoft 365 Incident ResponseCyderesCyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
43 out of 60
Defender for Office365Suri Services SCSuri Services y Office 365: La alianza impenetrable en ciberseguridad.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
44 out of 60
Avanade Modern Sec OpsAvanade, Inc.To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
45 out of 60
Threat Protection EngagementadaQuestLearn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
46 out of 60
Microsoft Defender for Office 365: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
+2
Applicable to:
Cloud SecurityThreat Protection
47 out of 60
Microsoft Defender for Cloud Apps: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Cloud Apps
+2
Applicable to:
Cloud SecurityThreat Protection
48 out of 60
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
49 out of 60
Cyderes Microsoft Security Adoption AdvisoryCyderesThe Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
50 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
51 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLPReview your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
52 out of 60
Cyber Security AssessmentAegis InnovatorsUnderstand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
53 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
54 out of 60
Incident Response RetainerSentinel Technologies Inc.Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
55 out of 60
Office 365 Encrypted Email - Initial Setup: 1-Day Professional ServiceIT Partner LLCBoost Microsoft 365 security with default encryption. Elevate messaging protection and implement email encryption and rights protection for sensitive data.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
56 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
57 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLCEnhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
58 out of 60
GoDaddy Office 365 to Microsoft Office 365 Tenant-to-Tenant Cutover Email Migration: 7-Days Professional ServiceIT Partner LLCSeamless, short-term-downtime migration of email service from GoDaddy Office 365 to Microsoft Office 365, ensuring user access and Exchange Online functionality.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
59 out of 60
MDR WorkshopGrant Thornton LLPMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
60 out of 60