FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Modern SecOps Discovery SessionAscent Global, Inc.Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Avanade Cyber Portfolio EvaluationAvanade, Inc.The Cyber Portfolio Evaluation maps your tools with Microsoft solutions, cutting costs and enhancing efficiency.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
2 out of 60
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
3 out of 60
Copilot Advanced Services: 1 Day 3 WorkshopsNess IsraelUnlock the full potential of Microsoft Copilot with our tailored AI services, enhancing security, development and productivity across Microsoft 365 applications through flexible, expert-led sessions.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Workplace Analytics
4 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SASConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Security and Operations with Expert Microsoft 365 SupportAVASOFTMaximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
6 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
7 out of 60
Microsoft 365 Copilot - Technical ReadinessCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Technical Readiness - your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
8 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
9 out of 60
Copilot for Microsoft 365 WorkshopINOVASYS FOR SYSTEMSCopilot for Microsoft 365 Workshop, delivered by certified Microsoft partner Inovasys, is a comprehensive three-phase engagement.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
10 out of 60
KK_Intune ImplementationKraft KennedyKraft Kennedy's Implementation service for Migration to Microsoft Intune is designed to assist customers in an Intune Deployment Architecture Scenario
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
11 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONSUNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Microsoft 365 Security Readiness: 4-Wk AssessmentQuadrasystems.net (India) P LtdIdentify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
14 out of 60
Microsoft Defender for Endpoint DeploymentCitrin Cooperman Advisors, LLCFortify your business with Microsoft Defender for Endpoint that seamlessly integrates into Microsoft 365, safeguarding all devices and strengthening your Zero Trust framework.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFTBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
16 out of 60
KMicro Rapid Incident Response & Readiness ServiceKMicro Tech, Inc.KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
17 out of 60
Unified Access & Protection with Microsoft Entra Global Secure AccessMobile MentorStep confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
18 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional ServiceIT Partner LLCImplement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLCCatapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
20 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFTEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
21 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)Forsyte IT SolutionsGuardian 365 is the always-on security managed service offering end-to-end protection, monitoring, detection, and remediation of attacks on your infrastructure, data, users, and endpoints 24x7.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
23 out of 60
MDR Shield: 4-Wk ImplementationLong View Systems“MDR Shield” is Long View’s cyber security managed detection and response service.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
24 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
25 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Zones SOCaaS - MXDR with Threat ProtectionZones Inc.Zones SOCaaS powered by Microsoft Sentinel and Defender offers advanced MDR and XDR capabilities, reinforcing your business’s safety.
+2
Applicable to:
Cloud Security
Threat Protection
27 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 60
Copilot for Security Readiness AssessmentBulletproof Solutions Inc.Get a Copilot for Security Readiness + a Security Health Check on your Microsoft 365 environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Microsoft Security Copilot Readiness AssessmentSoftchoiceAims to ensure organizations can securely utilize Microsoft’s Copilot for Security and identifying gaps in signal data from core Microsoft security products
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Copilot Readiness AssessmentAscent Global, Inc.Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Defender for IoT Enterprise: 8-Week POCITC Secure LtdUnderstanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
33 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Fortis IR Table Top ExercisesSentinel Technologies Inc.Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
UNITE: AI Aware Workshop_INFINITY TECHNOLOGY SOLUTIONSFor business leaders who seek to understand AI in a business context, UNITE: AI Aware_ is an expert-led workshop for all departments. Participants can learn about AI types, capabilities and benefits.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
36 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Hybrid Infrastructure Overview WorkshopAwara IT Kazakhstan LLPRapid hybrid‑cloud design workshop — learn best practices, pitfalls, and licensing tips for Microsoft on‑prem + Azure/Microsoft 365.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
38 out of 60
MDS Managed MXDR EngagementMaureen Data SystemsDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
40 out of 60
Threat Protection WorkshopMobile MentorDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
41 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
42 out of 60
Microsoft 365 Copilot for Executives WorkshopSMART business LLCJoin our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
43 out of 60
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POCatQorOur Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
44 out of 60
Hybrid Cloud Security Workshop - 1-DayZones, LLCIdentify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
+1
Applicable to:
Cloud Security
45 out of 60
Identity Health CheckMobile MentorMobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
46 out of 60
Copilot for Microsoft 365: Data Governance WorkshopReplySecure and Enhance Your Microsoft 365 Experience with WM Reply's One-Day Copilot Data Governance Workshop
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
47 out of 60
Microsoft Cybersecurity AssessmentThe Partner MastersDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to:
Cloud Security
Threat Protection
49 out of 60
Microsoft Defender for Cloud Apps JumpstartSentinel Technologies Inc.Microsoft Defender for Cloud Apps address security gaps in an organization's environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
50 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
51 out of 60
Cyber Portfolio Rationalization: 3-Day WorkshopPwCSimplify your cybersecurity portfolio to reduce the cost and complexity of your Microsoft 365 and Microsoft Azure environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
52 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance IncYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
53 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
54 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLPOffice 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
55 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
56 out of 60
Security Outcomes SprintAscent Global, Inc.Understand the Business Value of Your Cybersecurity Investments
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
57 out of 60
Copilot for Microsoft 365: Taller De Seguridad Y Datos De 1 DíaAwara ITDesbloquea el máximo potencial de Copilot for Microsoft 365 mientras refuerzas la seguridad y protección de tus datos con un taller intensivo de un día dirigido por los expertos de Awara IT.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
58 out of 60
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLPEvaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
59 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom ConsultingThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
60 out of 60