FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Get AI Ready: 5-Day AssessmentPSM PartnersAI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
1 out of 60
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
MDR WorkshopGrant Thornton LLPMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Lightstream Copilot for Microsoft 365 Readiness EngagementLightstreamLightstream Copilot Readiness Engagement helps clients to rapidly identify critical remediation steps needed in order to implement Copilot for Microsoft 365 successfully.
+1
Applicable to:
Threat Protection
4 out of 60
Copilot for Security Readiness AssessmentInvokeInvoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Multifactor Authentication: 4-Day ImplementationFSI StrategiesImplementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Threat Protection Engagement: 3-Day AssessmentPSM PartnersDo more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Microsoft 365 Copilot Data Security AssessmentCollective InsightsAccelerate your deployment of Microsoft Copilot while ensuring comprehensive data security and compliance across the enterprise.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 60
XENSHIELD365 - Managed Detection and Response (MDR)Xencia Technology Solutions Pvt Ltd24x7 Managed Security Operations SoC through shared team of Security experts Defender XDR
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLPReview your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 60
UNITE: Cyber Security Assessment_INFINITY TECHNOLOGY SOLUTIONSBoost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 60
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLCOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Gestion del Endpoint: Servicio GestionadoRAN INGENIERÍA DE SISTEMAS SRLEl servicio está diseñado para gestionar la seguridad de las plataformas endpoint de las organizaciones en la protección de los datos y dispositivos tanto corporativos como personales.
+2
Applicable to:
Information Protection & Governance
Threat Protection
14 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 WeeksNetrix GlobalUnderstand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
16 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReplyValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
17 out of 60
eDiscovery, Data Lifecycle & Records ManagementITC Secure LtdManage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
18 out of 60
ThreatHunter MXDR: 3-Wk ImplemenationeGroup Enabling TechnologieseGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
19 out of 60
Spyglass Managed Security Services: 2-week ImplementationQuisitiveSpyglass is a security and compliance program for cloud and on-premises organizations that aligns security and compliance with current requirements of best-in-class technology and expert deployment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
20 out of 60
Secure Productive Workplace: Implement 4-WkNetsuritNetsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
21 out of 60
Microsoft Sentinel Migration and ModernizeCollective InsightsMigrate from legacy SIEM to Microsoft Sentinel; a cloud native SIEM + SOAR
+2
Applicable to:
Insider Risk
Threat Protection
22 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
23 out of 60
Defender PilotLevacloud LLCThe Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 60
Data Security and Compliance Assessment for Microsoft 365abraGet more out of compliance using your orgnaizations data and behaviors to drive policy. Ensuring you maintain productivity while ensuring your business is safe and secure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
25 out of 60
Microsoft Value Calculator: One Hour AssessmentPatriot Consulting Technology Group LLCThe Cost Takeout Opportunity shows the potential cost reductions from consolidating third party solutions with Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Defend Against Threats with SIEM Plus XDR WorkshopThe Partner MastersThe Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
27 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day WorkshopeGroup Enabling Technologies, LLCWith Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 60
Copilot Security & Governance Assessment for Microsoft 365Blue Cycle LLCAssess and secure your Microsoft 365 tenant for safe, scalable Copilot deployment
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
29 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
31 out of 60
Threat Landscape AssessmentProServeITGet critical cybersecurity insights with a global visualization of login attempts, dark web scan, & expert recommendations. We help secure your Microsoft 365 environment to protect your business.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
32 out of 60
Rapid Risk Assessment: 4-Wk AssessmentAscent Global, Inc.Immediate and long-term Microsoft security strategy assessment utilizing security tools such as Defender, Sentinel, and Cloud App Security.
+2
Applicable to:
Information Protection & Governance
Threat Protection
33 out of 60
Microsoft Defender for Endpoint Professional Services: 1-Wk ImplementationOptiv Security Inc.Provide comprehensive, powerful protection at your organization's endpoints from Optiv utilizing the Microsoft Defender for Endpoint solution.
+3
Applicable to:
Information Protection & Governance
Knowledge & Insights
Threat Protection
34 out of 60
Microsoft 365 Secure Score AssessmentDaymark SolutionsImprove your environment’s security posture using Microsoft Secure Score.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
35 out of 60
Implementation of Microsoft Entra ID GovernanceSpyglass MTG, LLCFor any business interested in securing internal and external Identities with Entra ID
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Secure and Maximize Your Microsoft 365 Tenant with Manage & ProtectAll Covered, a division of Konica MinoltaMicrosoft 365 tenant management to provide you with continuous security & compliance, enhanced administration, and actionable insights.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
37 out of 60
Comprehensive Threat Protection: Free WorkshopLong View SystemsProtect against advanced threats with Long View’s Threat Protection, leveraging Microsoft Defender for full security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
38 out of 60
Threat Protection Envisioning WorkshopTECH HEADS INCLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Microsoft Threat Protection EngagementRavanty Tech Consulting, Inc.Threat Protection Engagement helps you assess your security landscape, address most pressing security goals and challenges, and provide an immersive experience around Microsoft security capabilities.
+2
Applicable to:
Identity & Access Management
Threat Protection
40 out of 60
Microsoft Security: 3-Day WorkshopApex Digital SolutionsDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP TechnologiesThe SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONSUNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
43 out of 60
Microsoft Intune: 3-Wk Current State AssessmentInvokeAssess your endpoint management current state and have a roadmap to modernize it with the Microsoft Intune family of solutions.
+2
Applicable to:
Device Deployment & Management
Threat Protection
44 out of 60
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
45 out of 60
Microsoft Copilot for Security: 6-Wk EnablementCyclotron Inc.Copilot for Security empowers security teams investigations and operations, harnessing real-time data across digital security estates to improve response time, intelligence, and investigation quality.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
46 out of 60
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure LtdMicrosoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
47 out of 60
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Endpoint Management WorkshopCitrin Cooperman Advisors, LLCEmpower secure endpoint management with Microsoft Intune through streamlined operations.
+2
Applicable to:
Cloud Security
Threat Protection
49 out of 60
Zero Trust Assessment: 3-Week WorkshopAccountabilITOur Microsoft Zero Trust Assessment: 3-Week Workshop is designed to evaluate an organization's security posture and provide guidance on implementing a Zero Trust security model.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
50 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
51 out of 60
Microsoft Managed Extended Detection & Response (MXDR)ISA Cybersecurity Inc.Our Managed XDR service provides your environment with the ultimate protection against cyber attacks.
+1
Applicable to:
Threat Protection
52 out of 60
Defend Against Threats with SIEM Plus XDRNetrix GlobalAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Microsoft 365 Fundamentals: 1 Day WorkshopNETCOM LEARNINGIntroduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
+3
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
54 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.A high-level forensics evaluation designed to identify current and past threat activity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View SystemsSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Microsoft 365 Tenant Security AssessmentDaymark SolutionsStrengthen the Security of Your Microsoft 365 Environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
57 out of 60
Advanced Email Security: 4-Day ImplementationFSI StrategiesLeverage Microsoft Defender for Office 365 to implement best in class email security
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
58 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
59 out of 60
Modern SecOps Envisioning WorkshopSentinel Technologies Inc.As IT becomes more strategic, the importance of security grows daily. Security information and event management (SIEM) solutions built for yesterday’s environments struggle to keep pace.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
60 out of 60