FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Todos los resultados
Cloud Security Implementation: 3-WK implementationNeWay Technologies LtdMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
1 out of 60
Defender for IoT Operational Technology: 8-Week POCITC Secure LtdITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
2 out of 60
Microsoft Purview Data Loss Prevention: 4-Wk Implementation ServiceUNIFY Solutions Pty. Ltd.UNIFY Solutions will implement Microsoft Purview Data Loss Prevention (DLP) to protect your organisation's sensitive information
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
3 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance IncYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
4 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopProtivitiMicrosoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
5 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş."Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
6 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入を ご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
8 out of 60
Microsoft Cloud Security Accelerator: 3 week implementationSatalyst Pty LtdSatalyst’s Microsoft Cloud Security Accelerator is designed to strengthen security quickly and enable an organisation to monitor and manage security events effectively.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
9 out of 60
Identity and Access Management: 4-Wk AssessmentZetta Pty LtdZetta’s Assessment and Optimisation engagement will assess your current identity posture and advise you how to manage and secure your users and access to all your apps.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
10 out of 60
Security - Defender for EndpointLinktech AustraliaA cloud centric approach that symbiotically targets architectural building blocks to alleviate issues and enhance the overall Defender for Endpoint experience for Endpoints being managed remotely
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
11 out of 60
Zero Trust: 3-Day AssessmentQUORUM SYSTEMS PTY LTDThe assessment has been designed and scoped to focus on Microsoft 365 or Azure security elements as these relate to inform a robust zero trust strategy.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
12 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
+1
Applicable to:
Cloud Security
13 out of 60
Identity - Entra - Azure iDPLinktech AustraliaConsolidate all third party and on-premises applications to use Azure AD as the main identity provider for authentication and access.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
14 out of 60
Windows 365 Hybrid Work Proof of ConceptZetta Pty LtdZetta’s Windows 365 Hybrid Work Proof of Concept will help you identify how Windows 365 can meet your organisation's hybrid work needs.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementFrontline Workers
15 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom ConsultingThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
16 out of 60
Copilot Preparation Workshop 1Generation-e Productivity Solutions Pty LtdThe Copilot Preparation Workshop is a crucial step in ensuring your organisation is ready to utilise the full potential of Microsoft 365 Copilot
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
17 out of 60
Assessment of Microsoft Defender for IdentityEighty20 Solutions Pty LtdOur Defender for Identity Assessment is a dependable way to get ready for your Defender for Identity adoption, ensuring that you enhance your environment and evaluate the results before you begin.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
18 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
19 out of 60
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
20 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT LimitedCybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
21 out of 60
Security Assessment: 2Wk AssessmentSXIQ DIGITAL PTY LTDSecurity Assessment Service to rapidly help organisations understand their Azure, DC and M365 current state security posture against common industry standards NIST, CIS, Essential 8 and ISO27001.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
22 out of 60
4 Weeks Microsoft 365 Security AssessmentArmis, Sistemas de Informação, LdaThe Microsoft 365 Assessment engagement will help customers evaluate their current security and compliance posture and create a roadmap to meet the organizational needs.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
23 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
24 out of 60
Limitless Security 4 week ImplementationJasco Consulting Pty LtdLimitless Security targets securing identities, protecting Office 365, managing Devices and security information that enables continuous security improvement.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
25 out of 60
Intelligent Shield: 1d AssessmentCorporate SoftwareAn Audit for your Microsoft 365 tenant based on Best Practices
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
26 out of 60
EM+S Consulting Services: 4-Weeks ImplementationArmis, Sistemas de Informação, LdaWe will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
27 out of 60
Cloud Security Assessment: 2 Week AssessmentByte Information Technology Pty LtdIdentify real threats to your cloud environment and develop plans and next steps for your security journey.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
28 out of 60
Security Controls Review - 2wk AssessmentThe Missing Link Network Integration Pty LtdWe can help you achieve a more mature, secure IT environment with our comprehensive Security Controls Review powered by Microsoft Security and Compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
29 out of 60
IdentityCARE 3-Wk ImplementationSecureCom LtdSecuring organizations Exchange Online and Multifactor Identity services.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
30 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud SecurityThreat Protection
31 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
32 out of 60
Complete Cloud Transformation: 1 Day WorkshopJasco Consulting Pty LtdFrom empowering employees to work better together, to ensuring complete security when working outside of the office, this offering has got you covered.
+3
Applicable to:
Calling for Microsoft TeamsCloud SecurityMeeting Rooms for Microsoft Teams
33 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days ImplementationHCL Technologies Limited.HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
34 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud SecurityMobile Device ManagementThreat Protection
35 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
36 out of 60
Secure Remote Work: 4-Hours WorkshopProfessional Advantage Pty LtdEnable your people to work from anywhere, securely with Microsoft 365.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
37 out of 60
Secure Live Workspace - 8 Weeks AssessmentLTIMindtree LimitedOur Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
+3
Applicable to:
Cloud SecurityPower Platform for TeamsTeams Custom Solutions
38 out of 60
Conditional Access & MFA 5d Proof of ConceptGeneration-e Productivity Solutions Pty LtdConditional Access and Multi Factor Authentication deployed without negatively impacting users. We setup the environment then deploy 5 devices plus train you how to do the rest.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
39 out of 60
Microsoft Advisory Services ManagedSoftwareOneDrive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
40 out of 60
Microsoft Security for hybrid work: 1wk impl.Generation-e Productivity Solutions Pty LtdGeneration-e help clients manage and control access information and operate securely. Security starts with getting identity right so you can control exactly who and how someone access.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
41 out of 60
Data#3 Defend against threats: - 8-weeks ImplementationData#3 LimitedDefend against threats using Microsoft Defender, Azure Defender and Azure Sentinel provides you with an integrated
solution to protect your organisation.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
42 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
43 out of 60
Data#3 Essential Eight Adoption Roadmap 2-Week AssessmentData#3 LimitedThe Essential Eight Assessment is a 2 weeks engagement. The audit will help you understand your current security maturity and defensive posture, in alignment with the ACSC Essential Eight.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
44 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
45 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
46 out of 60
Citadel Security Managed ServicesDatacomDatacom Citadel provides managed security delivered by Datacom specialists in partnership with Microsoft and their cybersecurity solution stack. Citadel delivers proactive and effective security.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
47 out of 60
Microsoft 365 Security Assessment: 3-DaysResolution Technology Pty LtdThe Microsoft 365 Security Assessment provides a consultative and hands on review of your production environment including best practice recommendations to secure your business data.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
48 out of 60
Microsoft 365 Security Assessment - 4wk AssessmentProtivitiEffective Analysis of CIS & NIST Benchmarking, Active Directory to Azure and Microsoft 365 Configurations
+1
Applicable to:
Cloud Security
49 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
50 out of 60
M365-Digital Workspace Consulting-2wk AssessmentOrange Business Services - GlobalTo enhance collaboration work through a complete offer with Microsoft 365 with complete voice capabilities for today's workforce collaboration across multiple locations.
+3
Applicable to:
Calling for Microsoft TeamsCloud SecurityTeams Custom Solutions
51 out of 60
iTop MDR 5-Week Implementation登豐數位科技股份有限公司協助您的企業快速的偵測惡意活動、使用者行為及各項由端點發起的惡意活動,即時探索弱點和錯誤的設定,以進行補救。
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
52 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
53 out of 60
Office 365 Teamwork Security - Managed ServiceCognizantTeamwork Security provides a comprehensive security management service for Office 365 platforms
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
54 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOneImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInformation Protection & Governance
55 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud SecurityThreat Protection
56 out of 60
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies LimitedEnable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
57 out of 60
CCPA CPRA: 6 - Wk AssessmentHappiest Minds Technologies LimitedEnable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
58 out of 60
Microsoft 365 Migration 12 Hour Proof-of-ConceptNew Charter Technologies, Inc.Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
+3
Applicable to:
Adoption & Change ManagementCloud SecurityKnowledge & Insights
59 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementMobile Device Management
60 out of 60