AppSource
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Aplicaciones
Categorías
Sectores
Servicios de consultoría
Asociados
Filtros
Borrar todo
Su ubicación
Productos (1)
Sectores
Tipo de servicio
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Vista
resultados relacionados en nubes del sector
.
Todos los resultados
Microsoft 365 Security Health Check Assessment 3-Wk
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
1 out of 60
Synergy Advisor POC-in-a-box for Microsoft Copilot for Security
Synergy Advisors LLC
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
Enhance your security posture with Synergy Advisor POC-in-a-box for Microsoft Copilot for Security
2 out of 60
Threat Protection - 7 days Implementation
SPAN d.d.
+2
Applicable to:
Cloud Security
Threat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
3 out of 60
Avanade Modern Sec Ops FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
4 out of 60
Microsoft Intune Deployment
Secure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
5 out of 60
cyber security threat analysis workshop
U-BTech Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
the workshop is design to discover threats and risks
6 out of 60
Logicalis Cyber Security Initiative
Logicalis Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Logicalis Cyber Security Initiative (CSI) helps customer adopt and deploy Microsoft security technologies and solutions.
7 out of 60
"Threat Protection: 3 Day Workshop"
Insentra Pty Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
8 out of 60
Microsoft 365 Security Posture 10-days Assessment
FUJITSU
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Secure Microsoft 365 and maximise your investment
9 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
10 out of 60
Cybersecurity Assessment Service: 2-Day Assessment
HTG
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Cyber Security Assessment Tool (CSAT) is a software product developed by security experts to quickly assess the status of an organisation’s security with recommended improvements based on fact.
11 out of 60
Microsoft 365 Security Assurance Programme : 12M Implementation
CENTRALITY LTD
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Provision of ongoing Microsoft 365 security consultancy services to drive a continual improvement in your Microsoft Security Score and & posture
12 out of 60
Microsoft OT/IOT Security : 2-Wks Assessment
Wipro Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
13 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for Endpoint
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
14 out of 60
CCPA CPRA: 6 - Wk Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
15 out of 60
Cyderes Microsoft Security Adoption Advisory
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
16 out of 60
Office 365 Teamwork Security - Managed Service
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Teamwork Security provides a comprehensive security management service for Office 365 platforms
17 out of 60
Defender for Endpoint: 5-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
18 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
19 out of 60
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
20 out of 60
Managed XDR Services (1- Day Readiness Assessment)
Kocho
+2
Applicable to:
Cloud Security
Threat Protection
Combine Microsoft Sentinel and Defender Managed Services for comprehensive coverage, cutting-edge security, and complete peace of mind.
21 out of 60
Microsoft 365 Copilot Readiness: 8-Day Maturity and Technical Readiness Assessment
CISILION LTD
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
This engagement is designed to help ensure organisations have the essential, fundamental, intermediate, and advanced building blocks in place to ensure the best Copilot experience upon purchase/pilot.
22 out of 60
Microsoft 365 Security Assessment: 6-day Assessment
Performanta
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Performanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
23 out of 60
Defender for Endpoint Managed Service
e2e-assure Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
24 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
25 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 Wks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
26 out of 60
Microsoft Copilot for Security: Deployment and Adoption Engagement
Kocho
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Threat Protection
Starting with scoping and discovery sessions, then progressing onto deployment and adoption support, Kocho's Microsoft Copilot for Security engagement will help you deploy Copilot successfully.
27 out of 60
MDR for Microsoft Defender
ADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
+2
Applicable to:
Cloud Security
Threat Protection
Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
28 out of 60
Microsoft 365 Risk 5-Days Assessment
KPCS CZ, s.r.o.
+3
Applicable to:
Compliance Advisory Services
Mobile Device Management
Threat Protection
Microsoft 365 Risk Assessment provides preventive and comprehensive check of the Customer's Microsoft 365 Environment.
29 out of 60
Defender for Endpoint and Defender for Server Deployment
CISILION LTD
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
30 out of 60
Cyderes Managed Security Services for Microsoft Sentinel
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
31 out of 60
Cybersecurity Assessment: Microsoft Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Understand your readiness for common security threats.
32 out of 60
Microsoft Endpoint Management: 3- W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
33 out of 60
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
34 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
35 out of 60
Microsoft 365 Security Hardening: 3 Days Implementation
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2-3 days of consultancy from a Microsoft Gold Partner to improve the security stance within your Microsoft 365 tenant, including Conditional Access, MAM, MFA, email filtering and alerts.
36 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days Implementation
HCL Technologies Limited.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
37 out of 60
Email and Threat Protection 4 Week Implementation
HTG
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
HTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
38 out of 60
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
39 out of 60
Multifactor Authentication: 4-Day Implementation
FSI Strategies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
40 out of 60
Security Posture Assessment Service
Kocho
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Security Posture Service, assesses an organisation’s cloud environment against recognised security benchmarks and makes recommendations to uplift security posture.
41 out of 60
Modern Desktop Management Managed service
SIX DEGREES TECHNOLOGY GROUP LTD
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Secure end-to-end device management service from a trusted Microsoft Expert MSP.
42 out of 60
Protect 365 App - 1 hour implementation
Cloud Life
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
43 out of 60
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
44 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
45 out of 60
Microsoft 365 Security Audit: 3-Day Assessment
Marathon Managed Services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security Health Check and Report. Analysis of Secure Score and adherence to the NCSC 14 security principles. Presentation of report to customer detailing Microsoft 365 security posture.
46 out of 60
Secure Modern Workplace Platform Implementation
Cognizant
+3
Applicable to:
Adoption & Change Management
Teamwork Deployment
Threat Protection
Enables teams to securely collaborate, connect and be more productive than ever before, no matter when or where they work.
47 out of 60
SecureBlu MDR Service for Microsoft 365 Defender
New Era Technology
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
48 out of 60
Device as a Service with Windows 11 and Intune: 4 Week Implementation
Cognizant
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Windows 10 has revolutionized how organizations manage operating systems, delivering the features that you have come to know and rely on, while enhancing mobility and agility without losing data.
49 out of 60
Endpoint Management with Security - 4 days - FREE Workshop
OPEN BPO
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
This workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
50 out of 60
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
51 out of 60
Migrate to Microsoft Defender for Endpoint: 11-Wk Implementation
Computacenter (UK) Ltd - Hatfield HQ
+1
Applicable to:
Threat Protection
This service covers migration from your existing 3rd party end point protection solution to Microsoft Defender for Endpoint. Our approach ensures you have peace of mind with full visibility of the ste
52 out of 60
BUI Cyber MDR - 1 Day Discovery Workshop
BUI (Pty) Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
53 out of 60
Microsoft 365 Security Briefing
CDI LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
54 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security Services
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
55 out of 60
Atech Microsoft Sentinel Engagement
Atech Support
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on premises environments with an Atech delivered, Microsoft Sentinel Workshop.
56 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
57 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
58 out of 60
Microsoft 365 Modern Workplace: 4Wk Implementation
Stripe OLT Consulting Ltd
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Microsoft 365 has been designed to help your organisation excel in a remote working world - Our team of gold certified Microsoft experts are here to support it's implementation.
59 out of 60
Onevinn Secure Microsoft Copilot Journey Workshop
Onevinn AB
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
This workshop will enable you to take full advantage of Microsoft 365 Copilot with focus on Compliance and Information Protection.
60 out of 60
Anterior
1
2
3
4
5
Siguiente