FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Todos los resultados
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvokeProvide cross-domain threat protection and simplify breach prevention
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
1 out of 60
Microsoft 365 Security AssessmentCDWCDW’s Microsoft 365 Security Assessments allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
2 out of 60
Microsoft Cybersecurity AssessmentThe Partner MastersDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
3 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)Forsyte IT SolutionsGuardian 365 is the always-on security managed service offering end-to-end protection, monitoring, detection, and remediation of attacks on your infrastructure, data, users, and endpoints 24x7.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
4 out of 60
Data Protection and Compliance Quick StartSoftchoiceThe Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
5 out of 60
Threat Protection Engagement: 3-Day AssessmentPSM PartnersDo more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
6 out of 60
Microsoft Threat Protection Workshop: 5-Wk WrkshopProArch Technologies, Inc.Improve your Microsoft 365 security posture with a Microsoft Threat Protection Workshop
+1
Applicable to:
Threat Protection
7 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
8 out of 60
SoftwareOne Managed Detection and Response Service for Microsoft SentinelSoftwareOneSecure your IT Environment with Microsoft Services and on-call Cyber-security Analysts with end-to-end MDR and optimise costs
+3
Applicable to:
Cloud SecurityThreat ProtectionWorkplace Analytics
9 out of 60
Microsoft 365 Security Hardening; 4-Wk ServiceProArch Technologies, Inc.The Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
10 out of 60
Barracuda Office 365 email-based securityCrayonBarracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defense, API-based inbox defense, incident response, data protection, and compliance capabilities.
+1
Applicable to:
Threat Protection
11 out of 60
Copilot for Security Readiness AssessmentPerformantaFutureproof your Business Security with Microsoft Security Copilot and Performanta
+2
Applicable to:
Cloud SecurityThreat Protection
12 out of 60
Microsoft 365 E5 NIST 800-171 -1 Week GAP AssessmtKAMIND IT, IncThis offer is for a NIST800-171 Gap Assessment for a single Host Unit, scoped to a single contract, single subnet using the Microsoft 365 E5 license
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
13 out of 60
4 Weeks Microsoft 365 Security AssessmentArmis, Sistemas de Informação, LdaThe Microsoft 365 Assessment engagement will help customers evaluate their current security and compliance posture and create a roadmap to meet the organizational needs.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
14 out of 60
Managed Extended Detection & Response for Workplace - ImplementationDXCSecure your business with Managed XDR for Workplace
+1
Applicable to:
Threat Protection
15 out of 60
Complete MXDR Powered by Microsoft SentinelKiZAN TechnologiesRapidly improve your security posture and protect against an evolving cyber threat landscape 24x7x365 with Microsoft Sentinel, Microsoft 365 Defender, and Microsoft Defender for Cloud.
+2
Applicable to:
Cloud SecurityThreat Protection
16 out of 60
Data Security: Free WorkshopLong View SystemsEnhance your data security with Microsoft Purview by beginning with a complimentary workshop.
+2
Applicable to:
Cloud SecurityThreat Protection
17 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONSUNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
18 out of 60
Microsoft 365 Defender - MXDR Service - 1 Year ImplementationCGI Inc.Unleash your Microsoft Defender 365 capabilities. Automatically detect & correlate threat signals across your endpoints, email, cloud applications, identities, cloud and on-premises workloads.
+1
Applicable to:
Threat Protection
19 out of 60
Protiviti's Security Platform Rationalization Tool - 6 Week AssessmentProtivitiUnderstand your current security solutions compared to those included in Microsoft’s E5 enterprise licensing to identify potential security gaps, tool redundancy, and cost reduction.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
20 out of 60
Overwatch Microsoft 365 Security: 12 Month ImplementationTHREATSCAPE LIMITEDOverwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
21 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
22 out of 60
impelSecure Threat Protection Engagement: Free 4-week workshopimpeltec Pty LtdDiscover threats and vulnerabilities to your Microsoft cloud and on-premises environments
+2
Applicable to:
Cloud SecurityThreat Protection
23 out of 60
Performanta Safe XDRPerformantaUtilising Microsoft Sentinel and Copilot for Security, reduce response times from hours to seconds utilising Microsoft Sentinel, Microsoft Copilot for Security and Microsoft security toolsets
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
24 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
25 out of 60
User Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
26 out of 60
"Exchange in a Box Migration: 1-Month Implementation."Zones, LLCZones Exchange in a Box allows businesses to migrate their current platform to Exchange Online. As an add-on to Exchange Migrations, we recommend Zones Backup as a Service (ZBaaS) offering.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceThreat Protection
27 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
28 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
29 out of 60
Defend Against Threats with SIEM Plus XDR: 2-W WorkshopExelegentThe Defend Against Threats with SIEM Plus XDR (with Attack Simulation) workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
30 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
31 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM Systems• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
32 out of 60
Microsoft 365 Secure Score AssessmentDaymark SolutionsImprove your environment’s security posture using Microsoft Secure Score.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
33 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
34 out of 60
Microsoft 365 Security Review: 3-Wk AssessmentProArch Technologies, Inc.Identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
35 out of 60
Windows Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure LtdAccelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & ManagementMobile Device ManagementThreat Protection
36 out of 60
Modern Workplace Optimization - 4 Week AssessmentProtivitiThis assessment for Microsoft 365 helps customers obtain insights to what it takes to improve productivity against Cyber Threats for Workforce Productivity.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
37 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLCMulti-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
38 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvokeThe Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
39 out of 60
Bulletproof 365 Standard, Managed IT ServiceBulletproof Solutions Inc.Managed IT Services and Support to Make Your Business Run Smoother
+3
Applicable to:
Device Deployment & ManagementMobile Device ManagementThreat Protection
40 out of 60
Secure Modern Workplace Platform ImplementationCognizantEnables teams to securely collaborate, connect and be more productive than ever before, no matter when or where they work.
+3
Applicable to:
Adoption & Change ManagementTeamwork DeploymentThreat Protection
41 out of 60
Defender for Endpoint Professional Security Services | Customized Deployment in as Little as 6-WeeksDifendaMaximize your Microsoft Security investment with our Defender for Endpoint Design & Implementation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
42 out of 60
Compliance Assessment - 6 weeksBDO Digital, LLCIdentify your compliance maturity and areas that need improvement
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
43 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud SecurityThreat Protection
44 out of 60
Virteva Microsoft 365 Defender Ready DeployVirteva LLCGet immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
45 out of 60
Microsoft 365 Tenant Security AssessmentDaymark SolutionsStrengthen the Security of Your Microsoft 365 Environment.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
46 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days ImplementationHCL Technologies Limited.HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
47 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty LtdOur Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud SecurityThreat Protection
48 out of 60
Unified Endpoint Mgmt. - 6 Weeks - ImplementationTCS - Digital WorkplaceTCS Unified Endpoint Management combines Microsoft Intune, Microsoft Defender for Endpoint and Configuration Manager solutions to provide modern management of endpoints with a Zero Trust strategy.
+3
Applicable to:
Device Deployment & ManagementMobile Device ManagementThreat Protection
49 out of 60
Microsoft Defender Secure Score, Security Licensing and Security Skill AssessmentBlue Cycle LLCAssessment to receive prescriptive guidance to improve organizational security posture and increase your Microsoft Defender Secure Score.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
50 out of 60
Microsoft 365 E5 CMMC L3 8 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
51 out of 60
Implementation of Microsoft IntuneCDWCDW’s professional service for Implementation of Microsoft Intune works with you to address the challenges you face in managing and securing your mobile devices and applications.
+3
Applicable to:
Device Deployment & ManagementMobile Device ManagementThreat Protection
52 out of 60
Spyglass-MDR Managed Detection & Response: 2-week ImplementationQuisitiveSpyglass-MDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
53 out of 60
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
54 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte LtdHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
55 out of 60
Intune Proof of ConceptLevacloud LLCThis free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft Intune.
+3
Applicable to:
Device Deployment & ManagementMobile Device ManagementThreat Protection
56 out of 60
Zero Trust Baseline Implementation - 4 weeksBDO Digital, LLCBDO Digital’s Zero Trust Baseline implementation will help your organization apply the Zero Trust framework necessary for addressing threats that arise in the modern workplace.
+1
Applicable to:
Threat Protection
57 out of 60
Microsoft 365 Security WorkshopOlive + GooseImprove your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
58 out of 60
C1st Office 365 Tenant Migration AssessmentC1st Technologies LLCEnsure a smooth Office 365 tenant-to-tenant migration for businesses. We provide comprehensive consulting services to facilitate seamless transitions during mergers, acquisitions, and other scenarios.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityThreat Protection
59 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, IncTrustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud SecurityThreat Protection
60 out of 60