FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Todos los resultados
cyber security threat analysis workshopU-BTech Solutionsthe workshop is design to discover threats and risks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
MDR for Microsoft DefenderADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Bulletproof 365 Standard, Managed ServiceBulletproof Solutions Inc.Essential Security. Zero Productivity Tradeoffs. Bulletproof 365 combines Microsoft 365 + IT Service Desk + Employee Education, all wrapped in Bulletproof Security.
employee educat
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
4 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshopHPT Vietnam CorporationThe Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Defender for IoT Enterprise: 8-Week POCITC Secure LtdUnderstanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
6 out of 60
Performanta MXDR ServicesPerformantaPerformanta’s Consultancy and MXDR service is built on Microsoft’s Endpoint Detection and Response technology, and combines the critical elements required to provide enterprise-class cyber security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 60
Defender for IoT Operational Technology: 8-Week POCITC Secure LtdITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
8 out of 60
Defender for IoT Operational Technology Discovery: 2-Hour WorkshopITC Secure LtdITC Secure's Defender for IoT (OT) Discovery Workshop helps you understand the solution, the fit to your OT estate and potential threat posture improvements
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
9 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security ServicesCognizantDefend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 60
Microsoft Sentinel Quick StartEdgile, Inc.Production pilot, which is expected to provide centralized log collection, detection of previously undetected threats, investigation with artificial intelligence, and Rapid Response to incidents.
+1
Applicable to:
Cloud Security
12 out of 60
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
13 out of 60
Endpoint Security Advanced Quick Start 14-wk ImplementationEdgile, Inc.Pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
14 out of 60
Endpoint Security Basic Quick Start 12-wk ImplementationEdgile, Inc.Achieve a Microsoft pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
15 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
+2
Applicable to:
Cloud Security
Identity & Access Management
16 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLCBreach and Attack Simulations — We Attack to Defend You
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
17 out of 60
Protect 365 App - 1 hour implementationCloud LifeThe Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
18 out of 60
Data Protection and Compliance Quick StartSoftchoiceThe Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
19 out of 60
Microsoft Intune ServiceSii sp. z ooMicrosoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM).
+3
Applicable to:
Cloud Security
Device Deployment & Management
Insider Risk
20 out of 60
Managed SOC_by SoftwareONESoftwareONESecure your IT Environment with Microsoft Services and on-call Cyber-security Analysts with Managed SOC by SoftwareONE
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 60
Microsoft Sentinel Proof of Concept: 4 WeeksNetrix LLCUnderstand how prepared is your Microsoft infrastructure when adversaries attack
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayonEvaluate and strengthen the current security posture of your environments in Microsoft365 and Microsoft Azure
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
23 out of 60
MDR Shield: 4-Wk ImplementationLong View Systems“MDR Shield” is Long View’s cyber security managed detection and response service.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
24 out of 60
Viva Insights WorkshopCDWThe Enablement Workshop for Microsoft Viva from CDW focuses on finding
your organization’s pain points, and it identifies how the Viva platform can help
+3
Applicable to:
Cloud Security
Microsoft 365 Live Events
Teams Custom Solutions
25 out of 60
Virteva Microsoft 365 Defender Ready DeployVirteva LLCGet immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POCITC Secure LtdExperience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 60
Invoke Data Risk AssessmentInvokeThis assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
28 out of 60
Microsoft 365 CISO Security 1 Day WorkshopCDWThe CISO Security 1 Day Workshop is designed as a day engagement for Business Decision Makers (BDM) to help showcase the value proposition of Microsoft Security.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
29 out of 60
Microsoft 365 Security: 4-hour AssessmentQuisitiveThe Microsoft 365 Security Assessment provides an in-depth assessment of your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
Digital Workplace Program: 4-week AssessmentQuisitiveThe Digital Workplace Foundations Assessment helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tool
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
31 out of 60
AgileAscend: Identity for Mergers and Acquisitions: 8-Wk AssessmentAgile ITAgile IT helps organizations with multiple identity services and one or more existing Microsoft 365/Azure Active Directory tenants in use. This is often found in organizations during M&A
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
32 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
34 out of 60
Management Services: 3-month AssessmentQuisitiveQuisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
35 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş."Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTDMicrosoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
+2
Applicable to:
Cloud Security
Threat Protection
38 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLCThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
40 out of 60
Endpoint Management: 3-Day WorkshopApex Digital SolutionsBegin the steps to manage and protect your devices, your apps, and your users
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
41 out of 60
Microsoft 365: 2-Week AssessmentApex Digital SolutionsEstablish a clear roadmap and change management plan for your journey to a modern workplace.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
42 out of 60
Cyber Portfolio Rationalization: 3-Day WorkshopPwCSimplify your cybersecurity portfolio to reduce the cost and complexity of your Microsoft 365 and Microsoft Azure environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
43 out of 60
Microsoft Security: 3-Day WorkshopApex Digital SolutionsDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Endpoint Management: 2-Week ImplementationApex Digital SolutionsMaintain control over your devices and the data stored on them to stay protected in a cloud-focused environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
45 out of 60
Microsoft 365 Identity & Security: 2 wk assessmentPSM PartnersCustomized identity and security assessment focused on the Microsoft 365 platform
+2
Applicable to:
Cloud Security
Identity & Access Management
46 out of 60
Microsoft Security: 4-Week ImplementationApex Digital SolutionsEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Microsoft 365/Azure Cloud Secure 5 Day AssessmentDynTek Inc.DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
48 out of 60
Microsoft 365 E5 CMMC L3 8 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
49 out of 60
Empower for Microsoft 365: 4-Week AssessmentApex Digital SolutionsTrusted Microsoft Cloud expertise and guidance through planning, deployment, adoption, management, and support of the Microsoft 365 suite of services.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
50 out of 60
Microsoft 365 E5 CMMC L1 3 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT LimitedCybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
52 out of 60
Microsoft 365 Security: 3 Day AssessmentNetwovenProtect against evolving cybersecurity threats and implement a modern workplace using built-in solutions from Microsoft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
Securing Identities Workshop - 3 DaysEnabling Technologies CorporationSit down with the Security experts at Enabling Technologies to set up your security authentication and access policies for a secure and also productive workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Microsoft 365 Security: 4-Week AssessmentApex Digital SolutionsAchieve better security with Microsoft 365 while receiving focused expertise where it matters most and improving your security maturity over time.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
55 out of 60
Microsoft 365 Incident Response - 5wk AssessmentProtivitiAssessing the advanced security capabilities of Microsoft 365
+2
Applicable to:
Cloud Security
Threat Protection
56 out of 60
Microsoft 365 Value Discovery - Workshop - 1 DayDynTek Inc.OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT
OF MICROSOFT 365 IN YOUR ENVIRONMENT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
57 out of 60
Microsoft 365 OnDemand - 2wk ImplementationProtivitiMicrosoft 365 On Demand Support - providing you with dedicated experts to support and maintain your Microsoft 365 environment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
58 out of 60
4 Weeks Microsoft 365 Security AssessmentArmis, Sistemas de Informação, LdaThe Microsoft 365 Assessment engagement will help customers evaluate their current security and compliance posture and create a roadmap to meet the organizational needs.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
59 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
60 out of 60