FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Todos los resultados
Microsoft Security: 3-Day WorkshopApex Digital SolutionsDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Endpoint Management: 2-Week ImplementationApex Digital SolutionsMaintain control over your devices and the data stored on them to stay protected in a cloud-focused environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
2 out of 60
Microsoft 365 Identity & Security: 2 wk assessmentPSM PartnersCustomized identity and security assessment focused on the Microsoft 365 platform
+2
Applicable to:
Cloud Security
Identity & Access Management
3 out of 60
Microsoft Security: 4-Week ImplementationApex Digital SolutionsEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Microsoft 365/Azure Cloud Secure 5 Day AssessmentDynTek Inc.DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 60
Microsoft 365 E5 CMMC L3 8 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
6 out of 60
Empower for Microsoft 365: 4-Week AssessmentApex Digital SolutionsTrusted Microsoft Cloud expertise and guidance through planning, deployment, adoption, management, and support of the Microsoft 365 suite of services.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
7 out of 60
Microsoft 365 E5 CMMC L1 3 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT LimitedCybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 60
Microsoft 365 Security: 3 Day AssessmentNetwovenProtect against evolving cybersecurity threats and implement a modern workplace using built-in solutions from Microsoft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
10 out of 60
Securing Identities Workshop - 3 DaysEnabling Technologies CorporationSit down with the Security experts at Enabling Technologies to set up your security authentication and access policies for a secure and also productive workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Microsoft 365 Security: 4-Week AssessmentApex Digital SolutionsAchieve better security with Microsoft 365 while receiving focused expertise where it matters most and improving your security maturity over time.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
12 out of 60
Microsoft 365 Incident Response - 5wk AssessmentProtivitiAssessing the advanced security capabilities of Microsoft 365
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 60
Microsoft 365 Value Discovery - Workshop - 1 DayDynTek Inc.OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT
OF MICROSOFT 365 IN YOUR ENVIRONMENT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
14 out of 60
Microsoft 365 OnDemand - 2wk ImplementationProtivitiMicrosoft 365 On Demand Support - providing you with dedicated experts to support and maintain your Microsoft 365 environment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
15 out of 60
4 Weeks Microsoft 365 Security AssessmentArmis, Sistemas de Informação, LdaThe Microsoft 365 Assessment engagement will help customers evaluate their current security and compliance posture and create a roadmap to meet the organizational needs.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
16 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
17 out of 60
Microsoft Security Deployment: 5-day WorkshopCampana & Schott GmbHUnderstand your Microsoft security posture and minimize risks with the right experts
+2
Applicable to:
Cloud Security
Threat Protection
18 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvokeThe Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Microsoft 365 Identity Protection: 2 Week WorkshopNetwovenSecure user identities and devices with our Microsoft 365 Enhanced Identity Protection Workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvokeThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
21 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.Our security services provide a holistic approach through advisory,implementation & managed services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Security Assessment: 2-Wk AssessmentAscent Global, Inc.Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Data Loss Prevention: 3-Wk POCFPT/Intellinet Discover, classify, and protect sensitive data to prevent any inadvertent exposure.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
24 out of 60
Threat Protection: 3-Wk POCFPT/Intellinet Identify security threats and begin to respond and mitigate.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Microsoft Value Calculator: One Hour AssessmentPatriot Consulting Technology Group LLCThe Cost Takeout Opportunity shows the potential cost reductions from consolidating third party solutions with Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Management Services: 10-Week AssessmentCatapult Systems, LLCCatapult Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
29 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)Summit 7 Systems, IncSummit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) practices associated with Levels 1-3 for Microsoft 365, as well as Azure and AAD where appropriate.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
30 out of 60
CMMC Compliance with Microsoft 365: 4 wk impl.InsightInsight’s CMMC services program helps clients understand DoD requirements, develop a strategy to achieve compliance in hybrid and cloud models, and execute to implementation and ongoing operations.
+1
Applicable to:
Cloud Security
31 out of 60
Remote Access to On-Prem Apps: 3 Wk ImplementationInvokeSurface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
+2
Applicable to:
Cloud Security
Identity & Access Management
32 out of 60
Big Green IT Security Assessment: 3-WeekBig Green IT - DevSecure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 60
EM+S Consulting Services: 4-Weeks ImplementationArmis, Sistemas de Informação, LdaWe will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
34 out of 60
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
35 out of 60
Keep Secure 5 weeks implementationSoluciones Tecnológicas Overcast S.A.P.I. de CVWith this product we are achivent our customers to use all security features that have with their licenses; we bring them BI dashboards that help IT and security admins
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
36 out of 60
Cybersecurity - 3-Wk AssessmentadaQuestWith the Cybersecurity Assessment we take a four-phased approach to set your path forward to the cloud.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 60
Microsoft Defender for Endpoint: 2-wk AssessmentAscent Global, Inc.The Microsoft Defender for Endpoint assessment will help the customers review the current state, evaluate existing AV and EDR solutions and expectations, deploy MDE, and plan for ongoing management.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud Security
Threat Protection
39 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Managed Security for Compliance: 1 yr Mgd ServiceInsightDiscover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
+2
Applicable to:
Cloud Security
Compliance Advisory Services
41 out of 60
Microsoft Security Workshop: 3-dayOxford Computer Group LLCThis 3-day workshop shows you how to put Microsoft’s security capabilities to work. Learn how secure your organization is now and how to mitigate and protect against threats in the future.
+2
Applicable to:
Cloud Security
Threat Protection
42 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days ImplementationHCL TechnologiesHCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SASConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Application Modernization: 3-Weeks AssessmentadaQuestWith the Application Modernization Assessment we take a four-phased approach.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
45 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) LtdReadiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Office 365 Security: 1-Day AssessmentNetrix LLCSecurity assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
+1
Applicable to:
Cloud Security
47 out of 60
Threat Check: 4-Hr WorkshopNetrix LLCAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Security: 8H-Workshop "Sectors of Cybersecurity"adaQuestLearn how to put next-generation security operations to work for you with the Azure Sentinel add-on module.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
49 out of 60
Secure Workspace: 1 Day WorkshopWatserv Inc.A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
50 out of 60
Microsoft 365 Security: 1-Day BriefingNetrix GlobalA tailored planning engagement targeted at ensuring your Microsoft cloud solutions are aligned with your needs.
+1
Applicable to:
Cloud Security
51 out of 60
Virtual CISO (vCISO) Managed ServicesNetrix LLCOur virtual CISO offering provides organizations a senior level security executive for ongoing security program management and governance.
+1
Applicable to:
Cloud Security
52 out of 60
App Identity Evaluation: 8H WorkshopadaQuestSecure & manage your entire application estate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Okta Migration to Azure AD: 3-Week AssessmentInvokeThe Okta Migration to Azure AD Assessment offering is designed to assess & plan your migration efforts to your existing investments in Azure AD.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
54 out of 60
Hybrid Cloud Security: 8H WorkshopadaQuestGet insights on active threats and vulnerabilities related to their hybrid workloads.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
55 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
56 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender
for enterprises, resulting in improved detection rates, threat coverage, and
organizational security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLCIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
59 out of 60
Microsoft Security Immersion: 1 Day BriefingSynergy Technical, LLCKnowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
60 out of 60