FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Edgile Caller Verifier Powered by Entra ID : 8 WeeksWipro LtdWipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
+2
Applicable to:
Identity & Access Management
Threat Protection
1 out of 60
Proof of Concept Solution Microsoft 365 CopilotKPCS CZ, s.r.o.Embark on a transformative journey with KPCS's 4 weeks PoC for Microsoft 365 Copilot. Uncover tailored use-cases and maximize the value for your business. Revolutionize your approach to innovation.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
2 out of 60
Infosys Intelligent Security SolutionInfosys LimitedInfosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 60
AVASecure 360 Next-Gen MXDR Managed ServicesAVASOFTAt AVASOFT, we are committed to securing your digital environment through a holistic Managed Extended Detection and Response (MXDR) solution.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
4 out of 60
Microsoft 365 threat protection assessmentAVASOFTIdentify vulnerabilities and threats in Microsoft 365. Use advanced protection, intelligence, detection, and response to safeguard data. Enhance security with real-time insights and monitoring.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
5 out of 60
Defend, Protect, Secure with Microsoft Defender XDRComtrade System IntegrationTake the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
+2
Applicable to:
Cloud Security
Threat Protection
6 out of 60
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
7 out of 60
Introducing Microsoft Entra: 2 Hour WorkshopSlalom ConsultingLearn about how Microsoft Entra will help your business step into tomorrow with modern identity and access solutions by introducing you to modern access security across a broad range of products.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Microsoft Cloud Application for 3rd Party AppsAVASOFTSecure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 60
MDS - Microsoft Security Copilot WorkshopMaureen Data SystemsDiscover how Microsoft Security Copilot can enhance your security operations, streamline incident response, and empower your security teams
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 60
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 60
Secure Productivity with Microsoft 365 Proof of Value & ImplementationBDO Digital, LLCMaximize your investment in the Microsoft 365 suite by activating and implementing all available features with security across your organization
+3
Applicable to:
Device Deployment & Management
Teamwork Deployment
Threat Protection
13 out of 60
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
14 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITEDConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
15 out of 60
Copilot For Microsoft 365 Readiness AssessmentTHREATSCAPE LIMITEDThreatscape’s Copilot for Microsoft 365 Readiness Assessment (CRA) service can help you understand, and begin to address, the risks of Copilot for Microsoft 365 adoption.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
16 out of 60
Microsoft Purview Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Purview while ensuring alignment with best practice for security, governance, and compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Microsoft 365 Security Support Service BriefingTHREATSCAPE LIMITEDThreatscape’s Microsoft 365 Security Support Service helps organisations resolve security related technical issues experienced with the suite of Microsoft security products.
+2
Applicable to:
Compliance Advisory Services
Threat Protection
19 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 60
Copilot for Security Readiness AssessmentPerformantaFutureproof your Business Security with Microsoft Security Copilot and Performanta
+2
Applicable to:
Cloud Security
Threat Protection
21 out of 60
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 60
Endpoint Management Advisory Service: 6-Wk ImplementationWragby Business Solutions & Technologies LimitedThis advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
23 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.We assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Performanta Safe XDRPerformantaUtilising Microsoft Sentinel and Copilot for Security, reduce response times from hours to seconds utilising Microsoft Sentinel, Microsoft Copilot for Security and Microsoft security toolsets
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 60
Secure Hybrid Identity - Defender for Identity: 6 week ImplementationPerformantaSecure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
+2
Applicable to:
Identity & Access Management
Threat Protection
26 out of 60
Onesec’s Secure Access to Microsoft 365 with ZscalerSecure Nextgen SystemsEnhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
27 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
28 out of 60
Hyperbolt Secure DeployDelphi ConsultingHyperbolt Secure Deploy offers automated Microsoft 365 Security implementation, delivering enterprise-grade protection in weeks using industry-standard policies.
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
29 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM Systems• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen SystemsLearn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
31 out of 60
Onesec Digital IdentitySecure Nextgen SystemsHaving a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
+2
Applicable to:
Identity & Access Management
Threat Protection
32 out of 60
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, LdaThe engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
33 out of 60
MDS - Modern Security Operations EngagementMaureen Data SystemsA 2-day engagement to demonstrate how intelligent security analytics and threat intelligence can detect and stop active threats, encouraging organizations to deploy and adopt Modern SecOps solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLCIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
36 out of 60
ALFA Managed SOC with Microsoft Defender XDR and SentinelAlfa Connections Pte LtdALFA Managed Security Operations Center (SOC) leverages the powerful capabilities of Microsoft Defender Extended Detection and Response (XDR) and Microsoft Sentinel (SIEM & SOAR) to provide a robust,
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
38 out of 60
Cybersecurity Managed Services for Microsoft by SoftwareOneSoftwareOneSecuring your digital landscape with SoftwareOne Cybersecurity Managed Services for Microsoft
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Managed Extended Detection & Response (MXDR) for Workplace - ImplementationDXCSecure your business with Managed XDR for Workplace
+1
Applicable to:
Threat Protection
40 out of 60
Threat Protection - 2 Days WorkshopMayasoft Bilgi Sistemleri A.S.We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
+2
Applicable to:
Cloud Security
Threat Protection
41 out of 60
Unified Endpoint Mgmt. - 6 Weeks - ImplementationTCS - Digital WorkplaceTCS Unified Endpoint Management combines Microsoft Intune, Microsoft Defender for Endpoint and Configuration Manager solutions to provide modern management of endpoints with a Zero Trust strategy.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
42 out of 60
Defender for Endpoint Managed Servicee2e-assure LtdMicrosoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Synergy Advisor POC-in-a-box for Microsoft Security CopilotSynergy Advisors LLCEnhance your security posture with Synergy Advisors POC-in-a-box for Microsoft Security Copilot
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
45 out of 60
Enhanced Data Privacy with Microsoft PurviewAVASOFTConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
46 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLCGet introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
47 out of 60
Barracuda Office 365 email-based securityCrayonBarracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defense, API-based inbox defense, incident response, data protection, and compliance capabilities.
+1
Applicable to:
Threat Protection
48 out of 60
Microsoft Defender for Business Managed Service: Monthly MDRe2e-assure LtdMaximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
49 out of 60
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFTOur solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
50 out of 60
Synergy Advisors Architecture Design Sessions (ADS) for Microsoft Security CopilotSynergy Advisors LLCA Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
51 out of 60
Copilot for Microsoft 365: Security AcceleratorKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
52 out of 60
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data LtdWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
53 out of 60
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvokeProvide cross-domain threat protection and simplify breach prevention
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Zero Trust Assessment - 3 WeeksArmis, Sistemas de Informação, LdaSet Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Assessment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
55 out of 60
Cyber Security AssessmentELEVATE Solutions LimitedThe Cybersecurity Assessment helps customers assess their security posture and risk to insider threats.
+1
Applicable to:
Threat Protection
56 out of 60
Synergy Advisors Microsoft Security Copilot E-mmersion ExperienceSynergy Advisors LLCAI-powered security for rapid, scalable, and effective defense
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
57 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.Microsoft’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
MDR for Microsoft DefenderADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
+2
Applicable to:
Cloud Security
Threat Protection
59 out of 60
Red Canary MSSP FastTrack for SecurityRed CanaryLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60