FiltresTout effacer
Services de conseil résultats
Affichage des résultats dans services de conseil.
Tous les résultats
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
1 out of 60
Threat Protection EngagementadaQuestLearn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
2 out of 60
Microsoft 365 Rapid Security Assessment: 1-Wk AssessmentAwara IT Kazakhstan LLPMicrosoft 365 Rapid Security Assessment is a quick yet comprehensive evaluation to enhance Microsoft 365 security against evolving cyber threats
+2
Applicable to:
Cloud SecurityThreat Protection
3 out of 60
Copilot for Security Readiness AssessmentPerformantaFutureproof your Business Security with Microsoft Security Copilot and Performanta
+2
Applicable to:
Cloud SecurityThreat Protection
4 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
5 out of 60
Proof of Concept Solution Microsoft 365 CopilotKPCS CZ, s.r.o.Embark on a transformative journey with KPCS's 4 weeks PoC for Microsoft 365 Copilot. Uncover tailored use-cases and maximize the value for your business. Revolutionize your approach to innovation.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceThreat Protection
6 out of 60
Performanta Safe XDRPerformantaUtilising Microsoft Sentinel and Copilot for Security, reduce response times from hours to seconds utilising Microsoft Sentinel, Microsoft Copilot for Security and Microsoft security toolsets
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
7 out of 60
MDS - Microsoft Copilot for Security WorkshopMaureen Data SystemsDiscover how Microsoft Copilot for Security can enhance your security operations, streamline incident response, and empower your security teams
+3
Applicable to:
Adoption & Change ManagementCloud SecurityThreat Protection
8 out of 60
Red Canary MSSP FastTrack for SecurityRed CanaryLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
9 out of 60
Barracuda Office 365 email-based securityCrayonBarracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defense, API-based inbox defense, incident response, data protection, and compliance capabilities.
+1
Applicable to:
Threat Protection
10 out of 60
Threat Protection: 5-Week WorkshopBlueVoyantAn executive deep dive into security strategy, tailored to your organization.
+2
Applicable to:
Cloud SecurityThreat Protection
11 out of 60
Email Security Threat AssessmentAVA SOFTWARE INCConfident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
12 out of 60
Azure and Microsoft 365 SecOps DiagnosticsBlueVoyantBlueVoyant experts review an organization's Azure and Microsoft 365 Defender Security Portal to identify potential vulnerabilities and provide actionable recommendations.
+1
Applicable to:
Threat Protection
13 out of 60
Protect 365 App - 1 hour implementationCloud LifeThe Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
+3
Applicable to:
Cloud SecurityMobile Device ManagementThreat Protection
14 out of 60
Phishing, Malware & Spam protection- 2 weeks ImplementationAVA SOFTWARE INCPhishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
15 out of 60
Copilot - 2 Days Adoption WorkshopINSOMEA COMPUTER SOLUTIONS TUNISIE SARLINSOMEA will help users in adopting copilot within companies from different sectors and sizes
+2
Applicable to:
Frontline WorkersThreat Protection
16 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
17 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 WksWipro LtdWipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
+2
Applicable to:
Identity & Access ManagementThreat Protection
18 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoft BrasilBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
19 out of 60
Shadow IT discovery with Microsoft cloud app securityAVA SOFTWARE INCKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
20 out of 60
Microsoft Defender for Business Managed Service: Monthly MDRe2e-assure LtdMaximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
21 out of 60
Teams & SharePoint Security HardeningAVA SOFTWARE INCTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access ManagementTeams Custom SolutionsThreat Protection
Synergy Advisor POC-in-a-box for Microsoft Copilot for SecuritySynergy Advisors LLCEnhance your security posture with Synergy Advisor POC-in-a-box for Microsoft Copilot for Security
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceThreat Protection
23 out of 60
Onevinn Secure Microsoft Copilot Journey WorkshopOnevinn ABThis workshop will enable you to take full advantage of Microsoft 365 Copilot with focus on Compliance and Information Protection.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
24 out of 60
Data Protection and Governance with Microsoft PurviewAVA SOFTWARE INCConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
25 out of 60
Enhanced Data Privacy with Microsoft PurviewAVA SOFTWARE INCConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
26 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era TechnologySecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
27 out of 60
Microsoft 365 Defender Attack Simulation: 4 Weeks DeploymentSoluciones Tecnológicas Overcast S.A.P.I. de CVMicrosoft 365 attack simulation training works to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
28 out of 60
Copilot for Microsoft 365: Security AcceleratorKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
29 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro LtdWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
30 out of 60
KMicro's Sentinel360 MXDR with Microsoft Copilot for Security: 4-Wk POC/POVKMicro Tech, Inc.Enhance threat hunting & accelerated MXDR for Microsoft Sentinel with Copilot for Security integration
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
31 out of 60
Security Operations Center with Microsoft SentinelAVA SOFTWARE INCMonitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
32 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
+3
Applicable to:
Cloud SecurityThreat ProtectionWorkplace Analytics
33 out of 60
Microsoft Sentinel - Log Management and threat detectionAVA SOFTWARE INCIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
34 out of 60
Application Monitoring Solution with Microsoft SentinelAVA SOFTWARE INCEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
35 out of 60
Microsoft 365 threat protection assessmentAVA SOFTWARE INCIdentify vulnerabilities and threats in Microsoft 365. Use advanced protection, intelligence, detection, and response to safeguard data. Enhance security with real-time insights and monitoring.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
36 out of 60
Defend, Protect, Secure with Microsoft Defender XDRComtrade System IntegrationTake the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
+2
Applicable to:
Cloud SecurityThreat Protection
37 out of 60
Cyber Security AssessmentELEVATE Solutions LimitedThe Cybersecurity Assessment helps customers assess their security posture and risk to insider threats.
+1
Applicable to:
Threat Protection
38 out of 60
Optimized SecOps leveraging Microsoft Copilot for SecuritySynergy Advisors LLCA Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceThreat Protection
39 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
40 out of 60
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
41 out of 60
Defend Against Threats with SIEM Plus XDR: 2-W WorkshopExelegentThe Defend Against Threats with SIEM Plus XDR (with Attack Simulation) workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
42 out of 60
Microsoft 365 complete security HardneningAVA SOFTWARE INCAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
43 out of 60
Synergy Advisor Architecture Design Sessions (ADS) for Microsoft Copilot for SecuritySynergy Advisors LLCA Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceThreat Protection
44 out of 60
Microsoft Intune DeploymentSecure Future Bilgi Tek. ve Hiz. Tic A.S.The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
+3
Applicable to:
Identity & Access ManagementMobile Device ManagementThreat Protection
45 out of 60
Sensitive data risk assessmentAVA SOFTWARE INCConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
46 out of 60
Pentest-4wks AssessmentadaQuestGain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
47 out of 60
Red Canary Cloud Security AssessmentRed CanaryAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
48 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed CanaryGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
49 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
50 out of 60
Defender for Endpoint Managed Servicee2e-assure LtdMicrosoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
51 out of 60
Microsoft Cloud application security Assessment - 2 weeksAVA SOFTWARE INCUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
52 out of 60
Microsoft 365 Defender for Endpoint Vulnerability AssessmentAVA SOFTWARE INCEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
53 out of 60
Microsoft Cloud Application for 3rd Party AppsAVA SOFTWARE INCSecure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
54 out of 60
Infosys Intelligent Security SolutionInfosys LimitedInfosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
55 out of 60
Microsoft 365 Threat Protection Workshop + 5 DayCyberwise Siber Güvenlik TIC. AS.Is your Microsoft 365 environment secure? Do you wonder about your current security maturity? We will assist you with a full-fledged workshop on how to deploy and implement Microsoft 365 Security.
+1
Applicable to:
Threat Protection
56 out of 60
Onesec Digital IdentitySecure Nextgen SystemsHaving a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
+2
Applicable to:
Identity & Access ManagementThreat Protection
57 out of 60
Security and compliance assessment with Microsoft PurviewAVA SOFTWARE INCFortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
58 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
59 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITEDConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
60 out of 60