AppSource
Berikan umpan balik
Bantuan + dukungan
Item tersimpan
Paket privat
Tunggu sebentar, kami sedang memasukkan Anda...
Semua
Aplikasi
Kategori
Industri
Layanan Konsultasi
Mitra
Filter
Hapus semua
Lokasi Anda
Produk (1)
Industri (1)
Jenis layanan
Layanan konsultan hasil
Menampilkan hasil dalam layanan konsultan
Tampilkan
hasil terkait di industry clouds
.
Semua hasil
Avanade Microsoft Copilot for Security
Avanade, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
1 out of 35
Microsoft 365 Copilot Readiness Assessment
Presidio
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Review data protection, preparation, and governance with a Microsoft Copilot readiness assessment from Presidio.
2 out of 35
HCLTech Business Email Protection: 10-Days Implementation
HCL Technologies Limited.
+1
Applicable to:
Threat Protection
HCLTech Business Email Protection (BEP) Powered By Microsoft EOP and MDO, Enable real time Business Email Protection alerting and automated remediation for email service hosted on Microsoft platform
3 out of 35
Threat Protection: 3-Wk Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
4 out of 35
Avanade Modern Sec Ops FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
5 out of 35
Edgile Caller Verifier Powered by Entra ID : 8 Wks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
6 out of 35
Secure Multi-Cloud Environments: 3-day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Secure Multi-Cloud Environments Workshop helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
7 out of 35
Microsoft 365 Value Discovery - Workshop - 1 Day
DynTek Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT OF MICROSOFT 365 IN YOUR ENVIRONMENT
8 out of 35
Spyglass-MDR Managed Detection & Response: 2-week Implementation
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Spyglass-MDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
9 out of 35
Microsoft Purview Data Security Basic Quick Start 10-week Implementation
Edgile, Inc.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Drive Data Protection Sustainability with Edgile's Data Protection Methodology
10 out of 35
Microsoft 365 Security Program - 10 Weeks
Trace3
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
11 out of 35
Microsoft 365 CISO Security 1 Day Workshop
CDW
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
The CISO Security 1 Day Workshop is designed as a day engagement for Business Decision Makers (BDM) to help showcase the value proposition of Microsoft Security.
12 out of 35
Managed Extended Detection & Response for Workplace - Implementation
DXC
+1
Applicable to:
Threat Protection
Secure your business with Managed XDR for Workplace
13 out of 35
discover-sensitive-data-workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
14 out of 35
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
15 out of 35
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
16 out of 35
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
17 out of 35
Securing Identities and Access: 3-day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
18 out of 35
Microsoft Defender for Endpoint Professional Services: 1-Wk Implementation
Optiv Security Inc.
+3
Applicable to:
Information Protection & Governance
Knowledge & Insights
Threat Protection
Provide comprehensive, powerful protection at your organization's endpoints from Optiv utilizing the Microsoft Defender for Endpoint solution.
19 out of 35
Microsoft Defender for Server:5-day Implementation
Delphi Consulting
+2
Applicable to:
Cloud Security
Threat Protection
Delphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
20 out of 35
Microsoft 365 Cloud Security Readiness: 3-Wk Assessment
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Leverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
21 out of 35
Zero Trust Foundation: 6-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
22 out of 35
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
23 out of 35
ECF Data Threat Protection: 3-Day Workshop
ECF Data LLC
+2
Applicable to:
Cloud Security
Threat Protection
The Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
24 out of 35
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
25 out of 35
Healthcare Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
26 out of 35
Microsoft 365 Incident Response - 5 Week Assessment
Protiviti
+2
Applicable to:
Cloud Security
Threat Protection
Assessing the advanced security capabilities of Microsoft 365
27 out of 35
"Exchange in a Box Migration: 1-Month Implementation."
Zones, LLC
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
Zones Exchange in a Box allows businesses to migrate their current platform to Exchange Online. As an add-on to Exchange Migrations, we recommend Zones Backup as a Service (ZBaaS) offering.
28 out of 35
Zero Trust Defend Against Threats: 7-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
29 out of 35
Microsoft 365 Protecting Corporate Identities: 5-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your organization from devastating breaches with Microsoft 365 identity solutions.
30 out of 35
Comprehensive Microsoft 365 Security Assessment: 1-Week Program
Windows Management Experts, Inc.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
31 out of 35
Lightstream Complimentary Microsoft 365 Core Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
32 out of 35
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
33 out of 35
Microsoft 365/Azure Cloud Secure 5 Day Assessment
DynTek Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
34 out of 35
Rapid Risk Assessment: 4-Wk Assessment
Ascent Global, Inc.
+2
Applicable to:
Information Protection & Governance
Threat Protection
Immediate and long-term Microsoft security strategy assessment utilizing security tools such as Defender, Sentinel, and Cloud App Security.
35 out of 35