AppSource
Pateikti atsiliepimą
Žinynas ir palaikymas
Įrašyti elementai
Privatūs planai
Luktelėkite, prijungiame jus...
Viskas
Programos
Kategorijos
Pramonės šakos
Konsultavimo paslaugos
Partneriai
Filtrai
Valyti viską
Jūsų vieta
Produktai (1)
Pramonės šakos
Paslaugos tipas
Rezultatų: Konsultavimo paslaugos
Rodomi rezultatai konsultavimo paslaugos.
Rodyti
susijusių rezultatų pramonės debesys
.
Visi rezultatai
Device Monitoring with Microsoft Defender for Endpoint
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
1 out of 39
Application Monitoring Solution with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
2 out of 39
Insider Risk Management: 8-Wk implementation
PwC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
3 out of 39
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
4 out of 39
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
5 out of 39
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
6 out of 39
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
7 out of 39
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
8 out of 39
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
9 out of 39
Security Assessment: 2Wk Assessment
SXIQ DIGITAL PTY LTD
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Security Assessment Service to rapidly help organisations understand their Azure, DC and M365 current state security posture against common industry standards NIST, CIS, Essential 8 and ISO27001.
10 out of 39
4 Weeks Microsoft 365 Security Assessment
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The Microsoft 365 Assessment engagement will help customers evaluate their current security and compliance posture and create a roadmap to meet the organizational needs.
11 out of 39
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
12 out of 39
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
13 out of 39
Cloud Security Assessment: 2 Week Assessment
Byte Information Technology Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Identify real threats to your cloud environment and develop plans and next steps for your security journey.
14 out of 39
Security Controls Review - 2wk Assessment
The Missing Link Network Integration Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We can help you achieve a more mature, secure IT environment with our comprehensive Security Controls Review powered by Microsoft Security and Compliance.
15 out of 39
IdentityCARE 3-Wk Implementation
SecureCom Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Securing organizations Exchange Online and Multifactor Identity services.
16 out of 39
Microsoft Defender for Server:5-day Implementation
Delphi Consulting
+2
Applicable to:
Cloud Security
Threat Protection
Delphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
17 out of 39
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
18 out of 39
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days Implementation
HCL Technologies Limited.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
19 out of 39
Endpoint Management Workshop
York Telecom Corp
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
20 out of 39
Intelligent Endpoint Protection: 2-week Workshop
NTT DATA Inc.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
21 out of 39
Data Classification and Protection 3Weeks Workshop
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
22 out of 39
Secure Remote Work: 4-Hours Workshop
Professional Advantage Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enable your people to work from anywhere, securely with Microsoft 365.
23 out of 39
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
24 out of 39
Security Assessment - 5-Day Assessment
QUORUM SYSTEMS PTY LTD
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
The outcome of this assessment is a documented security assessment work plan with steps, tools and procedures used to conduct the assessment.
25 out of 39
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
26 out of 39
Conditional Access & MFA 5d Proof of Concept
Generation-e Productivity Solutions Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conditional Access and Multi Factor Authentication deployed without negatively impacting users. We setup the environment then deploy 5 devices plus train you how to do the rest.
27 out of 39
Data#3 Defend against threats: - 8-weeks Implementation
Data#3 Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats using Microsoft Defender, Azure Defender and Azure Sentinel provides you with an integrated solution to protect your organisation.
28 out of 39
Mobile Endpoint Mgt: 1-Wk Accelerated Implement'n
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Corporate Mobile Devices (iOS, Android and macOS)
29 out of 39
Windows Endpoint Mgt: 1-Wk Accelerated Implement'n
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
30 out of 39
Data#3 Essential Eight Adoption Roadmap 2-Week Assessment
Data#3 Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Essential Eight Assessment is a 2 weeks engagement. The audit will help you understand your current security maturity and defensive posture, in alignment with the ACSC Essential Eight.
31 out of 39
Citadel Security Managed Services
Datacom
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Datacom Citadel provides managed security delivered by Datacom specialists in partnership with Microsoft and their cybersecurity solution stack. Citadel delivers proactive and effective security.
32 out of 39
Defender for Office 365: 3-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
33 out of 39
iTop MDR 5-Week Implementation
登豐數位科技股份有限公司
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
協助您的企業快速的偵測惡意活動、使用者行為及各項由端點發起的惡意活動,即時探索弱點和錯誤的設定,以進行補救。
34 out of 39
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
35 out of 39
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
36 out of 39
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
37 out of 39
Secure Hybrid Identity - Defender for Identity: 6 week Implementation
Performanta
+2
Applicable to:
Identity & Access Management
Threat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
38 out of 39
RFFR/ISO 27001 Risk & Compliance Assessment: 6-12 Months
eStorm Australia
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Become Right Fit for Risk (RFFR) & ISO 27001 accredited, address compliance risks, and secure your endpoint devices/users in Microsoft 365 with eStorm’s RFFR & ISO 27001 Risk & Compliance Assessment
39 out of 39
Atgal
1
2
3