AppSource
Pateikti atsiliepimą
Žinynas ir palaikymas
Įrašyti elementai
Privatūs planai
Luktelėkite, prijungiame jus...
Viskas
Programos
Kategorijos
Pramonės šakos
Konsultavimo paslaugos
Partneriai
Filtrai
Valyti viską
Jūsų vieta
Produktai (1)
Pramonės šakos
Paslaugos tipas
Rezultatų: Konsultavimo paslaugos
Rodomi rezultatai konsultavimo paslaugos.
Rodyti
susijusių rezultatų pramonės debesys
.
Visi rezultatai
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
1 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
2 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week Program
Windows Management Experts, Inc.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
3 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
4 out of 60
Microsoft 365 Information Protection 1-day Workshop
Grant Thornton LLP
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Review your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
5 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
6 out of 60
Microsoft 365 Security: 1 Month Implementation
Valorem LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
A detailed baseline assessment of your current and desired state followed by a pilot production of Microsoft’s advanced security solutions to accelerate your modern security journey.
7 out of 60
Cyderes Managed Security Services for Microsoft Sentinel
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
8 out of 60
ThreatHunter MXDR: 3-Wk Implemenation
eGroup Enabling Technologies
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
eGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
9 out of 60
Endpoint Management Advisory Service: 6-Wk Implementation
Wragby Business Solutions & Technologies Limited
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
This advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
10 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day Workshop
Egroup, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
With Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
11 out of 60
Managed Microsoft 365: 12-MO Briefing
Egroup, Inc.
+3
Applicable to:
Calling for Microsoft Teams
Mobile Device Management
Threat Protection
Get the expertise needed to successfully manage Microsoft 365 with eGroup Enabling Technologies, LLC. Managed Microsoft 365.
12 out of 60
Secure Productive Workplace: Implement 4-Wk
Netsurit
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Netsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
13 out of 60
Threat Protection: 2 week Engagement Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you
14 out of 60
Copilot for Security: 3-week Proof of Concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
15 out of 60
Microsoft Endpoint Management: 3- W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
16 out of 60
Microsoft 365 Security: 4-hour Assessment
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Microsoft 365 Security Assessment provides an in-depth assessment of your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
17 out of 60
Fortis Assessment Microsoft Online Security
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
18 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefing
SMART business LLC
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
19 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
20 out of 60
Microsoft Information Protection Administrator: 3 Days Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Information Protection Administrator course focuses on data governance and information protection within your organization.
21 out of 60
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
22 out of 60
Microsoft 365 GCCH Cybersecurity Maturity Model Certification Configuration Assessment - 5 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Provide IT and Security departments with an indication of readiness for your Microsoft 365 GCCH Tenant as it pertains to Cybersecurity Maturity Model Certification.
23 out of 60
Microsoft 365 Defender - MXDR Service - 1 Year Implementation
CGI Inc.
+1
Applicable to:
Threat Protection
Unleash your Microsoft Defender 365 capabilities. Automatically detect & correlate threat signals across your endpoints, email, cloud applications, identities, cloud and on-premises workloads.
24 out of 60
Secure Endpoint Management - 5 Day - Proof of Concept
Coretek Services
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Protect your organization's endpoints. In this 5-Day quick start Coretek offers three options for providing unified endpoint management and security across all devices.
25 out of 60
Zero-Trust: 3-Day Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
26 out of 60
Microsoft 365 Azure AD 3-wk Implementation Roadmap
Cyclotron Inc.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
27 out of 60
Microsoft Defender for End Points Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
28 out of 60
Phishing, Malware & Spam protection- 2 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
29 out of 60
Managed Detection and Response [Threat Hunting]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Inspect events in your network to locate threat indicators and entities
30 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, Implementation
Reply
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Valorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
31 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
32 out of 60
Device as a Service with Windows 11 and Intune: 4 Week Implementation
Cognizant
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Windows 10 has revolutionized how organizations manage operating systems, delivering the features that you have come to know and rely on, while enhancing mobility and agility without losing data.
33 out of 60
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
34 out of 60
Office 365 Teamwork Security - Managed Service
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Teamwork Security provides a comprehensive security management service for Office 365 platforms
35 out of 60
BUI Cyber MDR - 1 Day Discovery Workshop
BUI (Pty) Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
36 out of 60
Microsoft Defender for Endpoint Professional Services: 1-Wk Implementation
Optiv Security Inc.
+3
Applicable to:
Information Protection & Governance
Knowledge & Insights
Threat Protection
Provide comprehensive, powerful protection at your organization's endpoints from Optiv utilizing the Microsoft Defender for Endpoint solution.
37 out of 60
TS As a Services (TSaaS): 5-day Implementation
E-Level Cloud Services S.A. de C.V.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
38 out of 60
Microsoft 365 Security Alignment Workshop: 10 Days
Sirius Computer Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
39 out of 60
Microsoft Sentinel Proof of Concept: 4 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand how prepared is your Microsoft infrastructure when adversaries attack
40 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
41 out of 60
Implementation of Microsoft Identity Security
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW's Implementation of Microsoft Identity Security service helps customers strengthen their security posture, reduce the risk of data breaches and improve compliance with industry regulations.
42 out of 60
Threat Protection: 5-Week Workshop
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
An executive deep dive into security strategy, tailored to your organization.
43 out of 60
Security für den Einsatz von Microsoft 365 Copilot
novaCapta GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Eine sichere Basis schaffen und technische Hindernisse aus dem Weg räumen für den Einsatz von Copilot for Microsoft 365
44 out of 60
Cyber Insurer Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Uncover gaps and strengthen your position when applying for cyber insurance
45 out of 60
GDPR Assessment: 6-Week Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
46 out of 60
Cyderes Microsoft 365 Incident Response
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Cyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
47 out of 60
Microsoft 365 Licence Health Check: 1-Day Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
48 out of 60
Ransomware & Supply Chain Incident Management: 12 Hour Assessment
Maureen Data Systems
+3
Applicable to:
Compliance Advisory Services
Knowledge & Insights
Threat Protection
Identify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
49 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
50 out of 60
Microsoft Intune (Windows): 1-Wk Proof of Concept
Invoke
+2
Applicable to:
Mobile Device Management
Threat Protection
Map the use cases for, and benefits of, Intune all-up for endpoint management, and learn how to modernize your approach to endpoint management at cloud-scale.
51 out of 60
Microsoft Intune: 3-Wk Current State Assessment
Invoke
+2
Applicable to:
Device Deployment & Management
Threat Protection
Assess your endpoint management current state and have a roadmap to modernize it with the Microsoft Intune family of solutions.
52 out of 60
Microsoft Copilot for Security: 2-Day Workshop
Planet Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
This 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
53 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk Assessment
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Leverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
54 out of 60
HPT Mitigate Compliance and Privacy Risk_1-Day Workshop
HPT Vietnam Corporation
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Understand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
55 out of 60
MDR for Microsoft Sentinel + XDR-5 Week Implementation
KiZAN Technologies
+2
Applicable to:
Cloud Security
Threat Protection
Implement Managed Threat Detection and Response Services with Microsoft Sentinel and Defender
56 out of 60
Microsoft 365 Security Program - 10 Weeks
Trace3
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
57 out of 60
Defender for Endpoint and Defender for Server Deployment
CISILION LTD
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
58 out of 60
Microsoft Defender for Endpoint: 4-Week Implementation
Invoke
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
59 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
60 out of 60
Atgal
2
3
4
5
6
Pirmyn