FiltraiValyti viską
Rezultatų: Konsultavimo paslaugos
Rodomi  rezultatai konsultavimo paslaugos.
Microsoft Sentinel Quick StartEdgile, Inc.Production pilot, which is expected to provide centralized log collection, detection of previously undetected threats, investigation with artificial intelligence, and Rapid Response to incidents.
+1
Applicable to: Cloud Security
Cloud Security
1 out of 60
Management Services: 3-month AssessmentQuisitiveQuisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Information Protection & Governance
Information Protection & Governance
2 out of 60
Lightstream Data Security AssessmentLightstreamLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
3 out of 60
Lightstream Threat Protection Assessment and Deployment RoadmapLightstreamLeveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
4 out of 60
MDR WorkshopGrant Thornton LLPMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
5 out of 60
Virtual Desktop - Health and Configuration 1 Week AssessmentCDI LLCCDI provides a review of a customer's Virtual Desktop environment and identify opportunities to improve the performance, stability, security and manageability.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Knowledge & Insights
Knowledge & Insights
6 out of 60
Spyglass Managed Security Services: 2-week ImplementationQuisitiveSpyglass is a security and compliance program for cloud and on-premises organizations that aligns security and compliance with current requirements of best-in-class technology and expert deployment.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
7 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day WorkshopeGroup Enabling Technologies, LLCWith Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
8 out of 60
Copilot Security Assessment: 4-Wk AssessmentManaged SolutionUnlock the full potential of AI with a comprehensive Microsoft Copilot Security Assessment, fully integrated with Microsoft 365
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Knowledge & Insights
Knowledge & Insights
9 out of 60
Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk
10 out of 60
Windows 365 Deployment : 12 month ImplementationPatriot Consulting Technology Group LLCPatriot will design, configure, test and deploy Microsoft Windows 365 for your environment.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
11 out of 60
Copilot for Security Readiness AssessmentInvokeInvoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
12 out of 60
Endpoint Security Basic Quick Start 12-wk ImplementationEdgile, Inc.Achieve a Microsoft pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Mobile Device Management
Mobile Device Management
13 out of 60
Data Security and Governance: 2 Hour Free BriefingNetwovenNetwoven Data Security and Governance free strategy workshop will help you get started on the path to discover, protect, and govern your sensitive corporate data
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Insider Risk
Insider Risk
14 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP TechnologiesThe SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
15 out of 60
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
16 out of 60
Zero Trust Assessment: 3-Week WorkshopAccountabilITOur Microsoft Zero Trust Assessment: 3-Week Workshop is designed to evaluate an organization's security posture and provide guidance on implementing a Zero Trust security model.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
17 out of 60
Microsoft 365 Copilot Implementation Readiness AssessmentCollective InsightsActionable recommendations in data security, technical infrastructure, user adoption, and workflow integration, ensuring preparation to adopt and integrate new technologies.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
18 out of 60
Copilot for Microsoft 365 AssessmentIt1 Source LLCPrepare your organization for the future of AI technology with a secure, productive, and modernized data foundation
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Teamwork Deployment
Teamwork Deployment
19 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk ImplementationNeway TechnologiesStreamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
20 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTDMicrosoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
21 out of 60
Centric Threat Protection EngagementCentric Consulting, LLCLearn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Knowledge & Insights
Knowledge & Insights
22 out of 60
MDR Shield: 4-Wk ImplementationLong View Systems“MDR Shield” is Long View’s cyber security managed detection and response service.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Mobile Device Management
Mobile Device Management
23 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to: Cloud Security
Cloud Security Insider Risk
Insider Risk Threat Protection
Threat Protection
24 out of 60
iT1's Security AssessmentIt1 Source LLCImprove your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
25 out of 60
Cybersecurity AssessmentCDI LLCThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Insider Risk
Insider Risk
26 out of 60
Microsoft Defender for Cloud Apps: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Cloud Apps
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
27 out of 60
Microsoft 365 Copilot Data Security AssessmentCollective InsightsAccelerate your deployment of Microsoft Copilot while ensuring comprehensive data security and compliance across the enterprise.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
28 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
29 out of 60
Microsoft 365 GCC High Rapid DeploymentDaymark SolutionsDeploy Microsoft 365 GCC High services in days, not weeks, while leveraging Daymark’s enhanced security baseline.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services
30 out of 60
Modern Managed Services: 2-tägiges AssessmentnovaCapta GmbHIhre Optionen für Managed Services rund um Endpunkte, Microsoft Azure, Microsoft 365 und Security am Modern Workplace entdecken
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Mobile Device Management
Mobile Device Management
31 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
32 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLCStrengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
33 out of 60
Google Workspace to Microsoft 365 MigrationDataVoxDataVox offers migration services for your company from Google Workspace to Microsoft 365
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
34 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 WeeksNetrix GlobalUnderstand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
+3
Applicable to: Cloud Security
Cloud Security Insider Risk
Insider Risk Threat Protection
Threat Protection
35 out of 60
Cloud Security Envisioning WorkshopTierPointThe Cloud Security Envisioning engagement helps you explore how to detect threats, understand your security posture, and identify risks and opportunities across all your cloud environments.
+2
Applicable to: Cloud Security
Cloud Security Insider Risk
Insider Risk
36 out of 60
Microsoft 365: 2-Week ImplementationTechnologentExpert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
37 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServusGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
38 out of 60
Office 365 Migration 3-Month ImplementationRKON TECHNOLOGIESLeverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Teamwork Deployment
Teamwork Deployment
39 out of 60
Advanced Email Security: 4-Day ImplementationFSI StrategiesLeverage Microsoft Defender for Office 365 to implement best in class email security
+3
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection Workplace Analytics
Workplace Analytics
40 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementationInterlink Cloud Advisors, Inc.Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
41 out of 60
Multifactor Authentication: 4-Day ImplementationFSI StrategiesImplementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
42 out of 60
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
43 out of 60
Microsoft Defender for Endpoint: 4-Week ImplementationInvokeUnderstand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Threat Protection
Threat Protection
44 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
45 out of 60
Zero Trust Security AssessmentConcurrency, Inc.Assess and advance your Zero Trust security posture—and accelerate or expand your Microsoft 365 security strategy with expert-led guidance.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
46 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
47 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
+3
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection Workplace Analytics
Workplace Analytics
48 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk EngagementCloudScale InternationalThis assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
49 out of 60
Introducing Microsoft Entra: 2 Hour WorkshopSlalom ConsultingLearn about how Microsoft Entra will help your business step into tomorrow with modern identity and access solutions by introducing you to modern access security across a broad range of products.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
50 out of 60
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Insider Risk
Insider Risk
51 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
+2
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
52 out of 60
Digital Workplace Program: 4-week AssessmentQuisitiveThe Digital Workplace Foundations Assessment helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tool
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Teamwork Deployment
Teamwork Deployment
53 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
54 out of 60
MXDR Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to: Cloud Security
Cloud Security Insider Risk
Insider Risk Threat Protection
Threat Protection
55 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr WorkshopNetwovenLearn how to put next generation Microsoft security tools to work for you.
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
56 out of 60
Cyber Insurer Readiness WorkshopSentinel Technologies Inc.Uncover gaps and strengthen your position when applying for cyber insurance
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Threat Protection
Threat Protection
57 out of 60
Microsoft Defender for End Points JumpstartSentinel Technologies Inc.Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
58 out of 60
Microsoft Defender for Office JumpstartSentinel Technologies Inc.Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
59 out of 60
Cloud-Native Migration Service: 4-Month ImplementationCyclotron Inc.With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
+2
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
60 out of 60