FiltriNotīrīt visu
Konsultāciju pakalpojumi rezultāti
Tiek rādīti rezultāti šeit: konsultāciju pakalpojumi.
Visi rezultāti
Copilot for Security Accelerator: 2-week ImplementationNeway TechnologiesNeway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
+2
Applicable to:
Cloud SecurityThreat Protection
1 out of 47
Secure Productive Workplace: Implement 4-WkNetsuritNetsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
2 out of 47
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLCThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
3 out of 47
Microsoft Security: 3-Day WorkshopApex Digital SolutionsDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
4 out of 47
Microsoft Security: 4-Week ImplementationApex Digital SolutionsEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
5 out of 47
Microsoft 365 Security: 4-Week AssessmentApex Digital SolutionsAchieve better security with Microsoft 365 while receiving focused expertise where it matters most and improving your security maturity over time.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityThreat Protection
6 out of 47
Security Assessment: 2-Wk AssessmentAscent Global, Inc.Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
7 out of 47
Threat Protection: 3-Wk POCFPT/Intellinet Identify security threats and begin to respond and mitigate.
+2
Applicable to:
Cloud SecurityThreat Protection
8 out of 47
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
9 out of 47
EMS Energize: 1-month proof of conceptInterlink Cloud Advisors, Inc.Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
+3
Applicable to:
Identity & Access ManagementMobile Device ManagementThreat Protection
10 out of 47
Big Green IT Security Assessment: 3-WeekBig Green IT - DevSecure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
11 out of 47
Microsoft 365 Secure Score: 4 Week ImplementationRazor Technology, LLCAudit, review, and improve security posture of Microsoft 365 Estate through Secure Score methodology. Receive expert advice for identity, compliance, and threat protection improvements.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
12 out of 47
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
13 out of 47
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) LtdReadiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
14 out of 47
Defend Against Threats with SIEM Plus XDRNetrix GlobalAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
15 out of 47
TS As a Services (TSaaS): 5-day ImplementationE-Level Cloud Services S.A. de C.V.Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
+3
Applicable to:
Cloud SecurityMobile Device ManagementThreat Protection
16 out of 47
CSE Security Baseline 3 days implementationComputer Solutions East3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
17 out of 47
Microsoft Purview Data Security Basic Quick Start 10-week ImplementationEdgile, Inc.Drive Data Protection Sustainability with Edgile's Data Protection Methodology
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
18 out of 47
Security & Compliance Readiness: 2-Wk. AssessmentiCorps Technologies, InciCorps Security and Compliance Services provide a complete security assessment of your Microsoft platform and integrated services.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
19 out of 47
1-Day Security & Identity WorkshopConvergeOneTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
20 out of 47
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
+2
Applicable to:
Cloud SecurityThreat Protection
21 out of 47
ThreatHunter MXDR: 3-Wk ImplemenationeGroup Enabling TechnologieseGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
22 out of 47
24x7 Microsoft 365 Security MDR: 4-Wk AssessmentApex Digital SolutionsAchieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityThreat Protection
23 out of 47
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer SolutionsSirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
24 out of 47
BYOD Endpoint Mgt: 1-Wk Accelerated ImplementationITC Secure LtdAccelerated Deployment of Microsoft Endpoint Manager for Bring Your Own Device (BYOD) capability
+3
Applicable to:
Device Deployment & ManagementMobile Device ManagementThreat Protection
25 out of 47
Mobile Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure LtdAccelerated Deployment of Microsoft Endpoint Manager for Corporate Mobile Devices (iOS, Android and macOS)
+3
Applicable to:
Device Deployment & ManagementMobile Device ManagementThreat Protection
26 out of 47
Windows Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure LtdAccelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & ManagementMobile Device ManagementThreat Protection
27 out of 47
discover-sensitive-data-workshopECF Data LLCECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
28 out of 47
ECF Data Threat Protection: 3-Day WorkshopECF Data LLCThe Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud SecurityThreat Protection
29 out of 47
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
30 out of 47
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
31 out of 47
Security Assessment: 2 Week AssessmentTallanTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
32 out of 47
Threat Protection and Cloud Security: 3 Day WorkshopNetwovenImprove your security posture with a Microsoft Threat Protection Assessment Workshop
+2
Applicable to:
Cloud SecurityThreat Protection
33 out of 47
Defender for Office 365: 3-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
34 out of 47
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLCCatapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
35 out of 47
Retail Kiosk Program Workshop - 5 DaysCB5 SolutionsA secure kiosk management solution built for Zebra, Android and iOS devices in retail and finance services.
+3
Applicable to:
Frontline WorkersIdentity & Access ManagementThreat Protection
36 out of 47
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
37 out of 47
CCPA CPRA: 6 - Wk AssessmentHappiest Minds Technologies LimitedEnable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
38 out of 47
Microsoft 365 Security: 1 Month ImplementationValorem LLCA detailed baseline assessment of your current and desired state followed by a pilot production of Microsoft’s advanced security solutions to accelerate your modern security journey.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
39 out of 47
Zero Trust Foundation: 6 Week ImplementationValorem LLCUsing Azure Active Directory and Microsoft 365 Security, our teams will custom design a zero trust foundation that advances your security posture, reduces risk and makes your environment more secure.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
40 out of 47
User Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
41 out of 47
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
42 out of 47
AgileAscend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile ITA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
43 out of 47
Nonprofit Security Maturity Assessment - 4 weeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
44 out of 47
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
45 out of 47
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNINGMicrosoft Information Protection Administrator course focuses on data governance and information protection within your organization.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
46 out of 47
Zero Trust Launchpad: 3-Wk AssessmentAscent Global, Inc.Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
47 out of 47