PenapisKosongkan semua
Perkhidmatan perundingan hasil
Menunjukkan dalam perkhidmatan perundingan%1!s!.
Semua keputusan
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Microsoft 365 Defender - MXDR Service - 1 Year ImplementationCGI Inc.Unleash your Microsoft Defender 365 capabilities. Automatically detect & correlate threat signals across your endpoints, email, cloud applications, identities, cloud and on-premises workloads.
+1
Applicable to:
Threat Protection
2 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security ServicesCognizantDefend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 60
Protect 365 App - 1 hour implementationCloud LifeThe Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
4 out of 60
Data Protection and Compliance Quick StartSoftchoiceThe Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
5 out of 60
Managed SOC_by SoftwareONESoftwareONESecure your IT Environment with Microsoft Services and on-call Cyber-security Analysts with Managed SOC by SoftwareONE
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 60
Microsoft Sentinel Proof of Concept: 4 WeeksNetrix GlobalUnderstand how prepared is your Microsoft infrastructure when adversaries attack
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 60
Virteva Microsoft 365 Defender Ready DeployVirteva LLCGet immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 60
Gestion del Endpoint: Servicio GestionadoRAN INGENIERÍA DE SISTEMAS SRLEl servicio está diseñado para gestionar la seguridad de las plataformas endpoint de las organizaciones en la protección de los datos y dispositivos tanto corporativos como personales.
+2
Applicable to:
Information Protection & Governance
Threat Protection
9 out of 60
"Exchange in a Box Migration: 1-Month Implementation."Zones, LLCZones Exchange in a Box allows businesses to migrate their current platform to Exchange Online. As an add-on to Exchange Migrations, we recommend Zones Backup as a Service (ZBaaS) offering.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
10 out of 60
Protiviti's Security Platform Rationalization Tool - 6 Week AssessmentProtivitiUnderstand your current security solutions compared to those included in Microsoft’s E5 enterprise licensing to identify potential security gaps, tool redundancy, and cost reduction.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
11 out of 60
Microsoft 365 CISO Security 1 Day WorkshopCDWThe CISO Security 1 Day Workshop is designed as a day engagement for Business Decision Makers (BDM) to help showcase the value proposition of Microsoft Security.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 60
Microsoft 365 Security: 4-hour AssessmentQuisitiveThe Microsoft 365 Security Assessment provides an in-depth assessment of your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
True Managed Security Service- 3 day Workshoptrue org cloudYou have a vision. We can help you secure it...
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
15 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical StartRapidly identify, contain, and remediate a breach.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
17 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş."Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTDMicrosoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
+2
Applicable to:
Cloud Security
Threat Protection
19 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed CanaryGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Red Canary Cloud Security AssessmentRed CanaryAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Microsoft 365 Security WorkshopOlive + GooseImprove your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
22 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
MXDR Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
24 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPOThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
25 out of 60
Defend Against Threats with SIEM Plus XDR: 5 Day WorkshopNetwovenLearn how to put next generation Microsoft security tools to work for you.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 60
Red Canary MSSP FastTrack for SecurityRed CanaryLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Cyber Insurer Readiness WorkshopSentinel Technologies Inc.Uncover gaps and strengthen your position when applying for cyber insurance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
28 out of 60
Infosys Intelligent Security SolutionInfosys LimitedInfosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
29 out of 60
Modern Workplace Optimization - 4 Week AssessmentProtivitiThis assessment for Microsoft 365 helps customers obtain insights to what it takes to improve productivity against Cyber Threats for Workforce Productivity.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
Microsoft Defender for End Points JumpstartSentinel Technologies Inc.Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
+2
Applicable to:
Cloud Security
Threat Protection
31 out of 60
Microsoft Defender for Office JumpstartSentinel Technologies Inc.Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
+2
Applicable to:
Cloud Security
Threat Protection
32 out of 60
Windows 365 Deployment : 12 month ImplementationPatriot Consulting Technology Group LLCPatriot will design, configure, test and deploy Microsoft Windows 365 for your environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Complete MXDR Powered by Microsoft SentinelKiZAN TechnologiesRapidly improve your security posture and protect against an evolving cyber threat landscape 24x7x365 with Microsoft Sentinel, Microsoft 365 Defender, and Microsoft Defender for Cloud.
+2
Applicable to:
Cloud Security
Threat Protection
35 out of 60
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Business Services - GlobalOur workshop will help you designing and deploying Microsoft security technologies for your unique needs.
+1
Applicable to:
Threat Protection
36 out of 60
Managed Workspace Protection for Microsoft 365 DefenderOrange Business Services - GlobalImplementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
37 out of 60
Managed Threat Detection [xdr] for Microsoft 365 DefenderOrange Business Services - GlobalImplementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
38 out of 60
Modern Workplace Assessment for Healthcare - 4 wk AssessmentProtivitiThis assessment for Microsoft 365 helps Healthcare customers obtain insights to what it takes to improve productivity against Cyber Threats for Workforce Productivity.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Zero Trust Defend Against Threats: 7-Wk ImplementationKiZAN TechnologiesAccelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
40 out of 60
Zero Trust Foundation: 6-Wk ImplementationKiZAN TechnologiesAccelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
41 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk AssessmentKiZAN TechnologiesLeverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
42 out of 60
Microsoft 365 Protecting Corporate Identities: 5-Wk ImplementationKiZAN TechnologiesSafeguard your organization from devastating breaches with Microsoft 365 identity solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Secure & Improve Windows 10 & 11 with NextGen Windows: 3 Day WorkshopAgile ITBuild on your investments in Microsoft 365 by reducing risks and increase delight with your organization to manage and secure Windows locally and in the cloud
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
44 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen SystemsThe OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
45 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
46 out of 60
Onesec’s Secure Access to Microsoft 365 with ZscalerSecure Nextgen SystemsEnhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
47 out of 60
Free Microsoft 365 Defender Suite 4–6-hour Proof of ConceptLevacloud LLCThis free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft 365 Defender, Microsoft Defender for Office 365, Microsoft Defender for Endpoint
+2
Applicable to:
Cloud Security
Threat Protection
48 out of 60
Azure and Microsoft 365 SecOps DiagnosticsBlueVoyantBlueVoyant experts review an organization's Azure and Microsoft 365 Defender Security Portal to identify potential vulnerabilities and provide actionable recommendations.
+1
Applicable to:
Threat Protection
49 out of 60
Intune Proof of ConceptLevacloud LLCThis free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft Intune.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
50 out of 60
Threat Protection - 2 Days WorkshopMayasoft Bilgi Sistemleri A.S.We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
+2
Applicable to:
Cloud Security
Threat Protection
51 out of 60
Barracuda Office 365 email-based securityCrayonBarracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defense, API-based inbox defense, incident response, data protection, and compliance capabilities.
+1
Applicable to:
Threat Protection
52 out of 60
Spyglass-MDR Managed Detection & Response: 2-week ImplementationQuisitiveSpyglass-MDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
53 out of 60
Defender PilotLevacloud LLCThe Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
+2
Applicable to:
Cloud Security
Threat Protection
54 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom ConsultingThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
55 out of 60
Threat Protection EngagementThe Partner MastersLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Microsoft 365 Security AssessmentCDWCDW’s Microsoft 365 Security Assessments allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Microsoft Defender for Endpoint ImplementationCDWCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLCWe understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
59 out of 60
Threat Protection with MXDR: ConsultationCBTS Technology Solutions LLCCBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60