PenapisKosongkan semua
Perkhidmatan perundingan hasil
Menunjukkan dalam perkhidmatan perundingan%1!s!.
Semua keputusan
Hybrid Cloud Security: 8H WorkshopadaQuestGet insights on active threats and vulnerabilities related to their hybrid workloads.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
1 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc. - USHQNTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 60
Defender for Endpoint Advisory: 2-Week WorkshopNTT DATA Inc. - USHQNTT DATA’s Microsoft Defender for Endpoint 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
3 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender
for enterprises, resulting in improved detection rates, threat coverage, and
organizational security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Microsoft Purview Data Security Basic Quick Start 10-week ImplementationEdgile, Inc.Drive Data Protection Sustainability with Edgile's Data Protection Methodology
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
6 out of 60
Security & Compliance Readiness: 2-Wk. AssessmentiCorps Technologies, InciCorps Security and Compliance Services provide a complete security assessment of your Microsoft platform and integrated services.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
7 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLCIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Seguridad Corporativa: Evaluación 4 semanasConsultora CognosIT LimitadaCon esta Solución usted podrá gestionar la seguridad en toda su empresa
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 60
Secure Endpoint Management - 5 Day - Proof of ConceptCoretek ServicesProtect your organization's endpoints. In this 5-Day quick start Coretek offers three options for providing unified endpoint management and security across all devices.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
11 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
1-Day Security & Identity WorkshopConvergeOneTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOneLearn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Athenagy™ E-Discovery Assessment: 4 weeksBDO Digital, LLCCentralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
15 out of 60
Microsoft 365 Security Healthcheck-1 wk assessmentKiZAN TechnologiesQuickly identify security vulnerabilities for Microsoft 365 services with a Security Healthcheck.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
16 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Compliance Assessment - 6 weeksBDO Digital, LLCIdentify your compliance maturity and areas that need improvement
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
18 out of 60
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
+2
Applicable to:
Cloud Security
Threat Protection
19 out of 60
Office 365 Protection: Design & Pilot 1-Wk POCManaged SolutionProtect Your Employees from External Email Threats with Defender for Office 365 Protection
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 60
ThreatHunter Implementation 3 weeksEnabling Technologies CorporationMicrosoft Gold Partner Enabling Technologies provides ThreatHunter: consulting, configuration, and training services to help organizations protect, detect, and respond to risks.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
21 out of 60
Discover Sensitive Data: 5-Week WorkshopRackspaceDiscover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
22 out of 60
Cy:lent Pursuit Threat Hunt: 6-Wk AssessmentAscent Global, Inc.Ascent’s intel-based approach to cybersecurity threat hunting helps identify threat actors faster and more accurately than other, more traditional methodologies.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 60
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer SolutionsSirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
24 out of 60
BYOD Endpoint Mgt: 1-Wk Accelerated ImplementationITC Secure LtdAccelerated Deployment of Microsoft Endpoint Manager for Bring Your Own Device (BYOD) capability
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
25 out of 60
Windows Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure LtdAccelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
26 out of 60
discover-sensitive-data-workshopECF Data LLCECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
27 out of 60
ECF Data Threat Protection: 3-Day WorkshopECF Data LLCThe Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Threat Protection Security: 3 Day WorkshopModality SystemsLearn how next-generation Microsoft security tools can work for you. Gain visibility into immediate threats across email, identity and data, and upgrade your security for the long term.
+1
Applicable to:
Threat Protection
30 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
31 out of 60
Rapid Risk Assessment: 4-Wk AssessmentAscent Global, Inc.Immediate and long-term Microsoft security strategy assessment utilizing security tools such as Defender, Sentinel, and Cloud App Security.
+2
Applicable to:
Information Protection & Governance
Threat Protection
32 out of 60
Security Assessment: 2 Week AssessmentTallanTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Secure Modern Workplace Platform ImplementationCognizantEnables teams to securely collaborate, connect and be more productive than ever before, no matter when or where they work.
+3
Applicable to:
Adoption & Change Management
Teamwork Deployment
Threat Protection
34 out of 60
Azure Sentinel: 8H WorkshopadaQuestModernize your security operations with Azure Sentinel.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
36 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLCCatapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 60
Avanade Secure Identities and Access FY23Avanade, Inc.We help our customers to define a modern identity strategy
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
38 out of 60
Secure Identities and Access: 8H WorkshopadaQuestAn executive deep dive into foundational identity strategy, tailored to your customers’ organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Avanade Defend Against Threats with SIEM Plus XDR FY23Avanade, Inc.Cybercrime is an ongoing and escalating challenge for organizations around the globe. We help clients modernize their security and defend against these threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
41 out of 60
Threat Protection: 2-Week WorkshopForsyte IT SolutionsLearn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Office 365 Teamwork Security - Managed ServiceCognizantTeamwork Security provides a comprehensive security management service for Office 365 platforms
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
Zero Trust Baseline Implementation - 4 weeksBDO Digital, LLCBDO Digital’s Zero Trust Baseline implementation will help your organization apply the Zero Trust framework necessary for addressing threats that arise in the modern workplace.
+1
Applicable to:
Threat Protection
44 out of 60
Guardian 365 Managed Security ServicesForsyte IT SolutionsProtection is key to the security of your organization. Defend against threats with Guardian 365, your key to better managed security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
46 out of 60
Security Assessment - 4-Week AssessmentCoretek ServicesAnalysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
47 out of 60
Avanade Manage and Investigate Risks FY23Avanade, Inc.Control and help secure sensitive business information and protect against insider threats.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
48 out of 60
Email and Threat Protection 4 Week ImplementationHTGHTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
49 out of 60
Microsoft 365 Security: 1 Month ImplementationValorem LLCA detailed baseline assessment of your current and desired state followed by a pilot production of Microsoft’s advanced security solutions to accelerate your modern security journey.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
50 out of 60
Zero Trust Foundation: 6 Week ImplementationValorem LLCUsing Azure Active Directory and Microsoft 365 Security, our teams will custom design a zero trust foundation that advances your security posture, reduces risk and makes your environment more secure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
51 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
52 out of 60
Threat Protection Workshop: 5-Days w/ ResultsOlive + Goose - PhilThe Microsoft 365 Threat Protection Workshop helps customers assess their security & address their most pressing security goals providing an immersive experience using Microsoft 365 security
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
53 out of 60
Unified Endpoint Mgmt. - 6 Weeks - ImplementationTCS - Digital WorkplaceTCS Unified Endpoint Management combines Microsoft Intune, Microsoft Defender for Endpoint and Configuration Manager solutions to provide modern management of endpoints with a Zero Trust strategy.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
54 out of 60
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
55 out of 60
Microsoft 365 Digital Workforce: 8H WorkshopadaQuestLearn how to empower people to be more productive and secure as they adapt to new ways of working with Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
56 out of 60
Mitigate Compliance and Privacy Risks: 8H WorkshopadaQuestIntelligently investigate and take action on insider and privacy risks.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
57 out of 60
Protect & Govern Sensitive Data Workshop: 8H WorkshopadaQuestDiscover risks from dark data and learn how to address them with the Protect & Govern Sensitive Data Workshop
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
58 out of 60
Endpoint Management: 8H WorkshopadaQuestManage and protect your devices, your apps, and your users with the Endpoint Management Workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Secure Multi-Cloud Environments: 8H WorkshopadaQuestGet a customized threat & vulnerability analysis of your hybrid and multi-cloud environment and learn how to build a more robust cloud security system.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
60 out of 60