Perkhidmatan perundingan hasil
Menunjukkan dalam perkhidmatan perundingan%1!s!.
Hybrid Cloud Security: 8H WorkshopadaQuest
Get insights on active threats and vulnerabilities related to their hybrid workloads.
1 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc. - USHQ
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
2 out of 60
Defender for Endpoint Advisory: 2-Week WorkshopNTT DATA Inc. - USHQ
NTT DATA’s Microsoft Defender for Endpoint 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
3 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.
The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender for enterprises, resulting in improved detection rates, threat coverage, and organizational security posture.
4 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East
3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
5 out of 60
Microsoft Purview Data Security Basic Quick Start 10-week ImplementationEdgile, Inc.
Drive Data Protection Sustainability with Edgile's Data Protection Methodology
6 out of 60
Security & Compliance Readiness: 2-Wk. AssessmentiCorps Technologies, Inc
iCorps Security and Compliance Services provide a complete security assessment of your Microsoft platform and integrated services.
7 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLC
Introducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
8 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
9 out of 60
Seguridad Corporativa: Evaluación 4 semanasConsultora CognosIT Limitada
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
10 out of 60
Secure Endpoint Management - 5 Day - Proof of ConceptCoretek Services
Protect your organization's endpoints. In this 5-Day quick start Coretek offers three options for providing unified endpoint management and security across all devices.
11 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeIT
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
12 out of 60
1-Day Security & Identity WorkshopConvergeOne
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
13 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOne
Learn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
14 out of 60
Athenagy™ E-Discovery Assessment: 4 weeksBDO Digital, LLC
Centralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
15 out of 60
Microsoft 365 Security Healthcheck-1 wk assessmentKiZAN Technologies
Quickly identify security vulnerabilities for Microsoft 365 services with a Security Healthcheck.
16 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLC
Roadmap to increase your security score with cost-effective security tools
17 out of 60
Compliance Assessment - 6 weeksBDO Digital, LLC
Identify your compliance maturity and areas that need improvement
18 out of 60
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.
Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
Office 365 Protection: Design & Pilot 1-Wk POCManaged Solution
Protect Your Employees from External Email Threats with Defender for Office 365 Protection
20 out of 60
ThreatHunter Implementation 3 weeksEnabling Technologies Corporation
Microsoft Gold Partner Enabling Technologies provides ThreatHunter: consulting, configuration, and training services to help organizations protect, detect, and respond to risks.
21 out of 60
Discover Sensitive Data: 5-Week WorkshopRackspace
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
22 out of 60
Cy:lent Pursuit Threat Hunt: 6-Wk AssessmentAscent Global, Inc.
Ascent’s intel-based approach to cybersecurity threat hunting helps identify threat actors faster and more accurately than other, more traditional methodologies.
23 out of 60
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer Solutions
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
24 out of 60
BYOD Endpoint Mgt: 1-Wk Accelerated ImplementationITC Secure Ltd
Accelerated Deployment of Microsoft Endpoint Manager for Bring Your Own Device (BYOD) capability
25 out of 60
Windows Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure Ltd
Accelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
26 out of 60
discover-sensitive-data-workshopECF Data LLC
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
27 out of 60
ECF Data Threat Protection: 3-Day WorkshopECF Data LLC
The Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
28 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLC
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
29 out of 60
Threat Protection Security: 3 Day WorkshopModality Systems
Learn how next-generation Microsoft security tools can work for you. Gain visibility into immediate threats across email, identity and data, and upgrade your security for the long term.
30 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
31 out of 60
Rapid Risk Assessment: 4-Wk AssessmentAscent Global, Inc.
Immediate and long-term Microsoft security strategy assessment utilizing security tools such as Defender, Sentinel, and Cloud App Security.
32 out of 60
Security Assessment: 2 Week AssessmentTallan
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
33 out of 60
Secure Modern Workplace Platform ImplementationCognizant
Enables teams to securely collaborate, connect and be more productive than ever before, no matter when or where they work.
34 out of 60
Azure Sentinel: 8H WorkshopadaQuest
Modernize your security operations with Azure Sentinel.
35 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure Ltd
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
36 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLC
Catapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
37 out of 60
Avanade Secure Identities and Access FY23Avanade, Inc.
We help our customers to define a modern identity strategy
38 out of 60
Secure Identities and Access: 8H WorkshopadaQuest
An executive deep dive into foundational identity strategy, tailored to your customers’ organization.
39 out of 60
Avanade Defend Against Threats with SIEM Plus XDR FY23Avanade, Inc.
Cybercrime is an ongoing and escalating challenge for organizations around the globe. We help clients modernize their security and defend against these threats.
40 out of 60
Security Solutions:2-Weeks ImplementationAlpine Health Technologies Corp
Discover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
41 out of 60
Threat Protection: 2-Week WorkshopForsyte IT Solutions
Learn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
42 out of 60
Office 365 Teamwork Security - Managed ServiceCognizant
Teamwork Security provides a comprehensive security management service for Office 365 platforms
43 out of 60
Zero Trust Baseline Implementation - 4 weeksBDO Digital, LLC
BDO Digital’s Zero Trust Baseline implementation will help your organization apply the Zero Trust framework necessary for addressing threats that arise in the modern workplace.
44 out of 60
Guardian 365 Managed Security ServicesForsyte IT Solutions
Protection is key to the security of your organization. Defend against threats with Guardian 365, your key to better managed security.
45 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro Ltd
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
46 out of 60
Security Assessment - 4-Week AssessmentCoretek Services
Analysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
47 out of 60
Avanade Manage and Investigate Risks FY23Avanade, Inc.
Control and help secure sensitive business information and protect against insider threats.
48 out of 60
Email and Threat Protection 4 Week ImplementationHTG
HTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
49 out of 60
Microsoft 365 Security: 1 Month ImplementationValorem LLC
A detailed baseline assessment of your current and desired state followed by a pilot production of Microsoft’s advanced security solutions to accelerate your modern security journey.
50 out of 60
Zero Trust Foundation: 6 Week ImplementationValorem LLC
Using Azure Active Directory and Microsoft 365 Security, our teams will custom design a zero trust foundation that advances your security posture, reduces risk and makes your environment more secure.
51 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
52 out of 60
Threat Protection Workshop: 5-Days w/ ResultsOlive + Goose - Phil
The Microsoft 365 Threat Protection Workshop helps customers assess their security & address their most pressing security goals providing an immersive experience using Microsoft 365 security
53 out of 60
Unified Endpoint Mgmt. - 6 Weeks - ImplementationTCS - Digital Workplace
TCS Unified Endpoint Management combines Microsoft Intune, Microsoft Defender for Endpoint and Configuration Manager solutions to provide modern management of endpoints with a Zero Trust strategy.
54 out of 60
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuest
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
55 out of 60
Microsoft 365 Digital Workforce: 8H WorkshopadaQuest
Learn how to empower people to be more productive and secure as they adapt to new ways of working with Microsoft 365.
56 out of 60
Mitigate Compliance and Privacy Risks: 8H WorkshopadaQuest
Intelligently investigate and take action on insider and privacy risks.
57 out of 60
Protect & Govern Sensitive Data Workshop: 8H WorkshopadaQuest
Discover risks from dark data and learn how to address them with the Protect & Govern Sensitive Data Workshop
58 out of 60
Endpoint Management: 8H WorkshopadaQuest
Manage and protect your devices, your apps, and your users with the Endpoint Management Workshop
59 out of 60
Secure Multi-Cloud Environments: 8H WorkshopadaQuest
Get a customized threat & vulnerability analysis of your hybrid and multi-cloud environment and learn how to build a more robust cloud security system.
60 out of 60