FiltreGoliți tot
Servicii de consultanță rezultate
Se afișează rezultate în servicii de consultanță.
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 60
Secure Productivity with Microsoft 365 Proof of Value & ImplementationBDOSecure AI and protect your cloud AI platform by fully activating Microsoft 365 features with robust organizational security
+3
Applicable to:
Device Deployment & Management
Teamwork Deployment
Threat Protection
4 out of 60
Vulnerability ManagementBlack Cell Magyarország Korlatolt Felelossegu TarsasagRapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
+2
Applicable to:
Cloud Security
Threat Protection
5 out of 60
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+1
Applicable to:
Threat Protection
6 out of 60
Security Architecture Design and Implementation Service上海诺未网络科技有限公司NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Modern SecOps Engagement (Security Operations)PerformantaGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft SecOps Engagement
+2
Applicable to:
Cloud Security
Threat Protection
8 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance IncYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
9 out of 60
Managed Threat Detection [xdr] for Microsoft 365 DefenderOrange Business Services - GlobalImplementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
10 out of 60
Managed Workspace Protection for Microsoft 365 DefenderOrange Business Services - GlobalImplementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
11 out of 60
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Business Services - GlobalOur workshop will help you designing and deploying Microsoft security technologies for your unique needs.
+1
Applicable to:
Threat Protection
12 out of 60
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense GlobalLearn how to put next-generation Microsoft Security tools to work for you
+1
Applicable to:
Threat Protection
13 out of 60
MDS Managed MXDR EngagementMaureen Data SystemsDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Security Copilot Value AcceleratorAvanade, Inc.Designed to help organizations modernize their security operations and administration by leveraging Gen AI.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
15 out of 60
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense GlobalUnderstand your readiness for common security threats.
+1
Applicable to:
Threat Protection
16 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense GlobalStop threats with a cloud-native SIEM adapted to your new business needs.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
17 out of 60
Enhance Identity Security with Microsoft Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.Bulletproof’s six-week Microsoft Entra ID P2 implementation empowers your organization to significantly strengthen identity security by ensuring only authorized access to critical systems and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Quadra DefendX Managed Threat Protection ServicesQuadrasystems.net (India) P LtdMaximize Microsoft Defender XDR capabilities with DefendX - Quadra's Managed Threat Protection Services
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
20 out of 60
Microsoft Security Solutions - 4 Week AssessmentProtivitiMicrosoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
MDS - Cybersecurity AssessmentMaureen Data SystemsThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data SystemsAssess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Secure & Improve Windows 10 & 11 with NextGen Windows: 3 Day WorkshopAgile ITBuild on your investments in Microsoft 365 by reducing risks and increase delight with your organization to manage and secure Windows locally and in the cloud
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
26 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONSUNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
S4B_Engagement_ThreatProtection_ESS4BEvaluación especializada de amenazas y vulnerabilidades en todo el entorno Microsoft, utilizando tecnologías EDR, XDR y SIEM para fortalecer la postura de seguridad empresarial.
+1
Applicable to:
Threat Protection
28 out of 60
Complete MXDR Threat Protection Powered by Microsoft SentinelKiZAN TechnologiesManaged security services to protect against an evolving cyber threat landscape 24x7x365 with Microsoft Entra ID Protection, Microsoft Sentinel, and Microsoft Defender.
+2
Applicable to:
Cloud Security
Threat Protection
29 out of 60
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
30 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Data Security & Threat Protection WorkshopITVTIdentify data security risks in your organizational data & discover vulnerabilities in your environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 60
End-to-end Threat Protection Workshop and PilotExelegentThe Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Microsoft Defender for Endpoint QuickStartPresidioPresidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Microsoft Security Copilot POV & Adoption PlanBDOProve the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Cloud Security Operations CenterReplyVerified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
S4B_Engagement_ThreatProtectionS4BSpecialized threat and vulnerability assessment across the Microsoft environment, utilizing EDR, XDR, and SIEM technologies to strengthen the enterprise security posture.
+1
Applicable to:
Threat Protection
37 out of 60
Assessment of Microsoft IntuneCDWCDW's Assessment of Microsoft Intune is a professional service that provides a comprehensive review of your current Microsoft Intune environment, including policies, settings and configurations.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
38 out of 60
Defender Pak365™: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.Empower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
39 out of 60
Microsoft Intune Suite Pilot ImplementationTechNet UC LLCTechNet UC is proud to present our comprehensive Microsoft Intune Suite Pilot, designed to help enterprises explore and evaluate the extensive capabilities of Intune Suite tools.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
40 out of 60
Microsoft Intune Custom DeploymentTechNet UC LLCOur custom Microsoft Intune Deployment is designed to streamline your organization's device management with precision and personalization.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
41 out of 60
Spyglass-MXDR Managed Detection & Response: 2-week ImplementationQuisitiveSpyglass-MXDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 60
Microsoft Intune Pilot ImplementationTechNet UC LLCTechNet UC’s Microsoft Intune Pilot Implementation is a comprehensive solution designed to propel enterprises toward superior IT management and security standards.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
43 out of 60
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商 ,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Microsoft 365 Security AssessmentCDWCDW’s Microsoft 365 Security Assessment allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Microsoft Cybersecurity AssessmentThe Partner MastersDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Data Governance - Threat Protection - AssessmentSkyTerra Technologies LLCThe goal is to assess your existing data governance posture as well as unearthing your organization's priorities and associated business needs.
+1
Applicable to:
Threat Protection
47 out of 60
Microsoft Purview Readiness and Environment SetupITC Secure LtdAssess the data governance maturity and establish a secure Microsoft Purview environment. Ensure technical and organizational readiness, delivering a strong foundation for data governance success.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
48 out of 60
Threat Protection Engagement FY25The Partner MastersLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
AvePoint Backup: 4 Weeks Proof Of ConceptSentinel Technologies Inc.Sentinel Technologies is proud to offer AvePoint’s Cloud Backup, a powerful cloud-to-cloud backup solution for Microsoft 365 and Azure.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
50 out of 60
Microsoft Security Copilot Readiness AssessmentSoftchoiceAims to ensure organizations can securely utilize Microsoft’s Copilot for Security and identifying gaps in signal data from core Microsoft security products
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Microsoft Defender for Office 365: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
+2
Applicable to:
Cloud Security
Threat Protection
52 out of 60
Threat Protection Assessment & Zero Trust ArchitectureBDOSet future-proof security goals & build a roadmap to strengthen your Microsoft 365 posture with Modern SecOps on a unified platform, leveraging Zero Trust architecture and threat protection assessment
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
53 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITEDProfessional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for EndpointCyderesCyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
55 out of 60
Microsoft Defender for Endpoint DeploymentCitrin Cooperman Advisors, LLCFortify your business with Microsoft Defender for Endpoint that seamlessly integrates into Microsoft 365, safeguarding all devices and strengthening your Zero Trust framework.
+2
Applicable to:
Cloud Security
Threat Protection
56 out of 60
Implementation of Microsoft IntuneCDWCDW’s professional service for Implementation of Microsoft Intune works with you to address the challenges you face in managing and securing your mobile devices and applications.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
57 out of 60
impelSecure Modern SecOps Engagement: Free 4-week workshopimpeltec Pty LtdGain visibility into threats to your Microsoft 365 and Azure clouds and on-premises environments across email, identity, endpoints, and third-party data
+2
Applicable to:
Cloud Security
Threat Protection
58 out of 60
Incident Response Tabletop Exercises: 2-Wk BriefingeGroup Enabling TechnologiesBe proactive and prepare your IT team for emergencies with a Disaster Plan
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
59 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderesCyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
60 out of 60