FiltreVymazať všetko
Počet výsledkov: Konzultačné služby
Zobrazujú sa výsledky (počet: ) v konzultačné služby
Security Best Practices AssessmentTechNet UC LLCOur assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
1 out of 42
Armor Defender XDR Foundational AssessmentArmorTailored consulting engagement designed to evaluate your current security environment and establish a baseline for implementing Microsoft Defender XDR.
+2
Applicable to:
Identity & Access Management
Threat Protection
2 out of 42
THInc.Ops Managed ServiceTECH HEADS INCPremium managed IT service solution that provides a higher quality of service supporting your staff and stronger protection against cyberattacks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 42
THInc Secure Managed Security Service for MicrosoftTECH HEADS INCComprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 42
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLCSkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 42
DSPM for AI - Free 2-Hour AssessmentNetwoven Inc.To help enterprises identify blind spots in Microsoft 365's AI data security, assess DSPM maturity, and establish a governance-first approach to safely accelerate AI innovation with Microsoft Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 42
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLCStrengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 42
Unified Identity & Secure Edge Modernization with Entra SuiteBDOModernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 42
Frontier Firm Transformation - Free 2 Hour AI Security Risk AssessmentNetwoven Inc.To help businesses securely adopt AI within Microsoft 365, enabling confident use of Copilots and other AI solutions while protecting sensitive data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
9 out of 42
Redapt Threat Protection EngagementRedapt, Inc. Proactive Cybersecurity for Resilient Enterprises
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 42
Threat Protection Envisioning Engagement SentinelSentinel Technologies Inc.Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Get help achieving your broader security objectives.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 42
NuHarbor's Quick Start for PurviewNuharbor Security Inc.Activate Purview quickly with expert guidance to improve visibility, reduce risk, and support compliance.
+2
Applicable to:
Information Protection & Governance
Threat Protection
12 out of 42
NuHarbor’s Defender Health CheckNuharbor Security Inc.Uncover gaps and optimize Microsoft Defender for stronger threat protection.
+1
Applicable to:
Threat Protection
13 out of 42
Microsoft Exchange Best Practices RemediationTechNet UC LLCSecure and optimize your Microsoft Exchange Online environment with expert remediation, ensuring compliance, reliability, and protection against email threats.
+2
Applicable to:
Information Protection & Governance
Threat Protection
14 out of 42
Zero Trust Deployment and Optimization ServiceSoftchoiceDeploy zero trust with confidence, optimize it to deliver lasting outcomes.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 42
Copilot and AI Readiness AssessmentCloudServusRun an AI Readiness Assessment to pinpoint gaps using Copilot adoption; align next steps to Copilot & Agents at Work.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
16 out of 42
Privileged Identity Management Configuration - AppSourceTechNet UC LLCConfigure Microsoft Entra PIM to enforce least privilege, enable just-in-time access, and reduce risk with real-time auditing, approval workflows, and Conditional Access integration.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
17 out of 42
Microsoft 365 Best Practices RemediationTechNet UC LLCSecure, optimize, and align your Microsoft 365 environment with Microsoft’s latest standards—improving collaboration, compliance, and protection across Exchange, Teams, SharePoint, and OneDrive.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
18 out of 42
Microsoft Purview QuickStart: ImplementationKraft KennedyKraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
19 out of 42
Veeam Backup for Microsoft 365 HealthcheckSentinel Technologies Inc.This tailored assessment consolidates system configuration details into a concise, easy-to-digest format that highlights system health, performance, and opportunities for improvement.
+1
Applicable to:
Threat Protection
20 out of 42
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 42
Secure Productive Workplace: Implement 4-WkNetsuritNetsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
22 out of 42
Microsoft Security: 3-Day WorkshopApex Digital SolutionsDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 42
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.Our security services provide a holistic approach through advisory,implementation & managed services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 42
Security Assessment: 2-Wk AssessmentAscent Global, Inc.Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 42
Threat Protection: 3-Wk POCFPT/Intellinet Identify security threats and begin to respond and mitigate.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 42
EMS Energize: 1-month proof of conceptInterlink Cloud Advisors, Inc.Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
27 out of 42
Big Green IT Security Assessment: 3-WeekBig Green IT - DevSecure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 42
Microsoft 365 Secure Score: 4 Week ImplementationRazor Technology, LLCAudit, review, and improve security posture of Microsoft 365 Estate through Secure Score methodology. Receive expert advice for identity, compliance, and threat protection improvements.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
29 out of 42
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
30 out of 42
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender
for enterprises, resulting in improved detection rates, threat coverage, and
organizational security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 42
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
+2
Applicable to:
Cloud Security
Threat Protection
32 out of 42
Office 365 Protection: Design & Pilot 1-Wk POCManaged SolutionProtect Your Employees from External Email Threats with Defender for Office 365 Protection
+2
Applicable to:
Cloud Security
Threat Protection
33 out of 42
ThreatHunter MXDR: 3-Wk ImplemenationeGroup Enabling TechnologieseGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
34 out of 42
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer SolutionsSirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 42
ECF Data Threat Protection: 3-Day WorkshopECF Data LLCThe Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 42
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
37 out of 42
Security Assessment: 2 Week AssessmentTallanTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 42
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 42
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNINGMicrosoft Information Protection Administrator course focuses on data governance and information protection within your organization.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
40 out of 42
Zero Trust Launchpad: 3-Wk AssessmentAscent Global, Inc.Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 42
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLCOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 42