Dịch vụ tư vấn kết quả
Hiển thị kết quả trong dịch vụ tư vấn.
Tất cả kết quả
Microsoft Defender for Endpoint: 2-wk AssessmentAscent Global, Inc.
The Microsoft Defender for Endpoint assessment will help the customers review the current state, evaluate existing AV and EDR solutions and expectations, deploy MDE, and plan for ongoing management.
1 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi Consulting
Delphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
2 out of 60
Microsoft 365 Security: 3-Day Workshopdelaware
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
3 out of 60
Microsoft 365 Security: 2-Week ImplementationTelelink Business Services EAD
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
4 out of 60
The Modern IT Enterprise Security Five Day POCEnabling Technologies Corporation
The Modern IT Enterprise Security 5 Day Proof-of-Concept provides a path to becoming a secure modern enterprise through strategic investments in both digital transformation and security enhancements
5 out of 60
Cloud Identity Foundation Workshop (5-day)DexMach
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
6 out of 60
Microsoft Security Workshop: 3-dayOxford Computer Group LLC
This 3-day workshop shows you how to put Microsoft’s security capabilities to work. Learn how secure your organization is now and how to mitigate and protect against threats in the future.
7 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days ImplementationHCL Technologies
HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
8 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SAS
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
9 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) Ltd
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
10 out of 60
Threat Check: 4-Hr WorkshopNetrix LLC
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
11 out of 60
Compliance: 8H-Workshop Data Risk ManagementadaQuest
Discover risks from dark data and learn how to address them.
12 out of 60
Identity: 8H-Workshop Secure Identities & DevicesadaQuest
Secure user identities and devices.
13 out of 60
Security: 8H-Workshop "Sectors of Cybersecurity"adaQuest
Learn how to put next-generation security operations to work for you with the Azure Sentinel add-on module.
14 out of 60
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.
Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
15 out of 60
App Identity Evaluation: 8H WorkshopadaQuest
Secure & manage your entire application estate.
16 out of 60
Hybrid Cloud Security: 8H WorkshopadaQuest
Get insights on active threats and vulnerabilities related to their hybrid workloads.
17 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
18 out of 60
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
19 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.
The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender for enterprises, resulting in improved detection rates, threat coverage, and organizational security posture.
20 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East
3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
21 out of 60
Microsoft Purview Data Security Basic Quick Start 10-week ImplementationEdgile, Inc.
Drive Data Protection Sustainability with Edgile's Data Protection Methodology
22 out of 60
Security & Compliance Readiness: 2-Wk. AssessmentiCorps Technologies, Inc
iCorps Security and Compliance Services provide a complete security assessment of your Microsoft platform and integrated services.
23 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLC
Introducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
24 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
25 out of 60
Seguridad Corporativa: Evaluación 4 semanasConsultora CognosIT Limitada
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
26 out of 60
Secure Endpoint Management - 5 Day - Proof of ConceptCoretek Services
Protect your organization's endpoints. In this 5-Day quick start Coretek offers three options for providing unified endpoint management and security across all devices.
27 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeIT
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
28 out of 60
1-Day Security & Identity WorkshopConvergeOne
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
29 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOne
Learn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
30 out of 60
Athenagy™ E-Discovery Assessment: 4 weeksBDO Digital, LLC
Centralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
31 out of 60
Microsoft 365 Security Healthcheck-1 wk assessmentKiZAN Technologies
Quickly identify security vulnerabilities for Microsoft 365 services with a Security Healthcheck.
32 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLC
Roadmap to increase your security score with cost-effective security tools
33 out of 60
Compliance Assessment - 6 weeksBDO Digital, LLC
Identify your compliance maturity and areas that need improvement
34 out of 60
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.
Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
35 out of 60
Office 365 Protection: Design & Pilot 1-Wk POCManaged Solution
Protect Your Employees from External Email Threats with Defender for Office 365 Protection
36 out of 60
ThreatHunter Implementation 3 weeksEnabling Technologies Corporation
Microsoft Gold Partner Enabling Technologies provides ThreatHunter: consulting, configuration, and training services to help organizations protect, detect, and respond to risks.
37 out of 60
Discover Sensitive Data: 5-Week WorkshopRackspace
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
38 out of 60
Cy:lent Pursuit Threat Hunt: 6-Wk AssessmentAscent Global, Inc.
Ascent’s intel-based approach to cybersecurity threat hunting helps identify threat actors faster and more accurately than other, more traditional methodologies.
39 out of 60
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer Solutions
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
40 out of 60
BYOD Endpoint Mgt: 1-Wk Accelerated ImplementationITC Secure Ltd
Accelerated Deployment of Microsoft Endpoint Manager for Bring Your Own Device (BYOD) capability
41 out of 60
Windows Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure Ltd
Accelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
42 out of 60
discover-sensitive-data-workshopECF Data LLC
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
43 out of 60
ECF Data Threat Protection: 3-Day WorkshopECF Data LLC
The Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
44 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLC
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
45 out of 60
Threat Protection Security: 3 Day WorkshopModality Systems
Learn how next-generation Microsoft security tools can work for you. Gain visibility into immediate threats across email, identity and data, and upgrade your security for the long term.
46 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
47 out of 60
Rapid Risk Assessment: 4-Wk AssessmentAscent Global, Inc.
Immediate and long-term Microsoft security strategy assessment utilizing security tools such as Defender, Sentinel, and Cloud App Security.
48 out of 60
Security Assessment: 2 Week AssessmentTallan
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
49 out of 60
Secure Modern Workplace Platform ImplementationCognizant
Enables teams to securely collaborate, connect and be more productive than ever before, no matter when or where they work.
50 out of 60
Azure Sentinel: 8H WorkshopadaQuest
Modernize your security operations with Azure Sentinel.
51 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure Ltd
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
52 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLC
Catapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
53 out of 60
Avanade Secure Identities and Access FY23Avanade, Inc.
We help our customers to define a modern identity strategy
54 out of 60
Secure Identities and Access: 8H WorkshopadaQuest
An executive deep dive into foundational identity strategy, tailored to your customers’ organization.
55 out of 60
Avanade Defend Against Threats with SIEM Plus XDR FY23Avanade, Inc.
Cybercrime is an ongoing and escalating challenge for organizations around the globe. We help clients modernize their security and defend against these threats.
56 out of 60
Security Solutions:2-Weeks ImplementationAlpine Health Technologies Corp
Discover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
57 out of 60
Threat Protection: 2-Week WorkshopForsyte IT Solutions
Learn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
58 out of 60
Office 365 Teamwork Security - Managed ServiceCognizant
Teamwork Security provides a comprehensive security management service for Office 365 platforms
59 out of 60
Zero Trust Baseline Implementation - 4 weeksBDO Digital, LLC
BDO Digital’s Zero Trust Baseline implementation will help your organization apply the Zero Trust framework necessary for addressing threats that arise in the modern workplace.
60 out of 60