筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
所有结果
Microsoft Intune (Windows): 1-Wk Proof of ConceptInvokeMap the use cases for, and benefits of, Intune all-up for endpoint management, and learn how to modernize your approach to endpoint management at cloud-scale.
+2
Applicable to:
Mobile Device ManagementThreat Protection
1 out of 60
Microsoft Copilot for Security Adoption ‘Difend’ Accelerator ServicesDifendaHypercharge your cyber security maturity while gaining efficiencies with Microsoft Security services and Difenda, the 2023 Microsoft Security Impact Award Winner.
+2
Applicable to:
Cloud SecurityThreat Protection
2 out of 60
Microsoft Defender XDR AcceleratorThe Partner MastersWe empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation
+1
Applicable to:
Threat Protection
3 out of 60
Defend Against Threats with SIEM Plus XDR WorkshopThe Partner MastersThe Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
4 out of 60
Microsoft 365 E5 Zero Trust Security AssessmentSHI International CorpExplore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
5 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITEDConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
6 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
7 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFTEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
8 out of 60
Managed Workspace Protection for Microsoft 365 DefenderOrange Business Services - GlobalImplementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
9 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLCAdvanced endpoint security and threat protection: detect, investigate, and respond to attacks.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
10 out of 60
Shadow IT discovery with Microsoft cloud app securityAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
11 out of 60
UNITE: Cyber Security Assessment_INFINITY TECHNOLOGY SOLUTIONSBoost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
12 out of 60
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONSUNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
13 out of 60
Microsoft Endpoint Management: 3- W WorkshopExelegentMicrosoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
14 out of 60
Defender for Endpoint Managed Servicee2e-assure LtdMicrosoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
15 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFTBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
16 out of 60
Windows Intune: 1-Wk Accelerated ImplementionITC Secure LtdAccelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
17 out of 60
Zones SOCaaS - MXDR with Threat ProtectionZones, LLCZones SOCaaS powered by Microsoft Sentinel and Defender offers advanced MDR and XDR capabilities, reinforcing your business’s safety.
+2
Applicable to:
Cloud SecurityThreat Protection
18 out of 60
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLCWe understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
19 out of 60
Zero Trust as a Service (ZTaaS)Aegis InnovatorsDigital transformation and adopting AI starts with building a secure foundation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
20 out of 60
Onesec’s Secure Access to Microsoft 365 with ZscalerSecure Nextgen SystemsEnhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
21 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
22 out of 60
Microsoft 365 Defender for Endpoint Vulnerability AssessmentAVASOFTEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
23 out of 60
Defender Implementation, Tuning, and TestingSecurity Risk Advisors Intl, LLCImplement Windows Defender for Endpoint on Windows OS.
+1
Applicable to:
Threat Protection
24 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
25 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.A high-level forensics evaluation designed to identify current and past threat activity.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
26 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
27 out of 60
Microsoft Defender Threat Protection: 3-Day WorkshopFinchloomThe 3-day workshop on Threat Protection with XDR + SIEM is an immersive experience designed for security decision-makers and IT professionals. It offers a deep dive into Microsoft's security solutions
+1
Applicable to:
Threat Protection
28 out of 60
Cyber Security AssessmentAegis InnovatorsUnderstand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
29 out of 60
MDR for Microsoft DefenderADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
+2
Applicable to:
Cloud SecurityThreat Protection
30 out of 60
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical StartRapidly identify, contain, and remediate a breach.
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
31 out of 60
Microsoft Copilot for Security: 2 x 4h Workshopwater IT Security GmbHGet ready for Microsoft’s Copilot for Security and learn how generative AI can strengthen your organization’s IT. We cover everything you need to know – from the implementation to proper prompting.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
32 out of 60
Managed Microsoft 365: 12-MO BriefingeGroup Enabling Technologies, LLCGet the expertise needed to successfully manage Microsoft 365 with eGroup Enabling Technologies, LLC. Managed Microsoft 365.
+3
Applicable to:
Calling for Microsoft TeamsMobile Device ManagementThreat Protection
33 out of 60
Copilot for Security Readiness AssessmentBulletproof Solutions Inc.Get a Copilot for Security Readiness + a Security Health Check on your Microsoft 365 environment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
34 out of 60
Microsoft 365 Threat Protection Workshop + 5 DayCyberwise Siber Güvenlik TIC. AS.Is your Microsoft 365 environment secure? Do you wonder about your current security maturity? We will assist you with a full-fledged workshop on how to deploy and implement Microsoft 365 Security.
+1
Applicable to:
Threat Protection
35 out of 60
Advanced Email Security: 4-Day ImplementationFSI StrategiesLeverage Microsoft Defender for Office 365 to implement best in class email security
+3
Applicable to:
Cloud SecurityThreat ProtectionWorkplace Analytics
36 out of 60
Threat Protection EngagementNeway TechnologiesEnhance your organization's security stance with a Neway Threat Protection Engagement.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
37 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View SystemsSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
38 out of 60
Microsoft 365 Security BriefingCDI LLCA Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
39 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLCGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
40 out of 60
Threat Detection with Microsoft cloud app securityAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
41 out of 60
ThreatHunter MXDR MSSP: 12-Mo ImplementationeGroup Enabling TechnologiesTo assist our customers with advanced security services focused on identifying and mitigating cloud and device malicious threats and providing 24x7 monitoring and response services.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
42 out of 60
GoDaddy Office 365 to Microsoft Office 365 Tenant-to-Tenant Cutover Email Migration: 7-Days Professional ServiceIT Partner LLCSeamless, short-term-downtime migration of email service from GoDaddy Office 365 to Microsoft Office 365, ensuring user access and Exchange Online functionality.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
43 out of 60
HCLTech Business Email Protection: 10-Days ImplementationHCL Technologies Limited.HCLTech Business Email Protection (BEP) Powered By Microsoft EOP and MDO, Enable real time Business Email Protection alerting and automated remediation for email service hosted on Microsoft platform
+1
Applicable to:
Threat Protection
44 out of 60
MDS - Cybersecurity AssessmentMaureen Data SystemsThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
45 out of 60
Deployment of Copilot for Microsoft 365Windows Management Experts, Inc.Enhance the productivity of Microsoft 365 with our premium Deployment service for Copilot for Microsoft 365.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
46 out of 60
Optimized SecOps leveraging Microsoft Copilot for SecuritySynergy Advisors LLCA Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceThreat Protection
47 out of 60
Windows as a Service: 4-Wk ImplementationAMTRA Solutions LtdSecure your data and devices, identities and your business with Windows 10/11.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
48 out of 60
Microsoft Copilot for Security: 6-Wk EnablementCyclotron Inc.Copilot for Security empowers security teams investigations and operations, harnessing real-time data across digital security estates to improve response time, intelligence, and investigation quality.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
49 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security ServicesCognizantDefend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
50 out of 60
Microsoft Defender for Endpoint: 4-Week ImplementationInvokeUnderstand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
51 out of 60
MDR WorkshopGrant Thornton LLPMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
52 out of 60
XENSHIELD365 - Managed Detection and Response (MDR)Xencia Technology Solutions Pvt Ltd24x7 Managed Security Operations SoC through shared team of Security experts Defender XDR
+2
Applicable to:
Cloud SecurityThreat Protection
53 out of 60
DNS & Safe Sender Enablement for Microsoft 365 Mail: Configuration and 1-Month MonitoringFinchloomProtect your brand and eliminate spoof phishing on your Email domain(s) with setup of DMARC, DKIM, SPF authentication, and Valimail. Plus, one month of Monitoring and Reporting.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
54 out of 60
Device Security Management with Microsoft IntuneAVASOFTSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
+3
Applicable to:
Identity & Access ManagementMobile Device ManagementThreat Protection
55 out of 60
Synergy Advisor Architecture Design Sessions (ADS) for Microsoft Copilot for SecuritySynergy Advisors LLCA Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceThreat Protection
56 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
+2
Applicable to:
Cloud SecurityThreat Protection
57 out of 60
Onevinn Secure Microsoft Copilot Journey WorkshopOnevinn ABThis workshop will enable you to take full advantage of Microsoft 365 Copilot with focus on Compliance and Information Protection.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
58 out of 60
Incident Response RetainerSentinel Technologies Inc.Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
59 out of 60
Protect 365 App - 1 hour implementationCloud LifeThe Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
+3
Applicable to:
Cloud SecurityMobile Device ManagementThreat Protection
60 out of 60