筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 495 个结果。
威胁防护Remove 威胁防护
Microsoft 365Remove Microsoft 365
Threat Protection WorkshopMobile Mentor
Adoption & Change Management
Cloud Security
Threat ProtectionDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
1 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk AssessmentApex Digital Solutions
Adoption & Change Management
Cloud Security
Threat ProtectionAchieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
2 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Threat ProtectionService used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
3 out of 60
Microsoft Cybersecurity AssessmentAkins IT
Cloud Security
Identity & Access Management
Threat ProtectionDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionComplimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
MDS - Threat Protection EngagementMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionA 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Secure Data Management with Microsoft PurviewAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoft
Cloud Security
Identity & Access Management
Threat ProtectionBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Defender for IoT Operational Technology: 8-Week POCITC Secure Ltd
Cloud Security
Device Deployment & Management
Threat ProtectionITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
9 out of 60
End-to-end Threat Protection Workshop and PilotExelegent
Cloud Security
Identity & Access Management
Threat ProtectionThe Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
MDR WorkshopGrant Thornton LLP
Cloud Security
Identity & Access Management
Threat ProtectionMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Managed XDR Service for Microsoft 365 Government Commercial Cloud (GCC) High environmentsSysArc Inc
Threat ProtectionOur Managed XDR Service ensures regulatory compliance, and security for your organization’s needs.
Applicable to:
Threat Protection
12 out of 60
Managed Support for Microsoft Defender and Endpoint Detection and Response (EDR) ServiceOlive + Goose
Cloud Security
Information Protection & Governance
Threat ProtectionA fully managed Microsoft Defender + EDR service designed to protect your organization from today’s most persistent cyber threats.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 60
Modern Workplace Optimization - 4 Week AssessmentProtiviti
Cloud Security
Information Protection & Governance
Threat ProtectionThis assessment for Microsoft 365 helps customers obtain insights to what it takes to improve productivity against Cyber Threats for Workforce Productivity.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 60
Zero Trust Baseline Implementation - 4 weeksBDO Digital, LLC
Threat ProtectionBDO Digital’s Zero Trust Baseline implementation will help your organization apply the Zero Trust framework necessary for addressing threats that arise in the modern workplace.
Applicable to:
Threat Protection
15 out of 60
Unified Endpoint Mgmt. - 6 Weeks - ImplementationTCS - Digital Workplace
Device Deployment & Management
Mobile Device Management
Threat ProtectionTCS Unified Endpoint Management combines Microsoft Intune, Microsoft Defender for Endpoint and Configuration Manager solutions to provide modern management of endpoints with a Zero Trust strategy.
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
16 out of 60
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Synergy Advisors Microsoft Copilot for Security E-mmersion ExperienceSynergy Advisors LLC
Adoption & Change Management
Information Protection & Governance
Threat ProtectionAI-powered security for rapid, scalable, and effective defense
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
18 out of 60
Deployment of Copilot for Microsoft 365Windows Management Experts, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionEnhance the productivity of Microsoft 365 with our premium Deployment service for Copilot for Microsoft 365.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
19 out of 60
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.
Identity & Access Management
Mobile Device Management
Threat ProtectionMany enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
20 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAn in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
iT1's Security AssessmentIt1 Source LLC
Cloud Security
Information Protection & Governance
Threat ProtectionImprove your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 60
Fortis IR Table Top ExercisesSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionExercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
SharePoint and Teams Security - 2 week assessmentAVASOFT
Information Protection & Governance
Threat Protection
Workplace AnalyticsConfident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Microsoft Purview Data Security Basic Quick Start 10-week ImplementationEdgile, Inc.
Compliance Advisory Services
Information Protection & Governance
Threat ProtectionDrive Data Protection Sustainability with Edgile's Data Protection Methodology
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
25 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.
Cloud Security
Information Protection & Governance
Threat ProtectionMicrosoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Copilot Data ProtectionCloud Life
Information Protection & Governance
Insider Risk
Threat ProtectionCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
27 out of 60
Microsoft Defender for Endpoint: Proof-of-ConceptAscent Global, Inc.
Threat ProtectionModernize endpoint security and reduce cost with Microsoft Defender for Endpoint
Applicable to:
Threat Protection
28 out of 60
Microsoft Intune Suite Pilot ImplementationTechNet UC LLC
Device Deployment & Management
Mobile Device Management
Threat ProtectionTechNet UC is proud to present our comprehensive Microsoft Intune Suite Pilot, designed to help enterprises explore and evaluate the extensive capabilities of Intune Suite tools.
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
29 out of 60
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
30 out of 60
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITED
Threat ProtectionThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
Applicable to:
Threat Protection
31 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5Collective Insights
Cloud Security
Device Deployment & Management
Threat ProtectionUpgrade to Microsoft 365 E5 for Advanced Productivity and Security
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
32 out of 60
Modern Workplace Security 10-Wk ImplementationWipro Ltd
Identity & Access Management
Information Protection & Governance
Threat ProtectionWipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
33 out of 60
Defender PilotLevacloud LLC
Cloud Security
Threat ProtectionThe Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
Applicable to:
Cloud Security
Threat Protection
34 out of 60
Data Governance - Threat Protection - AssessmentSkyTerra Technologies LLC
Threat ProtectionThe goal is to assess your existing data governance posture as well as unearthing your organization's priorities and associated business needs.
Applicable to:
Threat Protection
35 out of 60
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITED
Adoption & Change Management
Insider Risk
Threat ProtectionOur expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
36 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
Cloud Security
Identity & Access Management
Threat ProtectionThis engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
C1st End-user Device Security Zero TrustC1st Technologies LLC
Cloud Security
Identity & Access Management
Threat ProtectionC1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Nonprofit Security Maturity Assessment - 4 weeksBDO Digital, LLC
Cloud Security
Identity & Access Management
Threat ProtectionRoadmap to increase your security score with cost-effective security tools
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Microsoft Defender XDR AcceleratorThe Partner Masters
Threat ProtectionWe empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation
Applicable to:
Threat Protection
40 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionOur security services provide a holistic approach through advisory,implementation & managed services
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
ThreatHunter MXDR: 3-Wk ImplemenationeGroup Enabling Technologies
Identity & Access Management
Information Protection & Governance
Threat ProtectioneGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
42 out of 60
Threat Protection - 2 Days WorkshopMayasoft Bilgi Sistemleri A.S.
Cloud Security
Threat ProtectionWe can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
Applicable to:
Cloud Security
Threat Protection
43 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionPrepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITED
Cloud Security
Identity & Access Management
Threat ProtectionProfessional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.
Cloud Security
Identity & Access Management
Threat ProtectionProvide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Security Baseline Integrity ManagerAegis Innovators
Identity & Access Management
Information Protection & Governance
Threat ProtectionSingle pane of glass for unified configuration, governance, and lifecycle management of security workloads across Microsoft 365.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
47 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen Systems
Cloud Security
Insider Risk
Threat ProtectionThe OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
Applicable to:
Cloud Security
Insider Risk
Threat Protection
48 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure Ltd
Cloud Security
Identity & Access Management
Threat ProtectionKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Microsoft Defender for Business Managed Service: Monthly MDRe2e-assure Ltd
Cloud Security
Information Protection & Governance
Threat ProtectionMaximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
50 out of 60
Defender for Endpoint Managed Servicee2e-assure Ltd
Cloud Security
Information Protection & Governance
Threat ProtectionMicrosoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
51 out of 60
Microsoft Defender for Endpoint Professional Services: 1-Wk ImplementationOptiv Security Inc.
Information Protection & Governance
Knowledge & Insights
Threat ProtectionProvide comprehensive, powerful protection at your organization's endpoints from Optiv utilizing the Microsoft Defender for Endpoint solution.
Applicable to:
Information Protection & Governance
Knowledge & Insights
Threat Protection
52 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte Ltd
Cloud Security
Identity & Access Management
Threat ProtectionHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Overwatch Microsoft 365 Security: 12 Month ImplementationTHREATSCAPE LIMITED
Cloud Security
Information Protection & Governance
Threat ProtectionOverwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
54 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies Ltd
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty Ltd
Cloud Security
Threat ProtectionOur Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
Applicable to:
Cloud Security
Threat Protection
56 out of 60
Windows as a Service: 4-Wk ImplementationAMTRA Solutions Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionSecure your data and devices, identities and your business with Windows 10/11.
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
57 out of 60
Microsoft 365 Threat Protection Workshop + 5 DayCyberwise Siber Güvenlik TIC. AS.
Threat ProtectionIs your Microsoft 365 environment secure? Do you wonder about your current security maturity? We will assist you with a full-fledged workshop on how to deploy and implement Microsoft 365 Security.
Applicable to:
Threat Protection
58 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day WorkshopeGroup Enabling Technologies, LLC
Cloud Security
Information Protection & Governance
Threat ProtectionWith Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
59 out of 60
Ransomware & Supply Chain Incident Management: 12 Hour AssessmentMaureen Data Systems
Compliance Advisory Services
Knowledge & Insights
Threat ProtectionIdentify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
Applicable to:
Compliance Advisory Services
Knowledge & Insights
Threat Protection
60 out of 60