筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 495 个结果。
威胁防护Remove 威胁防护
Microsoft 365Remove Microsoft 365
Implementation of Microsoft Defender for EndpointCDW
Cloud Security
Identity & Access Management
Threat ProtectionCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionProtect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLC
Information Protection & Governance
Insider Risk
Threat ProtectionWe understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
3 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionThe goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Get AI Ready: 5-Day AssessmentPSM Partners
Adoption & Change Management
Cloud Security
Threat ProtectionAI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
5 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)
Cloud Security
Information Protection & Governance
Threat ProtectionCtelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEnhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Additional Spam and Email Protection: 3-Days Professional ServiceIT Partner LLC
Compliance Advisory Services
Information Protection & Governance
Threat ProtectionAdditional protection for organizations experiencing problems with emails.
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
9 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReply
Identity & Access Management
Information Protection & Governance
Threat ProtectionValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionMulti-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Endpoint Security Foundations 50 users: 1-YrRed River Technology LLC
Cloud Security
Threat ProtectionEndpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Microsoft 365 Security WorkshopCollective Insights
Identity & Access Management
Threat ProtectionEquip your organization with insights, strategies, and tools to fortify defenses, mitigate threats, and enhance overall security readiness across your digital estate.
Applicable to:
Identity & Access Management
Threat Protection
13 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEstablish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEstablish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Microsoft Intune DeploymentSecure Future Bilgi Tek. ve Hiz. Tic A.S.
Identity & Access Management
Mobile Device Management
Threat ProtectionThe "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
16 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
Cloud Security
Identity & Access Management
Threat ProtectionSafeguard your entire organization with Managed Security Services on Microsoft Defender
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Vulnerability ManagementBlack Cell Magyarország Korlatolt Felelossegu Tarsasag
Cloud Security
Threat ProtectionRapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
Applicable to:
Cloud Security
Threat Protection
18 out of 60
Defender for Office365Suri Services SC
Cloud Security
Information Protection & Governance
Threat ProtectionSuri Services y Office 365: La alianza impenetrable en ciberseguridad.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 60
Avanade Modern Sec OpsAvanade, Inc.
Cloud Security
Information Protection & Governance
Threat ProtectionTo deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
20 out of 60
Microsoft Defender for Office 365: 1-hour briefingReply
Cloud Security
Threat ProtectionFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
Applicable to:
Cloud Security
Threat Protection
21 out of 60
Microsoft Defender for Cloud Apps: 1-hour briefingReply
Cloud Security
Threat ProtectionFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Cloud Apps
Applicable to:
Cloud Security
Threat Protection
22 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLP
Identity & Access Management
Information Protection & Governance
Threat ProtectionReview your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
23 out of 60
Office 365 Encrypted Email - Initial Setup: 1-Day Professional ServiceIT Partner LLC
Cloud Security
Information Protection & Governance
Threat ProtectionBoost Microsoft 365 security with default encryption. Elevate messaging protection and implement email encryption and rights protection for sensitive data.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
24 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEnhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
GoDaddy Office 365 to Microsoft Office 365 Tenant-to-Tenant Cutover Email Migration: 7-Days Professional ServiceIT Partner LLC
Cloud Security
Information Protection & Governance
Threat ProtectionSeamless, short-term-downtime migration of email service from GoDaddy Office 365 to Microsoft Office 365, ensuring user access and Exchange Online functionality.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling Technologies
Cloud Security
Insider Risk
Threat ProtectionCyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
27 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionFortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionReduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionA high-level forensics evaluation designed to identify current and past threat activity.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Cyber Security AssessmentELEVATE Solutions Limited
Threat ProtectionThe Cybersecurity Assessment helps customers assess their security posture and risk to insider threats.
Applicable to:
Threat Protection
31 out of 60
Identity WorkshopSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionLeave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionReactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAccording to multiple studies, breaches and ransomware have more than doubled in the past year.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Cybersecurity Assessment EngagementadaQuest
Cloud Security
Insider Risk
Threat ProtectionGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
35 out of 60
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstream
Cloud Security
Identity & Access Management
Threat ProtectionLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Microsoft Cybersecurity: 1 Month AssessmentBig Cloud Consultants
Cloud Security
Threat ProtectionOur expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
Applicable to:
Cloud Security
Threat Protection
37 out of 60
Defender Implementation, Tuning, and TestingSecurity Risk Advisors Intl, LLC
Threat ProtectionImplement Windows Defender for Endpoint on Windows OS.
Applicable to:
Threat Protection
38 out of 60
KAMIND CMMC L1 DIYKAMIND IT, Inc
Compliance Advisory Services
Information Protection & Governance
Threat ProtectionConsulting on how to utilize the Microsoft 365 Licenses on your path to CMMC L1 Compliance.
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
39 out of 60
Lightstream Threat Protection Assessment and Deployment RoadmapLightstream
Cloud Security
Threat ProtectionLeveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
Applicable to:
Cloud Security
Threat Protection
40 out of 60
Sentinel Readiness WorkshopSentinel Technologies Inc.
Cloud Security
Knowledge & Insights
Threat ProtectionSentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
41 out of 60
Microsoft Copilot for Security: 6-Wk EnablementCyclotron Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionCopilot for Security empowers security teams investigations and operations, harnessing real-time data across digital security estates to improve response time, intelligence, and investigation quality.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
42 out of 60
Defender for Office 365: 5-Day AssessmenteGroup Enabling Technologies
Cloud Security
Insider Risk
Threat ProtectionMicrosoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
43 out of 60
Synergy Advisor POC-in-a-box for Microsoft Copilot for SecuritySynergy Advisors LLC
Adoption & Change Management
Information Protection & Governance
Threat ProtectionEnhance your security posture with Synergy Advisor POC-in-a-box for Microsoft Copilot for Security
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
44 out of 60
Microsoft Sentinel Security Consulting ServiceComtrade System Integration
Cloud Security
Threat ProtectionMicrosoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
Applicable to:
Cloud Security
Threat Protection
45 out of 60
Security für den Einsatz von Microsoft 365 CopilotnovaCapta GmbH
Cloud Security
Information Protection & Governance
Threat ProtectionEine sichere Basis schaffen und technische Hindernisse aus dem Weg räumen für den Einsatz von Copilot for Microsoft 365
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
46 out of 60
Windows 365 PilotCDW
Cloud Security
Identity & Access Management
Threat ProtectionWith the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
MXDR ConsultationCBTS Technology Solutions LLC
Cloud Security
Identity & Access Management
Threat ProtectionCBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
XENSHIELD365 - Managed Detection and Response (MDR)Xencia Technology Solutions Pvt Ltd
Cloud Security
Threat Protection24x7 Managed Security Operations SoC through shared team of Security experts Defender XDR
Applicable to:
Cloud Security
Threat Protection
49 out of 60
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense Global
Threat ProtectionLearn how to put next-generation Microsoft Security tools to work for you
Applicable to:
Threat Protection
50 out of 60
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense Global
Threat ProtectionUnderstand your readiness for common security threats.
Applicable to:
Threat Protection
51 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLP
Cloud Security
Identity & Access Management
Threat ProtectionImprove your Security Posture with Grant Thornton's Threat Protection Engagement
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense Global
Compliance Advisory Services
Identity & Access Management
Threat ProtectionStop threats with a cloud-native SIEM adapted to your new business needs.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
53 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
54 out of 60
Microsoft 365 complete security HardneningAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
55 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
56 out of 60
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionAware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
57 out of 60
Sensitive data risk assessmentAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
58 out of 60
Data Protection and Governance with Microsoft PurviewAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
59 out of 60
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionOur solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
60 out of 60