筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 495 个结果。
威胁防护Remove 威胁防护
Microsoft 365Remove Microsoft 365
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFT
Identity & Access Management
Mobile Device Management
Threat ProtectionSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
1 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFT
Cloud Security
Information Protection & Governance
Threat ProtectionEnhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
AVAProtect 360 - Device Protection and Management Solutions by AVASOFTAVASOFT
Information Protection & Governance
Mobile Device Management
Threat ProtectionLeverage Microsoft Intune for tailored security measures, advanced threat detection, and real-time monitoring to safeguard sensitive data, mitigate risks, and ensure compliance.
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
4 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFT
Cloud Security
Information Protection & Governance
Threat ProtectionBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Manage Corporate Data on Devices with IntuneAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
7 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 60
Microsoft Cloud App Security (MCAS) for Custom Apps by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionKnow your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
9 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Microsoft Cloud Application for 3rd Party AppsAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionSecure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
11 out of 60
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
12 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
14 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP Technologies
Cloud Security
Identity & Access Management
Threat ProtectionThe SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Microsoft Defender XDR AcceleratorAkins IT
Threat ProtectionWe empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation.
Applicable to:
Threat Protection
16 out of 60
Implementation of Microsoft Defender for Office 365CDW
Cloud Security
Identity & Access Management
Threat ProtectionThe Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance Inc
Cloud Security
Insider Risk
Threat ProtectionYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
18 out of 60
Intune Design and Deployment ServicesTrusted Tech Team
Identity & Access Management
Mobile Device Management
Threat ProtectionModernize deployment, configuration and management of your Windows devices while
improving your security posture.
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
19 out of 60
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionThis service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Threat Protection EngagementONEFACTORY
Threat ProtectionThe Threat Protection Engagement helps customers assess their security landscape and address their most pressing security goals and challenges and provides an immersive experience that brings the Micr
Applicable to:
Threat Protection
21 out of 60
Copilot for Security Accelerator: 2-week ImplementationNeway Technologies
Cloud Security
Threat ProtectionNeway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
Applicable to:
Cloud Security
Threat Protection
22 out of 60
Microsoft Sentinel Migration and ModernizeCollective Insights
Insider Risk
Threat ProtectionMigrate from legacy SIEM to Microsoft Sentinel; a cloud native SIEM + SOAR
Applicable to:
Insider Risk
Threat Protection
23 out of 60
Quadra DefendX Managed Threat Protection ServicesQuadrasystems.net (India) P Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionMaximize Microsoft Defender XDR capabilities with DefendX - Quadra's Managed Threat Protection Services
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
24 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte Ltd
Cloud Security
Information Protection & Governance
Threat ProtectionTo assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 60
Microsoft Security Solutions - 4 Week AssessmentProtiviti
Cloud Security
Information Protection & Governance
Threat ProtectionMicrosoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
ALFA Managed SOC with Microsoft Defender XDR and SentinelAlfa Connections Pte Ltd
Cloud Security
Information Protection & Governance
Threat ProtectionALFA Managed Security Operations Center (SOC) leverages the powerful capabilities of Microsoft Defender Extended Detection and Response (XDR) and Microsoft Sentinel (SIEM & SOAR) to provide a robust,
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
27 out of 60
MDS - Cybersecurity AssessmentMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
C1st Implementation of Microsoft Defender for EndpointC1st Technologies LLC
Mobile Device Management
Threat ProtectionThe C1st Microsoft Defender for Endpoint Implementation enhances security by deploying advanced threat protection across all endpoints, configuring licenses, setting up connections, and assigning role
Applicable to:
Mobile Device Management
Threat Protection
29 out of 60
C1st Office 365 Tenant Migration AssessmentC1st Technologies LLC
Adoption & Change Management
Cloud Security
Threat ProtectionEnsure a smooth Office 365 tenant-to-tenant migration for businesses. We provide comprehensive consulting services to facilitate seamless transitions during mergers, acquisitions, and other scenarios.
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
30 out of 60
Data Security and Compliance Assessment for Microsoft 365Neway Technologies
Identity & Access Management
Information Protection & Governance
Threat ProtectionGet more out of compliance using your orgnaizations data and behaviors to drive policy. Ensuring you maintain productivity while ensuring your business is safe and secure.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
31 out of 60
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITED
Identity & Access Management
Insider Risk
Threat ProtectionOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
32 out of 60
AVASecure 360 Next-Gen MXDR Managed ServicesAVASOFT
Cloud Security
Information Protection & Governance
Threat ProtectionAt AVASOFT, we are committed to securing your digital environment through a holistic Managed Extended Detection and Response (MXDR) solution.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 60
MDS Managed MXDR EngagementMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Implementation of Microsoft Entra ID GovernanceSpyglass MTG, LLC
Identity & Access Management
Information Protection & Governance
Threat ProtectionFor any business interested in securing internal and external Identities with Entra ID
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
35 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Fortis Business Email Compromise Incident Response JumpstartSentinel Technologies Inc.
Threat ProtectionFortis by Sentinel’s Incident Response team will use best efforts, as specified in the Service Level Agreement below, to address a Business Email Compromise incident within your organization.
Applicable to:
Threat Protection
40 out of 60
Microsoft Platform Support ImplementationManaged Solution
Device Deployment & Management
Threat Protection
Workplace AnalyticsMicrosoft Platform Support Services provides comprehensive support that optimizes performance, enhances security and drives adoption across your Microsoft ecosystem.
Applicable to:
Device Deployment & Management
Threat Protection
Workplace Analytics
41 out of 60
4security: Microsoft 365 Communication Protect4Sight Holdings
Cloud Security
Information Protection & Governance
Threat Protection4security: Microsoft 365 Communication Protect, a solution to safeguard your organisation’s communications
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight Holdings
Cloud Security
Identity & Access Management
Threat ProtectionStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
4security: Backup as a Service for Microsoft 3654Sight Holdings
Cloud Security
Information Protection & Governance
Threat ProtectionProtect your data with 4Security's Microsoft 365 Backup as a Service. Seamless integration, automated backups, and reliable data recovery for businesses of all sizes.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
44 out of 60
Lightstream Copilot for Microsoft 365 Readiness EngagementLightstream
Threat ProtectionLightstream Copilot Readiness Engagement helps clients to rapidly identify critical remediation steps needed in order to implement Copilot for Microsoft 365 successfully.
Applicable to:
Threat Protection
45 out of 60
Threat Protection EngagementFIS Managed IT Solutions
Cloud Security
Identity & Access Management
Threat ProtectionLearn how to put next-generation Microsoft Security tools to work for you.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Data Security as a Service | Assure 365CyberOne
Cloud Security
Information Protection & Governance
Threat ProtectionFully Managed Data Security, governance and compliance with 24x7 monitoring—Powered by Microsoft Purview.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
47 out of 60
XDR as a Service | Assure 365CyberOne
Cloud Security
Information Protection & Governance
Threat ProtectionFully Managed XDR with 24x7 detection, response and threat protection—Powered by Microsoft Defender XDR.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
48 out of 60
Zero Trust: Microsoft Security BriefingRavanty Tech Consulting, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionLearn and Embrace Modern Work Zero Trust Pillars across Identity, Devices, Apps, and Data
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
49 out of 60
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data Ltd
Identity & Access Management
Information Protection & Governance
Threat ProtectionWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
50 out of 60
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.
Cloud Security
Threat ProtectionComprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
Applicable to:
Cloud Security
Threat Protection
51 out of 60
Information Protection & DLP PilotAwara IT Kazakhstan LLP
Compliance Advisory Services
Information Protection & Governance
Threat ProtectionInformation Protection & DLP Pilot — secure your data with sensitivity labels, automated classification, and DLP policy testing.
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
52 out of 60
Endpoint Security Posture AssessmentBridewell Consulting Limited
Device Deployment & Management
Mobile Device Management
Threat ProtectionSecure your Windows 11 endpoints with a posture assessment using industry benchmarks (eg. CIS).
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
53 out of 60
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLP
Cloud Security
Device Deployment & Management
Threat ProtectionEvaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
54 out of 60
Secure Productive Workplace: Implement 4-WkNetsurit
Device Deployment & Management
Identity & Access Management
Threat ProtectionNetsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
55 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLC
Cloud Security
Identity & Access Management
Threat ProtectionThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Insider Risk Management: 8-Wk implementationPwC
Cloud Security
Insider Risk
Threat ProtectionEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
57 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, Inc
Cloud Security
Identity & Access Management
Threat ProtectionKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Microsoft Security: 3-Day WorkshopApex Digital Solutions
Cloud Security
Identity & Access Management
Threat ProtectionDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
G Suite to Office 365 migration: 1-Hour Assessmenttrue org cloud
Adoption & Change Management
Mobile Device Management
Threat ProtectionAssessment of your current G Suite environment to plan migration to Office 365
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
60 out of 60