筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 496 个结果。
威胁防护Remove 威胁防护
Microsoft 365Remove Microsoft 365
Defend Against Threats with SIEM Plus XDRNetrix Global
Cloud Security
Identity & Access Management
Threat ProtectionAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Endpoint Management WorkshopYork Telecom Corp
Cloud Security
Mobile Device Management
Threat Protection3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
2 out of 60
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.
Identity & Access Management
Mobile Device Management
Threat ProtectionMany enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
3 out of 60
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.
Device Deployment & Management
Insider Risk
Threat ProtectionNTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
4 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.
Cloud Security
Information Protection & Governance
Threat ProtectionNTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.
Cloud Security
Identity & Access Management
Threat ProtectionThe Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender
for enterprises, resulting in improved detection rates, threat coverage, and
organizational security posture.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
TS As a Services (TSaaS): 5-day ImplementationE-Level Cloud Services S.A. de C.V.
Cloud Security
Mobile Device Management
Threat ProtectionManage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
7 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East
Cloud Security
Identity & Access Management
Threat Protection3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Microsoft Purview Data Security Basic Quick Start 10-week ImplementationEdgile, Inc.
Compliance Advisory Services
Information Protection & Governance
Threat ProtectionDrive Data Protection Sustainability with Edgile's Data Protection Methodology
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
9 out of 60
Security & Compliance Readiness: 2-Wk. AssessmentiCorps Technologies, Inc
Compliance Advisory Services
Information Protection & Governance
Threat ProtectioniCorps Security and Compliance Services provide a complete security assessment of your Microsoft platform and integrated services.
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
10 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLC
Cloud Security
Information Protection & Governance
Threat ProtectionIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM Systems
Cloud Security
Identity & Access Management
Threat Protection• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Seguridad Corporativa: Evaluación 4 semanasCIBERIT SRL.
Identity & Access Management
Information Protection & Governance
Threat ProtectionCon esta Solución usted podrá gestionar la seguridad en toda su empresa
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
13 out of 60
Secure Endpoint Management - 5 Day - Proof of ConceptCoretek Services
Device Deployment & Management
Mobile Device Management
Threat ProtectionProtect your organization's endpoints. In this 5-Day quick start Coretek offers three options for providing unified endpoint management and security across all devices.
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
14 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeIT
Cloud Security
Identity & Access Management
Threat ProtectionCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
1-Day Security & Identity WorkshopConvergeOne
Cloud Security
Identity & Access Management
Threat ProtectionTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOne
Cloud Security
Identity & Access Management
Threat ProtectionLearn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Athenagy™ E-Discovery Assessment: 4 weeksBDO Digital, LLC
Compliance Advisory Services
Information Protection & Governance
Threat ProtectionCentralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
18 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLC
Cloud Security
Identity & Access Management
Threat ProtectionRoadmap to increase your security score with cost-effective security tools
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Compliance Assessment - 6 weeksBDO Digital, LLC
Cloud Security
Compliance Advisory Services
Threat ProtectionIdentify your compliance maturity and areas that need improvement
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
20 out of 60
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.
Cloud Security
Threat ProtectionEvaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
Applicable to:
Cloud Security
Threat Protection
21 out of 60
Office 365 Protection: Design & Pilot 1-Wk POCManaged Solution
Cloud Security
Threat ProtectionProtect Your Employees from External Email Threats with Defender for Office 365 Protection
Applicable to:
Cloud Security
Threat Protection
22 out of 60
ThreatHunter MXDR: 3-Wk ImplemenationeGroup Enabling Technologies
Identity & Access Management
Information Protection & Governance
Threat ProtectioneGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
23 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk AssessmentApex Digital Solutions
Adoption & Change Management
Cloud Security
Threat ProtectionAchieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
24 out of 60
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer Solutions
Cloud Security
Information Protection & Governance
Threat ProtectionSirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 60
Mobile Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure Ltd
Device Deployment & Management
Mobile Device Management
Threat ProtectionAccelerated Deployment of Microsoft Endpoint Manager for Corporate Mobile Devices (iOS, Android and macOS)
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
26 out of 60
Windows Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure Ltd
Device Deployment & Management
Mobile Device Management
Threat ProtectionAccelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
27 out of 60
discover-sensitive-data-workshopECF Data LLC
Cloud Security
Insider Risk
Threat ProtectionECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
28 out of 60
ECF Data Threat Protection: 3-Day WorkshopECF Data LLC
Cloud Security
Threat ProtectionThe Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
Applicable to:
Cloud Security
Threat Protection
29 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLC
Cloud Security
Identity & Access Management
Threat ProtectionThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
Cloud Security
Insider Risk
Threat ProtectionThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
31 out of 60
Rapid Risk Assessment: 4-Wk AssessmentAscent Global, Inc.
Information Protection & Governance
Threat ProtectionImmediate and long-term Microsoft security strategy assessment utilizing security tools such as Defender, Sentinel, and Cloud App Security.
Applicable to:
Information Protection & Governance
Threat Protection
32 out of 60
Security Assessment: 2 Week AssessmentTallan
Cloud Security
Identity & Access Management
Threat ProtectionTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Secure Modern Workplace Platform ImplementationCognizant
Adoption & Change Management
Teamwork Deployment
Threat ProtectionEnables teams to securely collaborate, connect and be more productive than ever before, no matter when or where they work.
Applicable to:
Adoption & Change Management
Teamwork Deployment
Threat Protection
34 out of 60
Threat Protection and Cloud Security: 3 Day WorkshopNetwoven
Cloud Security
Threat ProtectionImprove your security posture with a Microsoft Threat Protection Assessment Workshop
Applicable to:
Cloud Security
Threat Protection
35 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure Ltd
Cloud Security
Device Deployment & Management
Threat ProtectionAccelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
36 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLC
Cloud Security
Information Protection & Governance
Threat ProtectionCatapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 60
Retail Kiosk Program Workshop - 5 DaysCB5 Solutions
Frontline Workers
Identity & Access Management
Threat ProtectionA secure kiosk management solution built for Zebra, Android and iOS devices in retail and finance services.
Applicable to:
Frontline Workers
Identity & Access Management
Threat Protection
38 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.
Cloud Security
Identity & Access Management
Threat ProtectionDeep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Security Solutions:2-Weeks ImplementationAlpine Health Technologies Corp
Cloud Security
Insider Risk
Threat ProtectionDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
40 out of 60
Threat Protection: 2-Week WorkshopForsyte IT Solutions
Cloud Security
Identity & Access Management
Threat ProtectionLearn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Office 365 Teamwork Security - Managed ServiceCognizant
Cloud Security
Information Protection & Governance
Threat ProtectionTeamwork Security provides a comprehensive security management service for Office 365 platforms
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 60
Zero Trust Baseline Implementation - 4 weeksBDO Digital, LLC
Threat ProtectionBDO Digital’s Zero Trust Baseline implementation will help your organization apply the Zero Trust framework necessary for addressing threats that arise in the modern workplace.
Applicable to:
Threat Protection
43 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)Forsyte IT Solutions
Cloud Security
Identity & Access Management
Threat ProtectionGuardian 365 is the always-on security managed service offering end-to-end protection, monitoring, detection, and remediation of attacks on your infrastructure, data, users, and endpoints 24x7.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro Ltd
Cloud Security
Threat ProtectionIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
Applicable to:
Cloud Security
Threat Protection
45 out of 60
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies Limited
Cloud Security
Compliance Advisory Services
Threat ProtectionEnable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
46 out of 60
Security Assessment - 4-Week AssessmentCoretek Services
Identity & Access Management
Information Protection & Governance
Threat ProtectionAnalysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
47 out of 60
CCPA CPRA: 6 - Wk AssessmentHappiest Minds Technologies Limited
Cloud Security
Compliance Advisory Services
Threat ProtectionEnable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
48 out of 60
Microsoft 365 Security: 1 Month ImplementationValorem LLC
Identity & Access Management
Information Protection & Governance
Threat ProtectionA detailed baseline assessment of your current and desired state followed by a pilot production of Microsoft’s advanced security solutions to accelerate your modern security journey.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
49 out of 60
Zero Trust Foundation: 6 Week ImplementationValorem LLC
Identity & Access Management
Information Protection & Governance
Threat ProtectionUsing Azure Active Directory and Microsoft 365 Security, our teams will custom design a zero trust foundation that advances your security posture, reduces risk and makes your environment more secure.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
50 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.
Identity & Access Management
Information Protection & Governance
Threat ProtectionCybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
51 out of 60
Microsoft 365 Security Review: 3-Wk AssessmentProArch Technologies, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionIdentifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
52 out of 60
Microsoft 365 Security Hardening; 4-Wk ServiceProArch Technologies, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionThe Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
53 out of 60
User Shield: 4-Wk ImplementationLong View Systems
Cloud Security
Insider Risk
Threat ProtectionComprehensive and straight-forward security services leveraging leading Partners and Technologies
Applicable to:
Cloud Security
Insider Risk
Threat Protection
54 out of 60
Microsoft Threat Protection Workshop: 5-Wk WrkshopProArch Technologies, Inc.
Threat ProtectionImprove your Microsoft 365 security posture with a Microsoft Threat Protection Workshop
Applicable to:
Threat Protection
55 out of 60
Unified Endpoint Mgmt. - 6 Weeks - ImplementationTCS - Digital Workplace
Device Deployment & Management
Mobile Device Management
Threat ProtectionTCS Unified Endpoint Management combines Microsoft Intune, Microsoft Defender for Endpoint and Configuration Manager solutions to provide modern management of endpoints with a Zero Trust strategy.
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
56 out of 60
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuest
Cloud Security
Information Protection & Governance
Threat ProtectionGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
57 out of 60
Microsoft 365 Fundamentals: 1 Day WorkshopNETCOM LEARNING
Cloud Security
Teams Custom Solutions
Threat ProtectionIntroduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
58 out of 60
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile IT
Cloud Security
Identity & Access Management
Threat ProtectionA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Nonprofit Security Maturity Assessment - 4 weeksBDO Digital, LLC
Cloud Security
Identity & Access Management
Threat ProtectionRoadmap to increase your security score with cost-effective security tools
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60