筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvokeProvide cross-domain threat protection and simplify breach prevention
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Microsoft Cybersecurity AssessmentThe Partner MastersDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Threat Protection EngagementadaQuestLearn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Microsoft 365 Rapid Security Assessment: 1-Wk AssessmentAwara ITMicrosoft 365 Rapid Security Assessment is a quick yet comprehensive evaluation to enhance Microsoft 365 security against evolving cyber threats
+2
Applicable to:
Cloud Security
Threat Protection
4 out of 60
Spyglass-MXDR Managed Detection & Response: 2-week ImplementationQuisitiveSpyglass-MXDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 60
Microsoft 365 Security AssessmentCDWCDW’s Microsoft 365 Security Assessment allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 60
Defend, Protect, Secure with Microsoft Defender XDRComtrade System IntegrationTake the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
+2
Applicable to:
Cloud Security
Threat Protection
8 out of 60
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
9 out of 60
Assessment of Microsoft IntuneCDWCDW's Assessment of Microsoft Intune is a professional service that provides a comprehensive review of your current Microsoft Intune environment, including policies, settings and configurations.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
10 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)Forsyte IT SolutionsGuardian 365 is the always-on security managed service offering end-to-end protection, monitoring, detection, and remediation of attacks on your infrastructure, data, users, and endpoints 24x7.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Data Security: Free WorkshopLong View SystemsEnhance your data security with Microsoft Purview by beginning with a complimentary workshop.
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Proof of Concept Solution Microsoft 365 CopilotKPCS CZ, s.r.o.Embark on a transformative journey with KPCS's 4 weeks PoC for Microsoft 365 Copilot. Uncover tailored use-cases and maximize the value for your business. Revolutionize your approach to innovation.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
13 out of 60
Cybersecurity Managed Services for Microsoft by SoftwareOneSoftwareOneSecuring your digital landscape with SoftwareOne Cybersecurity Managed Services for Microsoft
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 60
Microsoft 365 threat protection assessmentAVASOFTIdentify vulnerabilities and threats in Microsoft 365. Use advanced protection, intelligence, detection, and response to safeguard data. Enhance security with real-time insights and monitoring.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
15 out of 60
Microsoft Threat Protection Workshop: 5-Wk WrkshopProArch Technologies, Inc.Improve your Microsoft 365 security posture with a Microsoft Threat Protection Workshop
+1
Applicable to:
Threat Protection
16 out of 60
Performanta Safe XDRPerformantaUtilising Microsoft Sentinel and Copilot for Security, reduce response times from hours to seconds utilising Microsoft Sentinel, Microsoft Copilot for Security and Microsoft security toolsets
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 60
Secure Productivity with Microsoft 365 Proof of Value & ImplementationBDO Digital, LLCMaximize your investment in the Microsoft 365 suite by activating and implementing all available features with security across your organization
+3
Applicable to:
Device Deployment & Management
Teamwork Deployment
Threat Protection
18 out of 60
Microsoft 365 Security Hardening; 4-Wk ServiceProArch Technologies, Inc.The Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
19 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.Microsoft’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Copilot Readiness AssessmentAscent Global, Inc.Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
SoftwareOne Managed Detection and Response Service for Microsoft SentinelSoftwareOneSecure your IT Environment with Microsoft Services and on-call Cyber-security Analysts with end-to-end MDR and optimise costs
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
22 out of 60
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
23 out of 60
Zones SOCaaS - MXDR with Threat ProtectionZones, LLCZones SOCaaS powered by Microsoft Sentinel and Defender offers advanced MDR and XDR capabilities, reinforcing your business’s safety.
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 60
Cloud Security Operations CenterReplyVerified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
26 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era TechnologySecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
27 out of 60
Copilot for Security Readiness AssessmentPerformantaFutureproof your Business Security with Microsoft Security Copilot and Performanta
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 60
Microsoft 365 E5 Zero Trust Security AssessmentSHI International CorpExplore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
29 out of 60
MDS - Modern Security Operations EngagementMaureen Data SystemsA 2-day engagement to demonstrate how intelligent security analytics and threat intelligence can detect and stop active threats, encouraging organizations to deploy and adopt Modern SecOps solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
Email Security Threat AssessmentAVASOFTConfident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
31 out of 60
Microsoft Defender for Endpoint DeploymentCitrin Cooperman Advisors, LLCFortify your business with Microsoft Defender for Endpoint that seamlessly integrates into Microsoft 365, safeguarding all devices and strengthening your Zero Trust framework.
+2
Applicable to:
Cloud Security
Threat Protection
32 out of 60
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLCService used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
34 out of 60
Microsoft Copilot for Security: 2 x 4h Workshopwater IT Security GmbHGet ready for Microsoft’s Copilot for Security and learn how generative AI can strengthen your organization’s IT. We cover everything you need to know – from the implementation to proper prompting.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Azure and Microsoft 365 SecOps DiagnosticsBlueVoyantBlueVoyant experts review an organization's Azure and Microsoft 365 Defender Security Portal to identify potential vulnerabilities and provide actionable recommendations.
+1
Applicable to:
Threat Protection
36 out of 60
Microsoft 365 Security Review: 3-Wk AssessmentProArch Technologies, Inc.Identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
37 out of 60
Microsoft 365 Security Review: AssessmentCyberOneIdentify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
38 out of 60
Barracuda Office 365 email-based securityCrayonBarracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defense, API-based inbox defense, incident response, data protection, and compliance capabilities.
+1
Applicable to:
Threat Protection
39 out of 60
Modern Workplace Security 10-Wk ImplementationWipro LtdWipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 60
Endpoint Management WorkshopCitrin Cooperman Advisors, LLCEmpower secure endpoint management with Microsoft Intune through streamlined operations.
+2
Applicable to:
Cloud Security
Threat Protection
41 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLCOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Microsoft Purview Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Purview while ensuring alignment with best practice for security, governance, and compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
MDR for Microsoft DefenderADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 60
Microsoft Managed Extended Detection & Response (MXDR)ISA Cybersecurity Inc.Our Managed XDR service provides your environment with the ultimate protection against cyber attacks.
+1
Applicable to:
Threat Protection
45 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
46 out of 60
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical StartRapidly identify, contain, and remediate a breach.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
47 out of 60
Red Canary MSSP FastTrack for SecurityRed CanaryLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Complete MXDR Threat Protection Powered by Microsoft SentinelKiZAN TechnologiesManaged security services to protect against an evolving cyber threat landscape 24x7x365 with Microsoft Entra ID Protection, Microsoft Sentinel, and Microsoft Defender.
+2
Applicable to:
Cloud Security
Threat Protection
49 out of 60
Microsoft 365 E5 Cyber Range 2 Week ImplementationKAMIND IT, IncKAMIND's cybersecurity immersive learning deployment utilizing Project Ares Cyber Range for Microsoft 365 Security Suites.
+2
Applicable to:
Cloud Security
Threat Protection
50 out of 60
KMicro MXDR for SMBKMicro Tech, Inc.KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
51 out of 60
Implementation of Microsoft IntuneCDWCDW’s professional service for Implementation of Microsoft Intune works with you to address the challenges you face in managing and securing your mobile devices and applications.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
52 out of 60
ALFA Managed SOC with Microsoft Defender XDR and SentinelAlfa Connections Pte LtdALFA Managed Security Operations Center (SOC) leverages the powerful capabilities of Microsoft Defender Extended Detection and Response (XDR) and Microsoft Sentinel (SIEM & SOAR) to provide a robust,
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
53 out of 60
Microsoft 365 E5 CMMC L3 8 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
54 out of 60
Implementation of Microsoft Defender for Cloud AppsCDWCDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
KMicro Rapid Incident Response & Readiness ServiceKMicro Tech, Inc.KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
56 out of 60
AvePoint Backup: 4 Weeks Proof Of ConceptSentinel Technologies Inc.Sentinel Technologies is proud to offer AvePoint’s Cloud Backup, a powerful cloud-to-cloud backup solution for Microsoft 365 and Azure.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
57 out of 60
Microsoft Threat Protection EngagementRavanty Tech Consulting, Inc.Threat Protection Engagement helps you assess your security landscape, address most pressing security goals and challenges, and provide an immersive experience around Microsoft security capabilities.
+2
Applicable to:
Identity & Access Management
Threat Protection
58 out of 60
Microsoft Defender for Endpoint QuickStartPresidioPresidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
eDiscovery, Data Lifecycle & Records ManagementITC Secure LtdManage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
60 out of 60