FiltersClear all
Consulting services results
Showing results in consulting services.
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.A high-level forensics evaluation designed to identify current and past threat activity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Identity WorkshopSentinel Technologies Inc.Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.According to multiple studies, breaches and ransomware have more than doubled in the past year.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
6 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
7 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwovenNetwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
8 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-WeeksmyCloudDoorAssess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
9 out of 60
Microsoft Cybersecurity: 1 Month AssessmentBig Cloud ConsultantsOur expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 60
Lightstream Data Security AssessmentLightstreamLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
11 out of 60
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstreamLightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
AI Governance Workshop: 4-Hour WorkshopVitalystBe introduced to Microsoft's AI Services, Azure Open AI and Copilot, and better understand the governance principles and practices tailored to them, like transparency, fairness, privacy, and security.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
13 out of 60
Lightstream Threat Protection Assessment and Deployment RoadmapLightstreamLeveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
+2
Applicable to:
Cloud Security
Threat Protection
14 out of 60
Sentinel Readiness WorkshopSentinel Technologies Inc.Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
15 out of 60
Copilot for Security Readiness AssessmentInvokeInvoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Defender for Office 365: 5-Day AssessmenteGroup Enabling TechnologiesMicrosoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
17 out of 60
Virtual CISO Services: 1-Mo BriefingeGroup Enabling TechnologiesCIOs are busy leading the digital initiatives of the business, with security falling behind other priorities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
18 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk AssessmentErgoServicesErgo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
19 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und AusarbeitungAppSphere AGVom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
20 out of 60
Power Apps - 4 Week EngagementSynergy Technical, LLCThe one thing that can make or break the process is how well the IT integration project goes. M&A transactions have a defined transition services agreement that says how long the new company can use t
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
21 out of 60
Microsoft Cloud PC - 4 Day Proof of Concept EngagementSynergy Technical, LLCOur Microsoft Cloud PC offering is designed to help organizations simplify desktop management, increase security, streamline application delivery and increase end user satisfaction.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
22 out of 60
Security für den Einsatz von Microsoft 365 CopilotnovaCapta GmbHEine sichere Basis schaffen und technische Hindernisse aus dem Weg räumen für den Einsatz von Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 60
Secure Hybrid Work OfferingIvision, Inc.Work from anywhere while safeguarding critical business assets and data.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
24 out of 60
Windows 365 Rapid DeployIvision, Inc.The ivision Windows 365 Rapid Deployment approach will accelerates the adoption and use case development of Windows 365 virtual desktops.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
25 out of 60
MXDR ConsultationCBTS Technology Solutions LLCCBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
XENSHIELD365 - Managed Detection and Response (MDR)Xencia Technology Solutions Pvt Ltd24x7 Managed Security Operations SoC through shared team of Security experts Defender XDR
+2
Applicable to:
Cloud Security
Threat Protection
27 out of 60
Copilot for Microsoft 365: 1-Day Data and Security WorkshopAwara ITUnlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
28 out of 60
XENMDM - Monthly SoC Support for Mobile DevicesXencia Technology Solutions Pvt LtdMicrosoft Intune platform based Managed Services covering device management, control and compliance along with monitoring and remediation of issues, policies, users, devices and threats.
+1
Applicable to:
Cloud Security
29 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Cybersecurity Assessment Engagement - 4 weeksGrant Thornton LLPEnhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
+2
Applicable to:
Cloud Security
Identity & Access Management
31 out of 60
Secure Data Management with Microsoft PurviewAVASOFTConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
33 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
34 out of 60
UNITE: Cyber Security Assessment_INFINITY TECHNOLOGY SOLUTIONSBoost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 60
Microsoft Sentinel Integration with Carbon Black by AVASOFTAVASOFTImprove endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
36 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFTManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
38 out of 60
Dynapt Advisory Services for Microsoft 365 Copilot 3 Week WorkshopDynapt IncUnleash the potential of AI to transform your business operations with Microsoft 365 Copilot.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
39 out of 60
Copilot Security Assessment: 4-Wk AssessmentManaged SolutionUnlock the full potential of AI with a comprehensive Microsoft Copilot Security Assessment, fully integrated with Microsoft 365
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
40 out of 60
Copilot for Microsoft 365 WorkshopINOVASYS FOR SYSTEMSCopilot for Microsoft 365 Workshop, delivered by certified Microsoft partner Inovasys, is a comprehensive three-phase engagement.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
41 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
42 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFTBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
Copilot for Microsoft 365 Data and Security Readiness AssessmentAwara IT Kazakhstan LLPElevate Your Data and Security with Copilot for Microsoft 365 Readiness Assessment by Awara IT's experts.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
44 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFTAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Security and Operations with Expert Microsoft 365 SupportAVASOFTMaximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
46 out of 60
Copilot for Microsoft 365 Data Security QuickStartSoftchoiceSetting the foundation for data security and governance in preparation for Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
47 out of 60
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
48 out of 60
Implementation of Microsoft Defender for Cloud AppsCDWCDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Implementation of Microsoft Defender for Office 365CDWThe Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Microsoft 365 Managed SupportIvision, Inc.iVision offers 24/7 advanced support for Microsoft 365, enhancing IT with agile, integrated cloud solutions.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
51 out of 60
Microsoft Copilot Readiness AssessmentInviso CorporationGet ready for Microsoft Copilot, by identifying best-in-class Microsoft 365 security solutions that will protect data and users by establishing a secure foundation, control content
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
52 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance IncYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
53 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
54 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
55 out of 60
1-Tages KI Praxis Update Workshop (inkl. Copilot): Ihr Kompass durch die Welt der Künstlichen IntelligenzAppSphere AGMit dem KI Praxis Update Workshop statten wir Ihr Team mit dem neuesten Wissen über KI aus. Lernen Sie, wie Sie KI zielgerichtet und profitabel in Ihrer Organisation nutzen können.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
56 out of 60
Microsoft 365 Security Readiness: 4-Wk AssessmentQuadrasystems.net (India) P LtdIdentify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
57 out of 60
Data Security & Protection: 8 weeks - ImplementationMazzy Technologies Corp.Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
58 out of 60
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLCThis service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Healthcare & Education Cybersecurity AssessmentPSM PartnersThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
60 out of 60