FiltersClear all
Consulting services results
Showing results in consulting services.
All results
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLCProtect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
1 out of 60
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLCWe understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
2 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLCThe goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
3 out of 60
Get AI Ready: 5-Day AssessmentPSM PartnersAI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityThreat Protection
4 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLCThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
5 out of 60
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
6 out of 60
Threat Protection Engagement: 3-Day AssessmentPSM PartnersDo more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
7 out of 60
Defend Against Threats with SIEM Plus XDR WorkshopThe Partner MastersThe Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
8 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLCEnhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
9 out of 60
Additional Spam and Email Protection: 3-Days Professional ServiceIT Partner LLCAdditional protection for organizations experiencing problems with emails.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
10 out of 60
Zero Trust as a Service (ZTaaS)Aegis InnovatorsDigital transformation and adopting AI starts with building a secure foundation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
11 out of 60
Microsoft Intune: 3-Wk Current State AssessmentInvokeAssess your endpoint management current state and have a roadmap to modernize it with the Microsoft Intune family of solutions.
+2
Applicable to:
Device Deployment & ManagementThreat Protection
12 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReplyValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
13 out of 60
Defender for Office 365 Professional Security Services | Customized Deployment in as Little as 6-WeeksDifendaTake the next step in your Defender for Office 365 journey with Difenda, the 2023 Microsoft Security Impact Award Winner.
+2
Applicable to:
Information Protection & GovernanceThreat Protection
14 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLCMulti-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
15 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLCService used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
16 out of 60
Microsoft 365 Security BriefingCDI LLCA Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
17 out of 60
Defender for Identity Professional Security Services | Customized Deployment in as Little As 6-WeeksDifendaSecure Azure Active Directory with Difenda, the 2023 Microsoft Security Impact Award Winner.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
18 out of 60
Endpoint Security Foundations 50 users: 1-YrRed River Technology LLCEndpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
+2
Applicable to:
Cloud SecurityThreat Protection
19 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era TechnologySecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
20 out of 60
Microsoft 365 Security WorkshopCollective InsightsEquip your organization with insights, strategies, and tools to fortify defenses, mitigate threats, and enhance overall security readiness across your digital estate.
+2
Applicable to:
Identity & Access ManagementThreat Protection
21 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5Collective InsightsUpgrade to Microsoft 365 E5 for Advanced Productivity and Security
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
22 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLCEstablish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
23 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLCEstablish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
24 out of 60
Onevinn Secure Microsoft Copilot Journey WorkshopOnevinn ABThis workshop will enable you to take full advantage of Microsoft 365 Copilot with focus on Compliance and Information Protection.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
25 out of 60
Microsoft Cybersecurity AssessmentThe Partner MastersDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
26 out of 60
Microsoft Intune DeploymentSecure Future Bilgi Tek. ve Hiz. Tic A.S.The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
+3
Applicable to:
Identity & Access ManagementMobile Device ManagementThreat Protection
27 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
28 out of 60
iT1's Security AssessmentIt1 Source LLCImprove your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
29 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu TarsasagSafeguard your entire organization with Managed Security Services on Microsoft Defender
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
30 out of 60
Defender for IoT Professional Security Services | Customized Deployment in as Little as 8-WeeksDifendaUnify your IT and OT security environment with Difenda, the 2023 Microsoft Security Impact Award Winner.
+3
Applicable to:
Device Deployment & ManagementInformation Protection & GovernanceThreat Protection
31 out of 60
Vulnerability ManagementBlack Cell Magyarország Korlatolt Felelossegu TarsasagRapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
+2
Applicable to:
Cloud SecurityThreat Protection
32 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu TarsasagInspect events in your network to locate threat indicators and entities
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
33 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for EndpointCyderesCyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
34 out of 60
Cyderes Microsoft 365 Incident ResponseCyderesCyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
35 out of 60
Defender for Office365Suri Services SCSuri Services y Office 365: La alianza impenetrable en ciberseguridad.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
36 out of 60
Avanade Modern Sec OpsAvanade, Inc.To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
37 out of 60
Threat Protection EngagementadaQuestLearn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
38 out of 60
Microsoft Defender for Office 365: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
+2
Applicable to:
Cloud SecurityThreat Protection
39 out of 60
Microsoft Defender for Cloud Apps: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Cloud Apps
+2
Applicable to:
Cloud SecurityThreat Protection
40 out of 60
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
41 out of 60
Cyderes Microsoft Security Adoption AdvisoryCyderesThe Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
42 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
43 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLPReview your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
44 out of 60
Cyber Security AssessmentAegis InnovatorsUnderstand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
45 out of 60
Incident Response RetainerSentinel Technologies Inc.Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
46 out of 60
Office 365 Encrypted Email - Initial Setup: 1-Day Professional ServiceIT Partner LLCBoost Microsoft 365 security with default encryption. Elevate messaging protection and implement email encryption and rights protection for sensitive data.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
47 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
48 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLCEnhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
49 out of 60
GoDaddy Office 365 to Microsoft Office 365 Tenant-to-Tenant Cutover Email Migration: 7-Days Professional ServiceIT Partner LLCSeamless, short-term-downtime migration of email service from GoDaddy Office 365 to Microsoft Office 365, ensuring user access and Exchange Online functionality.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
50 out of 60
MDR WorkshopGrant Thornton LLPMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
51 out of 60
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling TechnologiesCyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
52 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
53 out of 60
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
54 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.A high-level forensics evaluation designed to identify current and past threat activity.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
55 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderesCyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
56 out of 60
Cyber Security AssessmentELEVATE Solutions LimitedThe Cybersecurity Assessment helps customers assess their security posture and risk to insider threats.
+1
Applicable to:
Threat Protection
57 out of 60
Identity WorkshopSentinel Technologies Inc.Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
58 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
59 out of 60
Fortis IR Table Top ExercisesSentinel Technologies Inc.Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
60 out of 60