FiltersClear all
Consulting services results
Showing results in consulting services.
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
1 out of 19
Defend, Protect, Secure with Microsoft Defender XDRComtrade System IntegrationTake the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 19
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITEDConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
3 out of 19
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
4 out of 19
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, LdaThe engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
5 out of 19
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 19
Zero Trust Assessment - 3 WeeksArmis, Sistemas de Informação, LdaSet Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Assessment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 19
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 19
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data LtdWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
9 out of 19
Microsoft Sentinel Security Consulting ServiceComtrade System IntegrationMicrosoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 19
Bulletproof Managed AI Ready (MXDR) Security EliteBulletproof Solutions Inc.AI-Ready Managed Security (MXDR) Service That Goes Beyond Traditional MDR/SOC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 19
Microsoft Funded Workshop for Threat Protection envisioning WorkshopVM GLOBAL SOLUTIONS(PTY)LTDMicrosoft Funded Workshop for Threat Protection envisioning Workshop for Microsoft 365 will upskill your team, provide knowledge Microsoft Security
+1
Applicable to:
Threat Protection
12 out of 19
Microsoft Purview Data Loss Prevention: 4-Wk Implementation ServiceUNIFY Solutions Pty. Ltd.UNIFY Solutions will implement Microsoft Purview Data Loss Prevention (DLP) to protect your organisation's sensitive information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 19
Essential 8 Gap Analysis : AssessmentEighty20 Solutions Pty LtdOur Essential Eight gap analysis approach provides assurance on effective organisational alignment
with the eight essential controls to achieve a higher level of maturity.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
14 out of 19
Cloud Security Assessment: 2 Week AssessmentByte Information Technology Pty LtdIdentify real threats to your cloud environment and develop plans and next steps for your security journey.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 19
iTop MDR 5-Week Implementation登豐數位科技股份有限公司協助您的企業快速的偵測惡意活動、使用者行為及各項由端點發起的惡意活動,即時探索弱點和錯誤的設定,以進行補救。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 19
Unified Endpoint Management: 8-Wk AssessmentZetta Pty LtdZetta’s Assessment and Optimisation engagement will assess the way you currently manage your corporate devices and advise you on how to modernise your endpoint management.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
17 out of 19
Cloud Safeguard - 12 Month ImplementationRapid CircleOur Cloud Safeguard managed security service enables customers to focus on core business and innovation while we keep your Microsoft 365 platforms safe & secure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 19
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
19 out of 19