FiltersClear all
Consulting services results
Showing results in consulting services.
Secure Score AssessmentCanon Business Services ANZEnhance your understanding of your current security posture and exposure. Discover actionable measures to protect against new and emerging threats with our Secure Score Assessment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 48
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 48
Teams & SharePoint Security HardeningAVASOFTTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Security - Defender for EndpointLinktech AustraliaA cloud centric approach that symbiotically targets architectural building blocks to alleviate issues and enhance the overall Defender for Endpoint experience for Endpoints being managed remotely
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
4 out of 48
iTop MDR 5-Week Implementation登豐數位科技股份有限公司協助您的企業快速的偵測惡意活動、使用者行為及各項由端點發起的惡意活動,即時探索弱點和錯誤的設定,以進行補救。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 48
Data#3 Essential Eight Adoption Roadmap 2-Week AssessmentData#3 LimitedThe Essential Eight Assessment is a 2 weeks engagement. The audit will help you understand your current security maturity and defensive posture, in alignment with the ACSC Essential Eight.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 48
Cloud Security Assessment: 2 Week AssessmentByte Information Technology Pty LtdIdentify real threats to your cloud environment and develop plans and next steps for your security journey.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 48
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
8 out of 48
Security Assessment: 2Wk AssessmentSXIQ DIGITAL PTY LTDSecurity Assessment Service to rapidly help organisations understand their Azure, DC and M365 current state security posture against common industry standards NIST, CIS, Essential 8 and ISO27001.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 48
Security Controls Review - 2wk AssessmentThe Missing Link Network Integration Pty LtdWe can help you achieve a more mature, secure IT environment with our comprehensive Security Controls Review powered by Microsoft Security and Compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 48
Secure Remote Work: 4-Hours WorkshopProfessional Advantage Pty LtdEnable your people to work from anywhere, securely with Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 48
Security Assessment - 5-Day AssessmentQUORUM SYSTEMS PTY LTDThe outcome of this assessment is a documented security assessment work plan with steps, tools and procedures used to conduct the assessment.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
12 out of 48
IdentityCARE 3-Wk ImplementationSecureCom LtdSecuring organizations Exchange Online and Multifactor Identity services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 48
Conditional Access & MFA 5d Proof of ConceptGeneration-e Productivity Solutions Pty LtdConditional Access and Multi Factor Authentication deployed without negatively impacting users. We setup the environment then deploy 5 devices plus train you how to do the rest.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 48
Data#3 Defend against threats: - 8-weeks ImplementationData#3 LimitedDefend against threats using Microsoft Defender, Azure Defender and Azure Sentinel provides you with an integrated
solution to protect your organisation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 48
Microsoft 365 Security Assessment: 3-DaysResolution Technology Pty LtdThe Microsoft 365 Security Assessment provides a consultative and hands on review of your production environment including best practice recommendations to secure your business data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 48
Microsoft 365 Security Assessment: 6-day AssessmentPerformantaPerformanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 48
RFFR/ISO 27001 Risk & Compliance Assessment: 6-12 MonthseStorm AustraliaBecome Right Fit for Risk (RFFR) & ISO 27001 accredited, address compliance risks, and secure your endpoint devices/users in Microsoft 365 with eStorm’s RFFR & ISO 27001 Risk & Compliance Assessment
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
18 out of 48
Unified Endpoint Management: 8-Wk AssessmentZetta Pty LtdZetta’s Assessment and Optimisation engagement will assess the way you currently manage your corporate devices and advise you on how to modernise your endpoint management.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
19 out of 48
Microsoft 365 Secure Score: 2 Week AssessmentInsightAlign your security priorities with best practice management and protection of your devices, apps and users.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
20 out of 48
Cloud Safeguard - 12 Month ImplementationRapid CircleOur Cloud Safeguard managed security service enables customers to focus on core business and innovation while we keep your Microsoft 365 platforms safe & secure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 48
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 48
Zero Trust: 3-Day AssessmentQUORUM SYSTEMS PTY LTDThe assessment has been designed and scoped to focus on Microsoft 365 or Azure security elements as these relate to inform a robust zero trust strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 48
ASD Essential 8 Assessment and Roadmap: 10-day AssessmentQUORUM SYSTEMS PTY LTDQuorum’s Essential 8 Assessment & Roadmap guides you to prioritise valuable remediations within a strategic roadmap, enabling quick wins, & developing strategies to tackle more complex use-cases.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
24 out of 48
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 48
Cyber Blueprint: DiscoveryWaterstons LimitedCyber Maturity Assessment with Risk and Gap Analysis
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
26 out of 48
Microsoft 365 Security Posture 10-days AssessmentFUJITSUSecure Microsoft 365 and maximise your investment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
27 out of 48
Microsoft 365 Copilot Readiness AssessmentDEFEND LimitedThe Microsoft 365 Copilot Readiness Assessment is purpose-built to help your organisation securely embrace the new wave of Generative AI with Microsoft 365 Copilot
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 48
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense GlobalLearn how to put next-generation Microsoft Security tools to work for you
+1
Applicable to:
Threat Protection
29 out of 48
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense GlobalUnderstand your readiness for common security threats.
+1
Applicable to:
Threat Protection
30 out of 48
Copilot for Security: Assessment 10-DaysQUORUM SYSTEMS PTY LTDMicrosoft Copilot for Security Readiness Assessment (including PoC) – the first generative AI product to help security and IT teams protect at the speed and scale of AI.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 48
Microsoft Purview Data Loss Prevention: 4-Wk Implementation ServiceUNIFY Solutions Pty. Ltd.UNIFY Solutions will implement Microsoft Purview Data Loss Prevention (DLP) to protect your organisation's sensitive information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 48
Microsoft Copilot for Security Readiness AssessmentDEFEND LimitedAssess your organisations' readiness for the power of Copilot for Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 48
Threat Protection EngagementFUJITSUIdentify and mitigate threats. Strengthen security, prioritize vulnerabilities, and improve your position.
+1
Applicable to:
Threat Protection
34 out of 48
Implementation of Microsoft Intune and Microsoft Defender by Fusion5Fusion5 LimitedFast-track endpoint security with Microsoft Intune and Defender to protect against cyber threats, unauthorised access, and compliance risks
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Threat Protection
35 out of 48
Data Leak DetectionAwara IT Kazakhstan LLPRapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Threat Protection
36 out of 48
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
37 out of 48
Threat Protection Assessment & Zero Trust ArchitectureBDOSet future-proof security goals & build a roadmap to strengthen your Microsoft 365 posture with Modern SecOps on a unified platform, leveraging Zero Trust architecture and threat protection assessment
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
38 out of 48
MCI Engagements - Cloud Securityimpeltec Pty LtdimpelSecure Cloud Security Engagement: Free 4-week workshop
+2
Applicable to:
Cloud Security
Threat Protection
39 out of 48
Managed Microsoft security services by DatacomDatacomDatacom’s managed cyber defence operation centre (CDOC) services provide 24/7 managed security through a centralised CDOC.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 48
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 48
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
42 out of 48
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
43 out of 48
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
44 out of 48
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
45 out of 48
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
46 out of 48
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 48
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
48 out of 48