FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFTAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPOThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
2 out of 60
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFTSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
3 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFTManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Seguridad Corporativa: Evaluación 4 semanasCIBERIT SRL.Con esta Solución usted podrá gestionar la seguridad en toda su empresa
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Neway Security proposition: 3-WK implementationNeWay Technologies LtdThe Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
7 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies LtdMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Microsoft 365 Threat Protection Workshop + 5 DayCyberwise Siber Güvenlik TIC. AS.Is your Microsoft 365 environment secure? Do you wonder about your current security maturity? We will assist you with a full-fledged workshop on how to deploy and implement Microsoft 365 Security.
+1
Applicable to:
Threat Protection
9 out of 60
Microsoft Funded Workshop for Threat Protection envisioning WorkshopVM GLOBAL SOLUTIONS(PTY)LTDMicrosoft Funded Workshop for Threat Protection envisioning Workshop for Microsoft 365 will upskill your team, provide knowledge Microsoft Security
+1
Applicable to:
Threat Protection
10 out of 60
Pently PentestPently GmbHSimulated cyber attacks to uncover real vulnerabilities in your entire IT landscape.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
11 out of 60
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Copilot Data ProtectionCloud LifeCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
13 out of 60
Protect 365 App - 1 hour implementationCloud LifeThe Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
14 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.Bulletproof Managed Security Elite is a Microsoft-native MXDR service that transforms Microsoft Sentinel and Defender XDR into a 24×7 cyber defense fabric.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdgeEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
17 out of 60
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Security and compliance assessment with Microsoft PurviewAVASOFTFortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
19 out of 60
Microsoft Intune DeploymentSecure Future Bilgi Tek. ve Hiz. Tic A.S.The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
20 out of 60
KMicro Rapid Incident Response & Readiness ServiceKMicro Tech, Inc.KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
21 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
22 out of 60
Device as a Service with Windows 11 and Intune: 4 Week ImplementationCognizantWindows 10 has revolutionized how organizations manage operating systems, delivering the features that you have come to know and rely on, while enhancing mobility and agility without losing data.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
23 out of 60
Data Security as a Service | Assure 365CyberOneFully Managed Data Security, governance and compliance with 24x7 monitoring—Powered by Microsoft Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
24 out of 60
Ransomware & Supply Chain Incident Management: 12 Hour AssessmentMaureen Data SystemsIdentify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
+3
Applicable to:
Compliance Advisory Services
Knowledge & Insights
Threat Protection
25 out of 60
Copilot for Microsoft 365 WorkshopCloudGate LLCCopilot for Microsoft 365 Workshop, delivered by Cloud Gate LLC, is a comprehensive three-phase engagement.
+1
Applicable to:
Threat Protection
26 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş."Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Microsoft 365 Security Review: AssessmentCyberOneIdentify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
28 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Security Architecture Design and Implementation Service上海诺未网络科技有限公司NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Information Protection & DLP PilotAwara IT Kazakhstan LLPInformation Protection & DLP Pilot — secure your data with sensitivity labels, automated classification, and DLP policy testing.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
31 out of 60
Security Operations Center with Microsoft SentinelAVASOFTMonitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 60
Rapid Remediation of Microsoft Secure ScoreCyberOneBoost your Microsoft Secure Score, reduce risk and increase cyber resilience with expert-led rapid remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFTEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 60
G Suite to Office 365 migration: 1-Hour Assessmenttrue org cloudAssessment of your current G Suite environment to plan migration to Office 365
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
35 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFTConfident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Modern Workplace Security 10-Wk ImplementationWipro LtdWipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
37 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
38 out of 60
4security: Backup as a Service for Microsoft 3654Sight HoldingsProtect your data with 4Security's Microsoft 365 Backup as a Service. Seamless integration, automated backups, and reliable data recovery for businesses of all sizes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Data Leak DetectionAwara IT Kazakhstan LLPRapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Threat Protection
40 out of 60
4security: Microsoft 365 Communication Protect4Sight Holdings4security: Microsoft 365 Communication Protect, a solution to safeguard your organisation’s communications
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
41 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFTEnhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 60
SharePoint and Teams Security - 2 week assessmentAVASOFTConfident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFTBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 60
Onevinn Secure Microsoft Copilot Journey WorkshopOnevinn ABThis workshop will enable you to take full advantage of Microsoft 365 Copilot with focus on Compliance and Information Protection.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
46 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight HoldingsStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
48 out of 60
Microsoft Defender for Endpoint - Vulnerability Assessment by AVASOFTAVASOFTEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
49 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFTUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
51 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFTEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
54 out of 60
MDS - Threat Protection EngagementMaureen Data SystemsA 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFTBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
56 out of 60
Threat Protection WorkshopMobile MentorDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
57 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
58 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援 するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
60 out of 60