FiltersClear all
Consulting services results
Showing results in consulting services.
Entrenamiento de Phishing con Microsoft Office 365S4BOfrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
1 out of 25
On-premise enviroment Identity Protection service with Microsoft IdentityS4BOn-Premises Identity Protection service detects and mitigates threats in Active Directory using Microsoft Defender for Identity.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
2 out of 25
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4BSeguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
+2
Applicable to:
Cloud Security
Threat Protection
3 out of 25
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4BInvestiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 25
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4BProtects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
+2
Applicable to:
Cloud Security
Threat Protection
5 out of 25
Servicio de Implementación de Protección de Identidades Locales con Microsoft Defender for IdentityS4BRefuerza Active Directory local con Microsoft Defender for Identity, detectando ataques, credenciales comprometidas y movimientos laterales en controladores de dominio.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 25
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4BDefensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
7 out of 25
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4BSILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
8 out of 25
Implementation on Defender for Office 365Mobile MentorOur Defender for Office 365 service provides end-to-end protection against email-based threats
+1
Applicable to:
Threat Protection
9 out of 25
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 25
Netox MXDR / SOC 24/7Netox OyFinnish-built 24/7 MXDR & SOC for Microsoft environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 25
Microsoft Defender XDR and Zero Trust Security Implementation: 4-8 Weeks EngagementCelebal Technologies Private LimitedUnify endpoint, identity, email, and cloud security to improve visibility, automate SOC response, and enable Zero Trust enforcement.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 25
Unified SOC with Microsoft Defender XDR and Sentinel (SIEM & SOAR): 4-8 Weeks EngagementCelebal Technologies Private LimitedModernize security operations using Microsoft Sentinel and Defender XDR to centralize threat monitoring, automate response, strengthen hybrid and multi cloud protection, and improve SOC outcomes fast.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 25
Microsoft Entra Identity & Access Management Implementation: 4-8 Weeks EngagementCelebal Technologies Private LimitedStrengthen hybrid identity security with Microsoft Entra ID, Conditional Access, MFA, Identity Governance, and PIM to establish adaptive access control and a Zero Trust IAM foundation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 25
Modern Identity and Access Management – Microsoft Entra IDNebulanServicio de implementación de Microsoft Entra ID para fortalecer la gestión de identidades y accesos, mejorar la seguridad y optimizar el inicio de sesión.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 25
Passwordless & Biometric AuthenticationNebulanServicio de implementación de autenticación sin contraseña y biométrica para eliminar contraseñas tradicionales, reducir riesgos de phishing y mejorar la experiencia de acceso.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 25
Enterprise-grade Endpoint Protection – Defender BusinessNebulanServicio de implementación de Microsoft Defender for Business para proteger endpoints contra malware, ransomware y vulnerabilidades mediante una configuración centralizada y segura.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
17 out of 25
Advanced Protection for Email and Collaboration – Defender for Office 365NebulanServicio de implementación de Microsoft Defender for Office 365 para proteger correo electrónico y colaboración frente a phishing y malware.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 25
EVA - Enterprise Vulnerability Assessment for Microsoft 365NebulanServicio de evaluación en Microsoft 365 que identifica riesgos de seguridad, brechas de configuración y oportunidades de optimización en identidad, aplicaciones, información y licenciamiento.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
19 out of 25
Defender for Identity ImplementationNebulanServicio profesional de implementación de Microsoft Defender for Identity para detectar y proteger Active Directory frente a amenazas avanzadas mediante análisis de comportamiento y autenticación.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 25
Backup Implementation for Microsoft 365NebulanServicio profesional de implementación de Microsoft 365 Backup para proteger correo, archivos y datos colaborativos, asegurando continuidad operativa y cumplimiento normativo.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 25
Microsoft Entra Internet Access: ImplementationNebulanServicio de implementación de Microsoft Entra Internet Access para proteger la navegación a Internet y el acceso a aplicaciones SaaS mediante control por identidad y filtrado web.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 25
Microsoft 365 Managed Service: ImplementationMobile MentorThe Microsoft 365 Managed Service delivers ongoing management of Microsoft 365 to address licensing underuse, manual provisioning, and security gaps.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
23 out of 25
SOLVEX - Zero Trust Security Assessment & Adoption RoadmapSolvex DominicanaGet a comprehensive, automated assessment of your Microsoft 365 Zero Trust posture across Identity, Devices, Data, and Network pillars with a prioritized remediation roadmap.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
24 out of 25
OPTI Intelligent SOC 24x7 – AI-Driven Security OperationsOPTIAI-driven SOC 24x7 powered by Microsoft Sentinel & Defender XDR, delivering automated detection, response, and threat hunting with integrated Copilot for Security.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
25 out of 25