FiltersClear all
Consulting services results
Showing results in consulting services.
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
1 out of 24
Defend, Protect, Secure with Microsoft Defender XDRComtrade System IntegrationTake the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 24
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITEDConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
3 out of 24
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
4 out of 24
MDS - Modern Security Operations EngagementMaureen Data SystemsA 2-day engagement to demonstrate how intelligent security analytics and threat intelligence can detect and stop active threats, encouraging organizations to deploy and adopt Modern SecOps solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 24
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, LdaThe engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
6 out of 24
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 24
Zero Trust Assessment - 3 WeeksArmis, Sistemas de Informação, LdaSet Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Assessment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 24
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
9 out of 24
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data LtdWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 24
Synergy Advisors Microsoft Security Copilot E-mmersion ExperienceSynergy Advisors LLCAI-powered security for rapid, scalable, and effective defense
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
11 out of 24
Microsoft Sentinel Security Consulting ServiceComtrade System IntegrationMicrosoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 24
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLCIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 24
Synergy Advisor POC-in-a-box for Microsoft Security CopilotSynergy Advisors LLCEnhance your security posture with Synergy Advisors POC-in-a-box for Microsoft Security Copilot
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
14 out of 24
Bulletproof Managed AI Ready (MXDR) Security EliteBulletproof Solutions Inc.AI-Ready Managed Security (MXDR) Service That Goes Beyond Traditional MDR/SOC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 24
Microsoft Funded Workshop for Threat Protection envisioning WorkshopVM GLOBAL SOLUTIONS(PTY)LTDMicrosoft Funded Workshop for Threat Protection envisioning Workshop for Microsoft 365 will upskill your team, provide knowledge Microsoft Security
+1
Applicable to:
Threat Protection
16 out of 24
Synergy Advisors Architecture Design Sessions (ADS) for Microsoft Security CopilotSynergy Advisors LLCA Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
17 out of 24
Enhance Identity Security with Microsoft Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.Bulletproof’s six-week Microsoft Entra ID P2 implementation empowers your organization to significantly strengthen identity security by ensuring only authorized access to critical systems and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 24
Microsoft 365 Cybersecurity Jumpstart: 1Wk ImplementationBDO CanadaEnsure the right safeguards are in place. Secure your Microsoft 365 tenant through BDO Lixar’s security configuration services and the cloud provisioning expertise
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 24
Compugen Threat Protection WorkshopCompugenEmpower Your Security Journey: Assess, Mitigate, and Accelerate with Microsoft’s Comprehensive Threat Protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 24
Compugen Security Posture AssessmentCompugenThe assessment is designed to evaluate and strengthen your organization's security posture by leveraging the robust tools available in Microsoft Defender.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 24
Assessment and Remediation on Microsoft 365 by CompugenCompugenThe Security Assessment and Remediation evaluates your Microsoft 365 tenant's security posture, aligned with the best practices outlined by the Center for Information Security (CIS) benchmark.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 24
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
23 out of 24
Compugen's Threat Protection EngagementCompugenDiscover and gain visibility into threats to your Microsoft 365 cloud and on-premises environments. Get a better understanding, prioritize, and mitigate potential cyberattack vectors.
+2
Applicable to:
Information Protection & Governance
Threat Protection
24 out of 24