FiltersClear all
Consulting services results
Showing results in consulting services.
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 41
Trustwave Accelerator for Microsoft PurviewTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Purview to unlock full value for your organization
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
2 out of 41
Imagine workshop for Security: 3daysSoftlanding Solutions Inc.MCI Build Intent Workshops demonstrate value, build customer intent, and maximize opportunities for Modern Work and Security for Microsft365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
3 out of 41
Softchoice Security Platformization Assessment and DesignSoftchoiceThe Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 41
Threat Landscape AssessmentProServeITGet critical cybersecurity insights with a global visualization of login attempts, dark web scan, & expert recommendations. We help secure your Microsoft 365 environment to protect your business.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 41
Defend Against Threats with SIEM Plus XDRNetrix GlobalAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 41
Threat Protection - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Threat Protection policies, procedures and technology against best practices.
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 41
microsoft365_security_identity_protection_1 Day_Workshop_CanadaCDWIdentity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to
manage your access quickly and accurately
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 41
Microsoft 365 Security Device Protection 1 Day Workshop - CanadaCDWAs more and more users become mobile and are using a wider variety of devices, applications and documents need to keep up.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
9 out of 41
Microsoft365_security_information_protection_1Day_Workshop_CanadaCDWInformation is one of your most valuable assets and can easily be shared, even outside the organization.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 41
Microsoft 365 Security Identity Protection 1 Day Workshop- CanadaCDWIdentity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to manage your access quickly and accurately.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
11 out of 41
Microsoft 365 Security 1 Day Workshop- CanadaCDWSecurity is at the forefront of every organization’s concerns. A lack of security poses a real threat to your business.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
12 out of 41
Microsoft Defender for Endpoint: 2-Wks Proof of ConceptLotus Beta AnalyticsExperience Threat identification, Triage and Automatic Remediation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 41
Microsoft 365 Cybersecurity Jumpstart: 1Wk ImplementationBDO CanadaEnsure the right safeguards are in place. Secure your Microsoft 365 tenant through BDO Lixar’s security configuration services and the cloud provisioning expertise
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 41
Microsoft 365 Security: 2-week assessmentMirai Security Inc.We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 41
Microsoft 365 Security & Protection: 2-Week ImplementationIT WeaponsIT Weapons can protect your Microsoft 365 tenant against cyber threats by reviewing the tenant and making key changes within it. We also include an ongoing managed service to keep your tenant secure.
+2
Applicable to:
Identity & Access Management
Threat Protection
16 out of 41
Microsoft 365 Defender Rapid Deployment - CanadaCDWCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 41
Security - Managed Defender - One-Pager - CanadaCDWCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 41
Sentinel Readiness WorkshopSentinel Technologies Inc.Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
19 out of 41
Intune for Endpoint Management - Discovery ConsultationCBTS Technology Solutions LLCLearn from CBTS how to utilize Microsoft Intune for Endpoint Management & Security in this free discovery consultation.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
20 out of 41
Microsoft Defender XDR AcceleratorThe Partner MastersWe empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation
+1
Applicable to:
Threat Protection
21 out of 41
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
22 out of 41
Microsoft Managed Extended Detection & Response (MXDR)ISA Cybersecurity Inc.Our Managed XDR service provides your environment with the ultimate protection against cyber attacks.
+1
Applicable to:
Threat Protection
23 out of 41
Compugen Threat Protection WorkshopCompugenEmpower Your Security Journey: Assess, Mitigate, and Accelerate with Microsoft’s Comprehensive Threat Protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 41
Security Foundations Data: Assessment and ImplementationProServeITData security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
+2
Applicable to:
Identity & Access Management
Threat Protection
25 out of 41
Security Foundations Email: Assessment and ImplementationProServeITProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 41
Security Foundations IdentityProServeITFortify your online identity and access controls. Evaluate your risks and deploy modern security controls to mitigate against the most common identity-based vulnerabilities and attacks.
+2
Applicable to:
Identity & Access Management
Threat Protection
27 out of 41
Global Secure Access DeploymentSoftlanding Solutions Inc.Global Secure Access (GSA) provides a comprehensive security framework that protects against modern threats while ensuring seamless and secure connectivity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 41
Security Best Practices AssessmentTechNet UC LLCOur assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
29 out of 41
Compugen Security Posture AssessmentCompugenThe assessment is designed to evaluate and strengthen your organization's security posture by leveraging the robust tools available in Microsoft Defender.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 41
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLCSkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 41
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLCStrengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 41
Unified Identity & Secure Edge Modernization with Entra SuiteBDOModernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 41
Zero Trust Deployment and Optimization ServiceSoftchoiceDeploy zero trust with confidence, optimize it to deliver lasting outcomes.
+2
Applicable to:
Cloud Security
Threat Protection
34 out of 41
Microsoft 365 Defender Deployment from BellBell CanadaKeep your organization protected against cyber threats with a comprehensive security audit and risk assessment by Bell, backed by the threat detection capabilities of Microsoft Defender.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
35 out of 41
Microsoft 365 Intune Deployment From BellBell CanadaEnable Microsoft’s best-in-class compliance and identity management solution with start-to-finish support from Bell.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
36 out of 41
Microsoft Purview QuickStart: ImplementationKraft KennedyKraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
37 out of 41
Assessment and Remediation on Microsoft 365 by CompugenCompugenThe Security Assessment and Remediation evaluates your Microsoft 365 tenant's security posture, aligned with the best practices outlined by the Center for Information Security (CIS) benchmark.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
38 out of 41
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
39 out of 41
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
40 out of 41
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
41 out of 41