FiltersClear all
Consulting services results
Showing results in consulting services.
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
1 out of 34
Insight Discover Sensitive Data 5 Day WorkshopInsight Technology SolutionsInsight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
+2
Applicable to:
Information Protection & Governance
Threat Protection
2 out of 34
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 out of 34
Microsoft 365 Security and Compliance ActivationNVISOOur engineering support covers every phase from planning to full implementation, of the different security and compliance solutions included in Microsoft licenses
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 34
Secure Collaboration 5 Wks implementationInnofactor NorwayEnterprises with significant number of employees and digital estates need best practice collaboration and security. Innofactor Secure Collaboration delivers that as code.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 34
SecWise Protect (XDR): Microsoft 365 Defender ActivationSecWiseIdentify your Microsoft Threat Protection jump-start configuration based on our security maturity predefined Microsoft 365 Defender best-practice configurations.
+1
Applicable to:
Threat Protection
6 out of 34
Azure MFA 4-hour workshopDanoffice IT ApS4 hour workshop focussing on Azure Multi-Factor Authentication (MFA) and Conditonal Access
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 34
SecWise Assess for Workplace: 5-Day Security AssessmentSecWiseAn assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 34
Continuous Security Improvement: 2-mth POCGlobeteamGlobeteams Continous Security Improvement is delivered in co-operation with the customer. This means that the customer will have an active role in operation and increase their skillset over time
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
9 out of 34
Microsoft 365 Security: 1-Wk AssessmentInnofactor NorwayInnofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 34
Microsoft 365 Defender: 10-Day AssessmentVenzo A/SLet VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 34
Cybersecurity Fitness Roadmap: 6-Wk AssessmentHiQ Stockholm ABPlan, create and implement a strategy for improving your organizational Cyber Hygiene using Microsoft Security Technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 34
Innofactor Security AssessmentInnofactor FinlandGain additional visibility to your security posture - Innofactor security assessment is a one-day technical review conducted by our experienced cybersecurity team member.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
13 out of 34
Managed Detection and Response;2-Wk ImplementationDustin ABWith Managed Detection and Response we implement Microsoft 365 E5 security features with focus on Defender for Endpoint and preform threat surveillance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 34
Mail Security ManagementJDM A/SMail Security Management er en service til din Microsoft 365, der sikrer dig en velfungerende mailløsning er både er sikker og troværdig
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 34
Managed Threat Detection [xdr] for Microsoft 365 Defender: 4 weeks implementationOrange Cyberdefense Denmark (SecureLink Denmark A/S)Implementation of Microsoft Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
16 out of 34
Managed Workspace Protection for Microsoft 365 Defender: 4 weeks implementationOrange Cyberdefense Denmark (SecureLink Denmark A/S)Implementation of Microsoft Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
17 out of 34
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Cyberdefense Denmark (SecureLink Denmark A/S)Our workshop will help you designing and deploying Microsoft security technologies for your unique needs.
+1
Applicable to:
Threat Protection
18 out of 34
Devoteam M Cloud - Microsoft Defender 365 - 2 months implementationCloudeon A/SProtect your cloud estate - we enable and tune your Microsoft XDR solution (Microsoft Defender suite) according to your needs.
+2
Applicable to:
Cloud Security
Threat Protection
19 out of 34
itm8 SOC Managed XDRitm8 Sverige ABImplementation of itm8 SOC with Microsoft Sentinel
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
20 out of 34
DNV Cyber Extended Detection and Response (XDR) for MicrosoftNixu OyjXDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 34
itm8 Managed Detection and Responseitm8 Sverige ABImplementation of itm8 Managed Detection and Response based on Defender for Business
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
22 out of 34
itm8 Cloud Driven Workplaceitm8 Sverige ABImplementation and management of Microsoft Intune and Defender for Endpoint.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
23 out of 34
Continuous Improvement Services for Microsoft 365SCIBERSciber’s Continuous Improvement service keeps your Microsoft 365 environment aligned with updates and best practices, turning changes into tailored insights that maximize your investment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 34
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 34
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
26 out of 34
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
27 out of 34
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 34
Accelerate your Microsoft 365 Copilot adoptionColumbus GlobalThe Microsoft 365 Copilot Jumpstart Program is designed for business and IT leaders who want to move beyond experimentation and unlock real productivity gains from AI.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Threat Protection
29 out of 34
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
30 out of 34
Implementation on Defender for Office 365Mobile MentorOur Defender for Office 365 service provides end-to-end protection against email-based threats
+1
Applicable to:
Threat Protection
31 out of 34
Microsoft Sentinel SOC Managed Service by H OneH One (Private) LimitedH One’s Microsoft Sentinel–based MDR service combines certified expertise, continuous monitoring, and rapid response to protect and strengthen your cloud environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 34
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 34
Netox MXDR / SOC 24/7Netox OyFinnish-built 24/7 MXDR & SOC for Microsoft environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 34