FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 17
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
2 out of 17
RICOH Managed Cybersecurity ServicesORBID NVWe correlate signals at scale, combine analyst expertise with automation, and contain threats fast so your business can move with confidence.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 17
Zero Trust Identity Security Implementation with EntraID by ReplyReplyReply’s security approach with Microsoft Entra ID helps organizations reduce identity-driven risk, support compliance requirements, and accelerate secure adoption of Microsoft cloud services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 17
Microsoft 365 Security Assessment - 4 DaysMatrix3D Infocom Private Ltd.This Assessment is a comprehensive evaluation of your Microsoft 365 environment, designed to identify misconfigurations, security gaps, compliance risks, and underutilized Microsoft security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 17
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 17
Netox MXDR / SOC 24/7Netox OyFinnish-built 24/7 MXDR & SOC for Microsoft environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 17
Dragon Copilot Implementation, Adoption and OptimisationTrustmarque Solutions LimitedThe end to end implementation of Microsoft Dragon Copilot in the NHS and Health organisations.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
8 out of 17
Microsoft Entra ID Implementation – Access SecureTalent Business Solutions (TBS)Déploiement rapide et personnalisé de Microsoft Entra ID incluant MFA, SSO, accès conditionnels, intégration d’applications et règles de sécurité.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 17
Data SecureTalent Business Solutions (TBS)Déploiement structuré de Veeam Backup for Microsoft 365 avec audit, configuration, plan de stockage, formation et option de supervision.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
10 out of 17
Microsoft Defender Full ProtectTalent Business Solutions (TBS)Déploiement structuré de Microsoft Defender pour sécuriser les postes, activer la protection avancée et automatiser la réaction face aux menaces.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
11 out of 17
Microsoft Defender XDR and Zero Trust Security Implementation: 4-8 Weeks EngagementCelebal Technologies Private LimitedUnify endpoint, identity, email, and cloud security to improve visibility, automate SOC response, and enable Zero Trust enforcement.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 17
Unified SOC with Microsoft Defender XDR and Sentinel (SIEM & SOAR): 4-8 Weeks EngagementCelebal Technologies Private LimitedModernize security operations using Microsoft Sentinel and Defender XDR to centralize threat monitoring, automate response, strengthen hybrid and multi cloud protection, and improve SOC outcomes fast.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 17
Microsoft Entra Identity & Access Management Implementation: 4-8 Weeks EngagementCelebal Technologies Private LimitedStrengthen hybrid identity security with Microsoft Entra ID, Conditional Access, MFA, Identity Governance, and PIM to establish adaptive access control and a Zero Trust IAM foundation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 17
EPAM Intune Endpoint Management ImplementationEPAM Systems, Inc.Enable secure, automated, and compliant device management by modernizing endpoint operations with Microsoft Intune to streamline deployment, policy control, and ongoing lifecycle management.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
15 out of 17
Data Governance AssessmentReplyAssess visibility and control over sensitive data across Microsoft 365 and Azure
+2
Applicable to:
Cloud Security
Information Protection & Governance
16 out of 17
Secure AI & Cloud Apps - ImplementationReplyImplement Microsoft‑aligned security and governance controls for AI and cloud applications
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
17 out of 17