FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft 365 Security Envisioning - 1day workshopOfficeline SALearn how to improve your organization’s security posture with Office Line’s Microsoft 365 Security 1-day Workshop.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 36
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 36
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
3 out of 36
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense GlobalLearn how to put next-generation Microsoft Security tools to work for you
+1
Applicable to:
Threat Protection
4 out of 36
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 36
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense GlobalUnderstand your readiness for common security threats.
+1
Applicable to:
Threat Protection
6 out of 36
Cloud Identity Foundation Workshop (5-day)DexMachGet knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
+2
Applicable to:
Identity & Access Management
Threat Protection
7 out of 36
Secure & Compliant Modern Workplace: 2 weeks ImpInsight Technology SolutionsBased on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
8 out of 36
Insight Security Mini Audit: 1 Day WorkshopInsight Technology SolutionsInsight will work with you to evaluate your Microsoft 365 environment to make sure that it is in line with industry security best practices.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
9 out of 36
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITEDProfessional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 36
Watchguard Managed ServiceCWSIWatchGuard helps customers understand, implement and fully utilise Microsoft Defender and Microsoft Sentinel's capabilities to deliver secure operations, all watched over by our 24x7 CSOC service.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 36
Microsoft 365 Security Posture 10-days AssessmentFUJITSUSecure Microsoft 365 and maximise your investment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
12 out of 36
Insight Discover Sensitive Data 5 Day WorkshopInsight Technology SolutionsInsight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
+2
Applicable to:
Information Protection & Governance
Threat Protection
13 out of 36
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom ConsultingThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 36
Secure Microsoft 365 Managed ServiceCWSICWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 36
Mobile Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure LtdAccelerated Deployment of Microsoft Endpoint Manager for Corporate Mobile Devices (iOS, Android and macOS)
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
16 out of 36
Cyderes Microsoft 365 Incident ResponseCyderesCyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
17 out of 36
Windows Intune: 1-Wk Accelerated ImplementionITC Secure LtdAccelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
18 out of 36
Cyderes Microsoft Security Adoption AdvisoryCyderesThe Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
19 out of 36
Cyderes Architecture Engineering Services for Microsoft 365 Defender for EndpointCyderesCyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
20 out of 36
Cyderes Managed Security Services for Microsoft SentinelCyderesCyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
21 out of 36
Windows Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure LtdAccelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
22 out of 36
Microsoft 365 Security Assessment: 6-day AssessmentPerformantaPerformanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 36
Threat Protection 3 Day WorkshopInsight Technology SolutionsInsight's Threat Protection Workshop identifies real-time threats in an organisation’s environment and helps define clear next steps to mitigate risks with Microsoft 365
+1
Applicable to:
Threat Protection
24 out of 36
Cybersecurity Assessment Service: 2-Day AssessmentHTGThe Cyber Security Assessment Tool (CSAT) is a software product developed by security experts to quickly assess the status of an organisation’s security with recommended improvements based on fact.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 36
Secure AILogicalis SolutionsComprehensive security for generative AI applications, ensuring safe usage and protection of sensitive data
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
26 out of 36
Endpoint Management - 3-Day enablement WorkshopBT BusinessThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
27 out of 36
Mobile Threat Defence 3 Week AssessmentBT BusinessMTD risk assessment using Microsoft 365 and Zimperium zIPS
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
28 out of 36
Email and Threat Protection 4 Week ImplementationHTGHTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
29 out of 36
Security Posture Assessment ServiceKochoSecurity Posture Service, assesses an organisation’s cloud environment against recognised security benchmarks and makes recommendations to uplift security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 36
Logicalis Copilot for Microsoft 365 JumpstartLogicalis UKThe Copilot for Microsoft 365 Jumpstart will lay the groundwork for you to leverage Copilot for Microsoft 365 effectively
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
31 out of 36
Logicalis Cyber Security InitiativeLogicalis SolutionsThe Logicalis Cyber Security Initiative (CSI) helps customer adopt and deploy Microsoft security technologies and solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 36
Threat Protection EngagementNitec Solutions LtdLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 36
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
34 out of 36
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 36
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
36 out of 36