FiltersClear all
Consulting services results
Showing results in consulting services.
Onevinn Secure Microsoft Copilot Journey WorkshopOnevinn ABThis workshop will enable you to take full advantage of Microsoft 365 Copilot with focus on Compliance and Information Protection.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
1 out of 57
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 57
Security and compliance assessment with Microsoft PurviewAVASOFTFortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
3 out of 57
NEST ArenaNoibitTwo-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 57
Unifying Microsoft Sentinel with Cloud ServicesAVASOFTEnhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 57
Manage Corporate Data on Devices with IntuneAVASOFTCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 57
Microsoft Sentinel - Log Management and threat detectionAVASOFTIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
7 out of 57
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 57
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+1
Applicable to:
Threat Protection
9 out of 57
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdgeEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
10 out of 57
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 57
SharePoint and Teams Security - 2 week assessmentAVASOFTConfident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 57
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
14 out of 57
Microsoft Defender for Endpoint - Vulnerability Assessment by AVASOFTAVASOFTEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
15 out of 57
Neway Security proposition: 3-WK implementationNeWay Technologies LtdThe Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
16 out of 57
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 57
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
18 out of 57
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
19 out of 57
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
20 out of 57
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 57
Information Protection & DLP PilotAwara IT Kazakhstan LLPInformation Protection & DLP Pilot — secure your data with sensitivity labels, automated classification, and DLP policy testing.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
22 out of 57
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 57
Microsoft Funded Workshop for Threat Protection envisioning WorkshopVM GLOBAL SOLUTIONS(PTY)LTDMicrosoft Funded Workshop for Threat Protection envisioning Workshop for Microsoft 365 will upskill your team, provide knowledge Microsoft Security
+1
Applicable to:
Threat Protection
24 out of 57
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
25 out of 57
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
26 out of 57
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 57
Teams & SharePoint Security HardeningAVASOFTTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Microsoft 365 セキュリティ: 3週間のアセスメントPERSOL CROSS TECHNOLOGY CO., LTD.お客様がご利用中の Office 365 または Microsoft 365 環境のセキュリティリスクを可視化し、脅威の状況説明とその対策をレポートします。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 57
Microsoft Defender for Endpoint 監視サービス:1ヶ月間での実装SOFTCREATE CORP.Microsoft Defender for Endpointで可視化された脅威に対して、24 時間 365 日、専門家によってサイバー攻撃を監視、脅威を特定し、影響度の高い脅威に対して端末の隔離 (対処) を行うことで、被害の拡大を防止します。
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 57
Defender for Endpoint 運用サービス:4週間の実装日商エレクトロニクスお客様のDefender for Endpointのテナントを弊社セキュリティエンジニアが代行して24時 間365日体制で監視・運用するマネージドサービスです。インシデント発生時にはエンドポイントの隔離から脅威除去、回復の支援を行い、セキュアなエンドポイント環境を実現します。カスタムルールなど4週間で実装し、その後運用代行します。最低利用期間は12ヶ月です。
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
31 out of 57
スマートスタート for Microsoft 365 E5 Security:1ヵ月間での 実装Japan Business Systems, Inc.Microsoft 365 を利用するために必要な ”ID”、”デバイス”、”アプリケーション” を、各種サイバー攻撃から守るセキュリティ製品の実装・運用を短期間で実現する構築サービスです。
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
32 out of 57
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 57
マイクロソフト EDRマネージドサービスPSC Inc.Defender及びDefender for Endpointの運用、監視、調査をサービス化しました。構築から運用までワンストップで提供します。
+2
Applicable to:
Adoption & Change Management
Threat Protection
34 out of 57
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 57
SCCloud 365:3ヶ月の実装SOFTCREATE CORP.「安心安全の最新セキュリティ」と「生産性を劇的に高めるコミュニケーション」をAll in Oneで実現するサービスです。
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
36 out of 57
リスクアセスメントサービス:3ヶ月 評価Japan Business Systems, Inc.セキュリティリスクを網羅的にチェックし、サイバー攻撃や内部不正などにより攻撃されるリスクポイントを洗い出します。
洗い出されたリスクを解決するために、最新のセキュリティ事情を踏まえながらお客さまのシステム環境を考慮した最適なMicrosoftソリューション等の実行対策案を提示します。
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 57
Managed SOAR:最短12か月の実装NTTコミュニケーションズ(株)Microsoft 365のセキュリティ機能を活用したNTTCommnicationsのセキュリティ対策・運用サービスに関連する共同販売機会を獲得する。
お客様のセキュリティ運用に関する双方の販売機会にて共同提案を実施する。
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
38 out of 57
Microsoft Defender for Endpoint導入支援JBサービス株式会社Microsoft Defender for Endpoint導入支援サービスは、セキュリティの向上とエンドポイントデバイスの保護を強化の実現を支援致します。
+1
Applicable to:
Threat Protection
39 out of 57
マネージドバックアップ for Microsoft 365:2週間の実装Japan Business Systems, Inc.大切な業務データを手軽に保管!Microsoft 365 テナント内に保存したデータのバックアップ、リストア設定や日常のバックアップ運用、問い合わせサポートを行います。
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
40 out of 57
ActSecure クラウドメールセキュリティサービス: 12-Months 実装日本電気株式会社ActSecure クラウドメールセキュリティサービスは、お客様がご利用中のMicrosoft 365などのクラウドメールサービスのセキュリティ強化対策として、標的型メール攻撃検知、メール誤送信防止、添付ファイル自動暗号化などのセキュリティ機能を一元的にクラウドサービスとして提供し、お客様メール環境のセキュリティ対策と運用リソース不足の解消を実現します。
+2
Applicable to:
Cloud Security
Threat Protection
41 out of 57
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense GlobalLearn how to put next-generation Microsoft Security tools to work for you
+1
Applicable to:
Threat Protection
42 out of 57
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense GlobalUnderstand your readiness for common security threats.
+1
Applicable to:
Threat Protection
43 out of 57
ランサムウェア対応支援サービス - ランサムウェア診断 -:2ヶ月 評価Japan Business Systems, Inc.「ランサムウェア診断」は、ランサムウェア攻撃で狙われやすいマイクロソフトの Active Directory サーバーや各種端末を対象に、攻撃に使われるブルートフォースの観点を加え、攻撃を受けた痕跡や脆弱性になりうる設定の不備などがないかを診断し、攻撃の被害を最小限に抑えることを目的とします。
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
44 out of 57
ランサムウェア対応支援サービス - ランサムウェア監視 -:2ヶ月 実装Japan Business Systems, Inc.「ランサムウェア監視」は、 JBS とセキュリティ専門ベンダーであるS&J株式会社(以下、S&J)との協業により提供するランサムウェアに特化したセキュリ ティ監視です。攻撃者はクライアント端末と Active Directory を中心に狙ってくるため、セキュリティアナリストがランサムウェア攻撃に繋がる不審なロ グを監視し、被害を未然に防ぐための対処および、最小限に抑えるための支援を行います。
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 57
Data Leak DetectionAwara IT Kazakhstan LLPRapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Threat Protection
46 out of 57
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
47 out of 57
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 57
中堅企業向け‗セキュリティ4_エンドポイントセキュリティJapan Business Systems, Inc.JBS は中堅企業のお客さま固有のニーズに対応した、包括的なソリューション群を用意しました。
デジタル活用や変革が停滞してしまっている方、ご相談をお待ちしています。
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Threat Protection
49 out of 57
中堅企業向け‗生産性向上3_Microsoft 365 データ保管Japan Business Systems, Inc.JBS は中堅企業のお客さま固有のニーズに対応した、包括的なソリューション群を用意しました。
デジタル活用や変革が停滞してしまっている方、ご相談をお待ちしています。
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
50 out of 57
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
51 out of 57
Skysecure Realize Zero Trust BlueprintSkysecure Technologies Pvt. Ltd.Accelerate Microsoft Zero Trust adoption with Skysecure’s AI-driven framework that unifies identity, data, device, and threat protection across Microsoft 365 and Microsoft Azure.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
52 out of 57
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
53 out of 57
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
54 out of 57
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
55 out of 57
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
56 out of 57
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
57 out of 57