FiltersClear all
Consulting services results
Showing results in consulting services.
Edgile Caller Verifier Powered by Entra ID : 8 WeeksWipro LtdWipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
+2
Applicable to:
Identity & Access Management
Threat Protection
1 out of 11
Microsoft Intune Quickstart ImplementationTechNet UC LLCThe purpose of TechNet UC’s Microsoft Intune Quick Start offer is to provide organizations with expert guidance and support for the efficient deployment and management of Intune.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
2 out of 11
Secure Data Management with Microsoft PurviewAVASOFTConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 11
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud Security
Threat Protection
4 out of 11
Sensitive data risk assessmentAVASOFTConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 11
Avanade Microsoft Copilot for SecurityAvanade, Inc.We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 11
Avanade Modern Sec OpsAvanade, Inc.To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 11
Microsoft Funded Workshop for Threat Protection envisioning WorkshopVM GLOBAL SOLUTIONS(PTY)LTDMicrosoft Funded Workshop for Threat Protection envisioning Workshop for Microsoft 365 will upskill your team, provide knowledge Microsoft Security
+1
Applicable to:
Threat Protection
8 out of 11
Threat Protection: 2-Month ImplementationOfficeline SAThreat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 11
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 11
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
11 out of 11